Introducing G2.ai, the future of software buying.Try now

Best Database Security Software

Lauren Worth
LW
Researched and written by Lauren Worth

Database security software protects data within databases by controlling access and ensuring safe data handling. These platforms are used across industries to protect sensitive information by monitoring database activities and verifying that only authorized users have access.

Database security platforms incorporate security assessment and testing, which help maintain robust security standards by simulating potential threats. Encryption is also critical to database security tools, ensuring data remains secure even in a breach. These versatile security solutions secure on-premise, cloud, or hybrid databases and offer additional layers of protection that complement other security measures.

While there are overlaps with broader data security solutions, database security tools specifically focus on database protection, making them indispensable for enterprises aiming to strengthen their data security framework.

To qualify for inclusion in the Database Security software category, a product must:

Integrate with on-premise, cloud, or hybrid databases
Enforce database access control policies
Encrypt data at rest
Monitor or record database activity

Best Database Security Software At A Glance

Easiest to Use:
Best Free Software:
Top Trending:
Show LessShow More
Easiest to Use:
Best Free Software:
Top Trending:

G2 takes pride in showing unbiased reviews on user satisfaction in our ratings and reports. We do not allow paid placements in any of our ratings, rankings, or reports. Learn about our scoring methodologies.

No filters applied
47 Listings in Database Security Available
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Guardium DDR (Data Detection and Response) is a data security solution that helps organizations detect, analyze, and respond to potential data threats in hybrid and multi-cloud environments. It pr

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 41% Enterprise
    • 41% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • IBM Guardium Data Detection and Response Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    3
    Security
    2
    User Interface
    2
    Centralized Management
    1
    Compliance
    1
    Cons
    Expensive
    3
    Complexity
    1
    Inadequate Security
    1
    Poor Customer Support
    1
    Poor Documentation
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Guardium Data Detection and Response features and usability ratings that predict user satisfaction
    9.0
    Data Management
    Average: 8.7
    8.8
    Access Management
    Average: 9.0
    8.8
    Quality of Support
    Average: 8.7
    8.7
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Guardium DDR (Data Detection and Response) is a data security solution that helps organizations detect, analyze, and respond to potential data threats in hybrid and multi-cloud environments. It pr

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 41% Enterprise
  • 41% Mid-Market
IBM Guardium Data Detection and Response Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
3
Security
2
User Interface
2
Centralized Management
1
Compliance
1
Cons
Expensive
3
Complexity
1
Inadequate Security
1
Poor Customer Support
1
Poor Documentation
1
IBM Guardium Data Detection and Response features and usability ratings that predict user satisfaction
9.0
Data Management
Average: 8.7
8.8
Access Management
Average: 9.0
8.8
Quality of Support
Average: 8.7
8.7
Supported Databases
Average: 8.7
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can

    Users
    • Software Engineer
    Industries
    • Computer Software
    • Computer & Network Security
    Market Segment
    • 61% Mid-Market
    • 27% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Satori Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    8
    Ease of Use
    8
    Security
    8
    Integrations
    7
    Easy Integrations
    6
    Cons
    Complexity
    2
    Difficult Setup
    2
    Improvement Needed
    2
    Installation Issues
    2
    Learning Curve
    2
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Satori Data Security Platform features and usability ratings that predict user satisfaction
    9.7
    Data Management
    Average: 8.7
    9.8
    Access Management
    Average: 9.0
    9.5
    Quality of Support
    Average: 8.7
    9.6
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Satori
    Company Website
    Year Founded
    2019
    HQ Location
    Rehovot, Israel
    Twitter
    @SatoriCyber
    303 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    132 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can

Users
  • Software Engineer
Industries
  • Computer Software
  • Computer & Network Security
Market Segment
  • 61% Mid-Market
  • 27% Enterprise
Satori Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
8
Ease of Use
8
Security
8
Integrations
7
Easy Integrations
6
Cons
Complexity
2
Difficult Setup
2
Improvement Needed
2
Installation Issues
2
Learning Curve
2
Satori Data Security Platform features and usability ratings that predict user satisfaction
9.7
Data Management
Average: 8.7
9.8
Access Management
Average: 9.0
9.5
Quality of Support
Average: 8.7
9.6
Supported Databases
Average: 8.7
Seller Details
Seller
Satori
Company Website
Year Founded
2019
HQ Location
Rehovot, Israel
Twitter
@SatoriCyber
303 Twitter followers
LinkedIn® Page
www.linkedin.com
132 employees on LinkedIn®

This is how G2 Deals can help you:

  • Easily shop for curated – and trusted – software
  • Own your own software buying journey
  • Discover exclusive deals on software
(25)4.4 out of 5
View top Consulting Services for Oracle Audit Vault and Database Firewall
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle Audit Vault and Database Firewall monitors Oracle and non-Oracle database traffic to detect and block threats, as well as improves compliance reporting by consolidating audit data from database

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 52% Enterprise
    • 28% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Audit Vault and Database Firewall features and usability ratings that predict user satisfaction
    9.3
    Data Management
    Average: 8.7
    8.8
    Access Management
    Average: 9.0
    8.5
    Quality of Support
    Average: 8.7
    8.7
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    822,135 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    204,855 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle Audit Vault and Database Firewall monitors Oracle and non-Oracle database traffic to detect and block threats, as well as improves compliance reporting by consolidating audit data from database

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 52% Enterprise
  • 28% Mid-Market
Oracle Audit Vault and Database Firewall features and usability ratings that predict user satisfaction
9.3
Data Management
Average: 8.7
8.8
Access Management
Average: 9.0
8.5
Quality of Support
Average: 8.7
8.7
Supported Databases
Average: 8.7
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
822,135 Twitter followers
LinkedIn® Page
www.linkedin.com
204,855 employees on LinkedIn®
Ownership
NYSE:ORCL
(85)4.1 out of 5
2nd Easiest To Use in Database Security software
View top Consulting Services for SAP SQL Anywhere
Save to My Lists
Entry Level Price:$960 license
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SAP® SQL Anywhere® solutions deliver enterprise-level data management and synchronization capabilities. The solutions are designed to run in remote and mobile environments on a wide range of small-foo

    Users
    • Data Scientist
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 41% Enterprise
    • 36% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SAP SQL Anywhere Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Compatibility
    1
    Easy Integrations
    1
    Flexibility
    1
    Implementation Ease
    1
    Cons
    Feature Limitations
    1
    Limited Database Support
    1
    Update Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SAP SQL Anywhere features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    8.7
    Access Management
    Average: 9.0
    8.6
    Quality of Support
    Average: 8.7
    8.0
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SAP
    Year Founded
    1972
    HQ Location
    Walldorf
    Twitter
    @SAP
    299,880 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    129,051 employees on LinkedIn®
    Ownership
    NYSE:SAP
Product Description
How are these determined?Information
This description is provided by the seller.

SAP® SQL Anywhere® solutions deliver enterprise-level data management and synchronization capabilities. The solutions are designed to run in remote and mobile environments on a wide range of small-foo

Users
  • Data Scientist
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 41% Enterprise
  • 36% Mid-Market
SAP SQL Anywhere Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Compatibility
1
Easy Integrations
1
Flexibility
1
Implementation Ease
1
Cons
Feature Limitations
1
Limited Database Support
1
Update Issues
1
SAP SQL Anywhere features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
8.7
Access Management
Average: 9.0
8.6
Quality of Support
Average: 8.7
8.0
Supported Databases
Average: 8.7
Seller Details
Seller
SAP
Year Founded
1972
HQ Location
Walldorf
Twitter
@SAP
299,880 Twitter followers
LinkedIn® Page
www.linkedin.com
129,051 employees on LinkedIn®
Ownership
NYSE:SAP
(63)4.3 out of 5
View top Consulting Services for Oracle Data Safe
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security con

    Users
    • Software Engineer
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 44% Enterprise
    • 29% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Data Safe features and usability ratings that predict user satisfaction
    8.4
    Data Management
    Average: 8.7
    8.4
    Access Management
    Average: 9.0
    8.6
    Quality of Support
    Average: 8.7
    8.8
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    822,135 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    204,855 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security con

Users
  • Software Engineer
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 44% Enterprise
  • 29% Small-Business
Oracle Data Safe features and usability ratings that predict user satisfaction
8.4
Data Management
Average: 8.7
8.4
Access Management
Average: 9.0
8.6
Quality of Support
Average: 8.7
8.8
Supported Databases
Average: 8.7
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
822,135 Twitter followers
LinkedIn® Page
www.linkedin.com
204,855 employees on LinkedIn®
Ownership
NYSE:ORCL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Maximum data security, minimal impact on hardware resources

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 36% Small-Business
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trellix Database Security features and usability ratings that predict user satisfaction
    8.7
    Data Management
    Average: 8.7
    8.6
    Access Management
    Average: 9.0
    8.0
    Quality of Support
    Average: 8.7
    8.8
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trellix
    Year Founded
    2004
    HQ Location
    Milpitas, CA
    Twitter
    @Trellix
    250,269 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    826 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Maximum data security, minimal impact on hardware resources

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 36% Small-Business
  • 33% Enterprise
Trellix Database Security features and usability ratings that predict user satisfaction
8.7
Data Management
Average: 8.7
8.6
Access Management
Average: 9.0
8.0
Quality of Support
Average: 8.7
8.8
Supported Databases
Average: 8.7
Seller Details
Seller
Trellix
Year Founded
2004
HQ Location
Milpitas, CA
Twitter
@Trellix
250,269 Twitter followers
LinkedIn® Page
www.linkedin.com
826 employees on LinkedIn®
(21)4.5 out of 5
View top Consulting Services for Oracle Data Masking and Subsetting
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other act

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 57% Enterprise
    • 24% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Data Masking and Subsetting features and usability ratings that predict user satisfaction
    8.7
    Data Management
    Average: 8.7
    9.1
    Access Management
    Average: 9.0
    8.8
    Quality of Support
    Average: 8.7
    8.1
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    822,135 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    204,855 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other act

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 57% Enterprise
  • 24% Mid-Market
Oracle Data Masking and Subsetting features and usability ratings that predict user satisfaction
8.7
Data Management
Average: 8.7
9.1
Access Management
Average: 9.0
8.8
Quality of Support
Average: 8.7
8.1
Supported Databases
Average: 8.7
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
822,135 Twitter followers
LinkedIn® Page
www.linkedin.com
204,855 employees on LinkedIn®
Ownership
NYSE:ORCL
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The Leading Security Solution for Open Source Database

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 50% Enterprise
    • 42% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • MyDiamo Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    3
    Encryption
    2
    Data Protection
    1
    Ease of Use
    1
    Encryption Security
    1
    Cons
    Complex Setup
    2
    Slow Performance
    2
    Complexity Issues
    1
    Expensive
    1
    Integration Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • MyDiamo features and usability ratings that predict user satisfaction
    8.7
    Data Management
    Average: 8.7
    8.7
    Access Management
    Average: 9.0
    8.3
    Quality of Support
    Average: 8.7
    7.7
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1997
    HQ Location
    Seoul
    LinkedIn® Page
    www.linkedin.com
    82 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The Leading Security Solution for Open Source Database

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 50% Enterprise
  • 42% Small-Business
MyDiamo Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
3
Encryption
2
Data Protection
1
Ease of Use
1
Encryption Security
1
Cons
Complex Setup
2
Slow Performance
2
Complexity Issues
1
Expensive
1
Integration Issues
1
MyDiamo features and usability ratings that predict user satisfaction
8.7
Data Management
Average: 8.7
8.7
Access Management
Average: 9.0
8.3
Quality of Support
Average: 8.7
7.7
Supported Databases
Average: 8.7
Seller Details
Year Founded
1997
HQ Location
Seoul
LinkedIn® Page
www.linkedin.com
82 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DataSunrise Database Security Software secures the databases and data in real-time with high performance. DataSunrise solution is a last line of defense against unwanted data and database access from

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 46% Small-Business
    • 31% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DataSunrise Database Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Security
    1
    Features
    1
    Security
    1
    Cons
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DataSunrise Database Security features and usability ratings that predict user satisfaction
    8.8
    Data Management
    Average: 8.7
    10.0
    Access Management
    Average: 9.0
    9.3
    Quality of Support
    Average: 8.7
    10.0
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2015
    HQ Location
    Seattle, WA
    Twitter
    @datasunrise
    197 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    126 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DataSunrise Database Security Software secures the databases and data in real-time with high performance. DataSunrise solution is a last line of defense against unwanted data and database access from

Users
No information available
Industries
No information available
Market Segment
  • 46% Small-Business
  • 31% Mid-Market
DataSunrise Database Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Security
1
Features
1
Security
1
Cons
Learning Curve
1
DataSunrise Database Security features and usability ratings that predict user satisfaction
8.8
Data Management
Average: 8.7
10.0
Access Management
Average: 9.0
9.3
Quality of Support
Average: 8.7
10.0
Supported Databases
Average: 8.7
Seller Details
Year Founded
2015
HQ Location
Seattle, WA
Twitter
@datasunrise
197 Twitter followers
LinkedIn® Page
www.linkedin.com
126 employees on LinkedIn®
(25)4.9 out of 5
1st Easiest To Use in Database Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Zero Trust Database Access with Unified Web-Based IDE. With Datasparc's patented flagship product DBHawk, users only receive access to the data they need. DBHawk provides zero trust database acces

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 52% Mid-Market
    • 32% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DBHawk Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    2
    Database Management
    2
    Helpful
    2
    Performance Optimization
    2
    Analytics
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DBHawk features and usability ratings that predict user satisfaction
    8.1
    Data Management
    Average: 8.7
    9.8
    Access Management
    Average: 9.0
    9.8
    Quality of Support
    Average: 8.7
    9.6
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Datasparc
    Company Website
    HQ Location
    San Diego, CA
    Twitter
    @DBHawkSQLTool
    167 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    11 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Zero Trust Database Access with Unified Web-Based IDE. With Datasparc's patented flagship product DBHawk, users only receive access to the data they need. DBHawk provides zero trust database acces

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 52% Mid-Market
  • 32% Enterprise
DBHawk Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
2
Database Management
2
Helpful
2
Performance Optimization
2
Analytics
1
Cons
This product has not yet received any negative sentiments.
DBHawk features and usability ratings that predict user satisfaction
8.1
Data Management
Average: 8.7
9.8
Access Management
Average: 9.0
9.8
Quality of Support
Average: 8.7
9.6
Supported Databases
Average: 8.7
Seller Details
Seller
Datasparc
Company Website
HQ Location
San Diego, CA
Twitter
@DBHawkSQLTool
167 Twitter followers
LinkedIn® Page
www.linkedin.com
11 employees on LinkedIn®
(45)4.3 out of 5
3rd Easiest To Use in Database Security software
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

    Users
    No information available
    Industries
    • Computer Software
    • Information Technology and Services
    Market Segment
    • 42% Mid-Market
    • 33% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • HashiCorp Vault features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    8.5
    Access Management
    Average: 9.0
    7.8
    Quality of Support
    Average: 8.7
    8.9
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Hashicorp
    Year Founded
    2012
    HQ Location
    San Francisco, CA
    Twitter
    @hashicorp
    98,579 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,529 employees on LinkedIn®
    Ownership
    NASDAQ: HCP
Product Description
How are these determined?Information
This description is provided by the seller.

HashiCorp Vault tightly controls access to secrets and encryption keys by authenticating against trusted sources of identity such as Active Directory, LDAP, Kubernetes, CloudFoundry, and cloud platfor

Users
No information available
Industries
  • Computer Software
  • Information Technology and Services
Market Segment
  • 42% Mid-Market
  • 33% Enterprise
HashiCorp Vault features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
8.5
Access Management
Average: 9.0
7.8
Quality of Support
Average: 8.7
8.9
Supported Databases
Average: 8.7
Seller Details
Seller
Hashicorp
Year Founded
2012
HQ Location
San Francisco, CA
Twitter
@hashicorp
98,579 Twitter followers
LinkedIn® Page
www.linkedin.com
2,529 employees on LinkedIn®
Ownership
NASDAQ: HCP
(20)4.0 out of 5
View top Consulting Services for Oracle Advanced Security
Save to My Lists
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Oracle Advanced Security provides two important preventive controls to protect sensitive data at the source: encryption and redaction. Together, these two controls form the foundation of Oracle's defe

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 55% Enterprise
    • 35% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Oracle Advanced Security features and usability ratings that predict user satisfaction
    7.9
    Data Management
    Average: 8.7
    8.7
    Access Management
    Average: 9.0
    8.2
    Quality of Support
    Average: 8.7
    8.1
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Oracle
    Year Founded
    1977
    HQ Location
    Austin, TX
    Twitter
    @Oracle
    822,135 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    204,855 employees on LinkedIn®
    Ownership
    NYSE:ORCL
Product Description
How are these determined?Information
This description is provided by the seller.

Oracle Advanced Security provides two important preventive controls to protect sensitive data at the source: encryption and redaction. Together, these two controls form the foundation of Oracle's defe

Users
No information available
Industries
No information available
Market Segment
  • 55% Enterprise
  • 35% Mid-Market
Oracle Advanced Security features and usability ratings that predict user satisfaction
7.9
Data Management
Average: 8.7
8.7
Access Management
Average: 9.0
8.2
Quality of Support
Average: 8.7
8.1
Supported Databases
Average: 8.7
Seller Details
Seller
Oracle
Year Founded
1977
HQ Location
Austin, TX
Twitter
@Oracle
822,135 Twitter followers
LinkedIn® Page
www.linkedin.com
204,855 employees on LinkedIn®
Ownership
NYSE:ORCL
Entry Level Price:Free
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Acra security suite is the first choice proactive security toolbox for preventing real-world data leakage risks, encrypting and decrypting data between application and database, and complying to encry

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Mid-Market
    • 36% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Acra Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Data Protection
    2
    Compliance
    1
    Compliance Management
    1
    Data Security
    1
    Ease of Use
    1
    Cons
    Complex Configuration
    1
    Complexity
    1
    Complexity Issues
    1
    Poor Customer Support
    1
    Poor Interface Design
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Acra features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    8.0
    Access Management
    Average: 9.0
    8.3
    Quality of Support
    Average: 8.7
    8.3
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    London, England
    Twitter
    @cossacklabs
    2,528 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    26 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Acra security suite is the first choice proactive security toolbox for preventing real-world data leakage risks, encrypting and decrypting data between application and database, and complying to encry

Users
No information available
Industries
No information available
Market Segment
  • 43% Mid-Market
  • 36% Small-Business
Acra Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Data Protection
2
Compliance
1
Compliance Management
1
Data Security
1
Ease of Use
1
Cons
Complex Configuration
1
Complexity
1
Complexity Issues
1
Poor Customer Support
1
Poor Interface Design
1
Acra features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
8.0
Access Management
Average: 9.0
8.3
Quality of Support
Average: 8.7
8.3
Supported Databases
Average: 8.7
Seller Details
Year Founded
2014
HQ Location
London, England
Twitter
@cossacklabs
2,528 Twitter followers
LinkedIn® Page
www.linkedin.com
26 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities, and suggests remedial actions. The solution identifie

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 58% Enterprise
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IBM Guardium Vulnerability Assessment features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.7
    10.0
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    IBM
    Year Founded
    1911
    HQ Location
    Armonk, NY
    Twitter
    @IBM
    709,764 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    331,391 employees on LinkedIn®
    Ownership
    SWX:IBM
Product Description
How are these determined?Information
This description is provided by the seller.

IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities, and suggests remedial actions. The solution identifie

Users
No information available
Industries
No information available
Market Segment
  • 58% Enterprise
  • 25% Mid-Market
IBM Guardium Vulnerability Assessment features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Quality of Support
Average: 8.7
10.0
Supported Databases
Average: 8.7
Seller Details
Seller
IBM
Year Founded
1911
HQ Location
Armonk, NY
Twitter
@IBM
709,764 Twitter followers
LinkedIn® Page
www.linkedin.com
331,391 employees on LinkedIn®
Ownership
SWX:IBM
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SQL Secure does not install any components, DLLs, scripts, stored procedures or tables on the SQL Server instances being monitored.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 52% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SQL Secure features and usability ratings that predict user satisfaction
    8.5
    Data Management
    Average: 8.7
    8.2
    Access Management
    Average: 9.0
    7.2
    Quality of Support
    Average: 8.7
    7.8
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    Houston, TX
    Twitter
    @MigrationWiz
    489 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SQL Secure does not install any components, DLLs, scripts, stored procedures or tables on the SQL Server instances being monitored.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 52% Enterprise
  • 33% Mid-Market
SQL Secure features and usability ratings that predict user satisfaction
8.5
Data Management
Average: 8.7
8.2
Access Management
Average: 9.0
7.2
Quality of Support
Average: 8.7
7.8
Supported Databases
Average: 8.7
Seller Details
Year Founded
1999
HQ Location
Houston, TX
Twitter
@MigrationWiz
489 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SQL Compliance Manager is a comprehensive database auditing solution that monitors and tracks changes to SQL Server objects and data, and sends alerts on suspicious activity. SQL Compliance Manager al

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • IDERA SQL Compliance Manager features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    8.3
    Access Management
    Average: 9.0
    8.1
    Quality of Support
    Average: 8.7
    8.3
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    Houston, TX
    Twitter
    @MigrationWiz
    489 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SQL Compliance Manager is a comprehensive database auditing solution that monitors and tracks changes to SQL Server objects and data, and sends alerts on suspicious activity. SQL Compliance Manager al

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 40% Small-Business
IDERA SQL Compliance Manager features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
8.3
Access Management
Average: 9.0
8.1
Quality of Support
Average: 8.7
8.3
Supported Databases
Average: 8.7
Seller Details
Year Founded
1999
HQ Location
Houston, TX
Twitter
@MigrationWiz
489 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Enabling your organization to comply with cybersecurity regulations and strengthen IBM i security by controlling access to systems and data, enforcing data privacy, monitoring for compliance, and asse

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Mid-Market
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Assure Security Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    Cons
    This product has not yet received any negative sentiments.
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Assure Security features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    10.0
    Access Management
    Average: 9.0
    9.2
    Quality of Support
    Average: 8.7
    10.0
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Precisely
    HQ Location
    Burlington, Massachusetts
    Twitter
    @PreciselyData
    3,981 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    2,990 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Enabling your organization to comply with cybersecurity regulations and strengthen IBM i security by controlling access to systems and data, enforcing data privacy, monitoring for compliance, and asse

Users
No information available
Industries
No information available
Market Segment
  • 50% Mid-Market
  • 33% Enterprise
Assure Security Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
Cons
This product has not yet received any negative sentiments.
Assure Security features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
10.0
Access Management
Average: 9.0
9.2
Quality of Support
Average: 8.7
10.0
Supported Databases
Average: 8.7
Seller Details
Seller
Precisely
HQ Location
Burlington, Massachusetts
Twitter
@PreciselyData
3,981 Twitter followers
LinkedIn® Page
www.linkedin.com
2,990 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SQL Server Password is very crucial for the SQL Server Administrators regarding database security. Loss of such password causes a pathetic situation. But, Don't worry, here is an authentic and reliabl

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 64% Enterprise
    • 27% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Aryson SQL Password Recovery features and usability ratings that predict user satisfaction
    9.3
    Data Management
    Average: 8.7
    9.3
    Access Management
    Average: 9.0
    8.3
    Quality of Support
    Average: 8.7
    8.8
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2014
    HQ Location
    Noida, Uttar Pradesh
    Twitter
    @Arysontec
    45 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    97 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

SQL Server Password is very crucial for the SQL Server Administrators regarding database security. Loss of such password causes a pathetic situation. But, Don't worry, here is an authentic and reliabl

Users
No information available
Industries
No information available
Market Segment
  • 64% Enterprise
  • 27% Small-Business
Aryson SQL Password Recovery features and usability ratings that predict user satisfaction
9.3
Data Management
Average: 8.7
9.3
Access Management
Average: 9.0
8.3
Quality of Support
Average: 8.7
8.8
Supported Databases
Average: 8.7
Seller Details
Year Founded
2014
HQ Location
Noida, Uttar Pradesh
Twitter
@Arysontec
45 Twitter followers
LinkedIn® Page
www.linkedin.com
97 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Immuta enables organizations to unlock value from their cloud data by protecting it and providing secure access. The Immuta Data Security Platform provides sensitive data discovery, security and acces

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 67% Enterprise
    • 20% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Immuta features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    7.8
    Access Management
    Average: 9.0
    9.0
    Quality of Support
    Average: 8.7
    8.3
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Immuta
    Year Founded
    2015
    HQ Location
    Boston, Massachusetts
    Twitter
    @immuta
    38,556 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    218 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Immuta enables organizations to unlock value from their cloud data by protecting it and providing secure access. The Immuta Data Security Platform provides sensitive data discovery, security and acces

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 67% Enterprise
  • 20% Mid-Market
Immuta features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
7.8
Access Management
Average: 9.0
9.0
Quality of Support
Average: 8.7
8.3
Supported Databases
Average: 8.7
Seller Details
Seller
Immuta
Year Founded
2015
HQ Location
Boston, Massachusetts
Twitter
@immuta
38,556 Twitter followers
LinkedIn® Page
www.linkedin.com
218 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Our Polymer platform is a first-of-its- kind data security and control solution. We secure any type of data, anywhere it goes, with always-on protection – leveraging the latest in artificial intellige

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Covax Polymer features and usability ratings that predict user satisfaction
    10.0
    Data Management
    Average: 8.7
    0.0
    No information available
    10.0
    Quality of Support
    Average: 8.7
    6.7
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2019
    HQ Location
    Tucson, US
    Twitter
    @covaxdata
    18 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Our Polymer platform is a first-of-its- kind data security and control solution. We secure any type of data, anywhere it goes, with always-on protection – leveraging the latest in artificial intellige

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 33% Mid-Market
Covax Polymer features and usability ratings that predict user satisfaction
10.0
Data Management
Average: 8.7
0.0
No information available
10.0
Quality of Support
Average: 8.7
6.7
Supported Databases
Average: 8.7
Seller Details
Year Founded
2019
HQ Location
Tucson, US
Twitter
@covaxdata
18 Twitter followers
LinkedIn® Page
www.linkedin.com
4 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Hidden risks expose your data. Imperva Discovery and Assessment discovers unknown databases, classifies sensitive data and detects database vulnerabilities.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Imperva Data Security Fabric features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    8.9
    Access Management
    Average: 9.0
    8.9
    Quality of Support
    Average: 8.7
    7.8
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Imperva
    Year Founded
    2002
    HQ Location
    Redwood Shores, CA
    Twitter
    @Imperva
    84,603 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,590 employees on LinkedIn®
    Ownership
    NASDAQ: IMPV
Product Description
How are these determined?Information
This description is provided by the seller.

Hidden risks expose your data. Imperva Discovery and Assessment discovers unknown databases, classifies sensitive data and detects database vulnerabilities.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
Imperva Data Security Fabric features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
8.9
Access Management
Average: 9.0
8.9
Quality of Support
Average: 8.7
7.8
Supported Databases
Average: 8.7
Seller Details
Seller
Imperva
Year Founded
2002
HQ Location
Redwood Shores, CA
Twitter
@Imperva
84,603 Twitter followers
LinkedIn® Page
www.linkedin.com
1,590 employees on LinkedIn®
Ownership
NASDAQ: IMPV
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Protegrity’s data protection solutions and products can improve your business capabilities through protected and dynamic data sharing. Our comprehensive range of methods enable you to unlock your data

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 43% Mid-Market
    • 29% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Protegrity features and usability ratings that predict user satisfaction
    10.0
    Data Management
    Average: 8.7
    10.0
    Access Management
    Average: 9.0
    9.2
    Quality of Support
    Average: 8.7
    9.4
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1996
    HQ Location
    Stamford, US
    Twitter
    @Protegrity
    4,536 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    374 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Protegrity’s data protection solutions and products can improve your business capabilities through protected and dynamic data sharing. Our comprehensive range of methods enable you to unlock your data

Users
No information available
Industries
No information available
Market Segment
  • 43% Mid-Market
  • 29% Enterprise
Protegrity features and usability ratings that predict user satisfaction
10.0
Data Management
Average: 8.7
10.0
Access Management
Average: 9.0
9.2
Quality of Support
Average: 8.7
9.4
Supported Databases
Average: 8.7
Seller Details
Year Founded
1996
HQ Location
Stamford, US
Twitter
@Protegrity
4,536 Twitter followers
LinkedIn® Page
www.linkedin.com
374 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DBArtisan is a comprehensive database administration solution to manage multiple DBMSs from one central console.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 45% Enterprise
    • 27% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • DBArtisan Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Customer Support
    1
    Database Management
    1
    Ease of Use
    1
    Easy Integrations
    1
    Helpful
    1
    Cons
    Not User-Friendly
    1
    Slow Performance
    1
    UX Improvement
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • DBArtisan features and usability ratings that predict user satisfaction
    7.2
    Data Management
    Average: 8.7
    7.8
    Access Management
    Average: 9.0
    9.4
    Quality of Support
    Average: 8.7
    8.3
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1999
    HQ Location
    Houston, TX
    Twitter
    @MigrationWiz
    489 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    69 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DBArtisan is a comprehensive database administration solution to manage multiple DBMSs from one central console.

Users
No information available
Industries
No information available
Market Segment
  • 45% Enterprise
  • 27% Mid-Market
DBArtisan Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Customer Support
1
Database Management
1
Ease of Use
1
Easy Integrations
1
Helpful
1
Cons
Not User-Friendly
1
Slow Performance
1
UX Improvement
1
DBArtisan features and usability ratings that predict user satisfaction
7.2
Data Management
Average: 8.7
7.8
Access Management
Average: 9.0
9.4
Quality of Support
Average: 8.7
8.3
Supported Databases
Average: 8.7
Seller Details
Year Founded
1999
HQ Location
Houston, TX
Twitter
@MigrationWiz
489 Twitter followers
LinkedIn® Page
www.linkedin.com
69 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iSecurity Safe-Update protects IBM i business critical data against updates by unauthorized programs. Such programs are those who come from a library which is not used to store production programs, fi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Mid-Market
    • 40% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iSecurity Safe-Update features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    10.0
    Access Management
    Average: 9.0
    7.2
    Quality of Support
    Average: 8.7
    6.7
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1983
    HQ Location
    Nanuet, NY
    Twitter
    @razleesecurity
    496 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iSecurity Safe-Update protects IBM i business critical data against updates by unauthorized programs. Such programs are those who come from a library which is not used to store production programs, fi

Users
No information available
Industries
No information available
Market Segment
  • 40% Mid-Market
  • 40% Small-Business
iSecurity Safe-Update features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
10.0
Access Management
Average: 9.0
7.2
Quality of Support
Average: 8.7
6.7
Supported Databases
Average: 8.7
Seller Details
Year Founded
1983
HQ Location
Nanuet, NY
Twitter
@razleesecurity
496 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    JackDB is a secure, collaborative environment for your queries and data-driven insights.

    Users
    No information available
    Industries
    • Information Technology and Services
    • Computer Software
    Market Segment
    • 47% Mid-Market
    • 27% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • JackDB Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Database Management
    1
    Ease of Use
    1
    Platform Compatibility
    1
    Cons
    Learning Curve
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • JackDB features and usability ratings that predict user satisfaction
    10.0
    Data Management
    Average: 8.7
    10.0
    Access Management
    Average: 9.0
    8.5
    Quality of Support
    Average: 8.7
    10.0
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    JackDB
    HQ Location
    N/A
    Twitter
    @jackdb
    66 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

JackDB is a secure, collaborative environment for your queries and data-driven insights.

Users
No information available
Industries
  • Information Technology and Services
  • Computer Software
Market Segment
  • 47% Mid-Market
  • 27% Enterprise
JackDB Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Database Management
1
Ease of Use
1
Platform Compatibility
1
Cons
Learning Curve
1
JackDB features and usability ratings that predict user satisfaction
10.0
Data Management
Average: 8.7
10.0
Access Management
Average: 9.0
8.5
Quality of Support
Average: 8.7
10.0
Supported Databases
Average: 8.7
Seller Details
Seller
JackDB
HQ Location
N/A
Twitter
@jackdb
66 Twitter followers
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A database and big data scanner that identifies configuration mistakes, identification and access control issues, missing patches, and any toxic combination of settings that could lead to bad outcomes

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 40% Small-Business
    • 40% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trustwave AppDetectivePRO features and usability ratings that predict user satisfaction
    6.7
    Data Management
    Average: 8.7
    7.5
    Access Management
    Average: 9.0
    8.3
    Quality of Support
    Average: 8.7
    8.3
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trustwave
    Year Founded
    1995
    HQ Location
    Chicago, IL
    Twitter
    @Trustwave
    22,121 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,097 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A database and big data scanner that identifies configuration mistakes, identification and access control issues, missing patches, and any toxic combination of settings that could lead to bad outcomes

Users
No information available
Industries
No information available
Market Segment
  • 40% Small-Business
  • 40% Enterprise
Trustwave AppDetectivePRO features and usability ratings that predict user satisfaction
6.7
Data Management
Average: 8.7
7.5
Access Management
Average: 9.0
8.3
Quality of Support
Average: 8.7
8.3
Supported Databases
Average: 8.7
Seller Details
Seller
Trustwave
Year Founded
1995
HQ Location
Chicago, IL
Twitter
@Trustwave
22,121 Twitter followers
LinkedIn® Page
www.linkedin.com
1,097 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Simple, secure, and performant database access is the key to creating successful enterprise applications. And that's just what ASNA DataGate provides. ASNA DataGate works directly with either the IBM

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • ASNA DataGate features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    10.0
    Access Management
    Average: 9.0
    9.2
    Quality of Support
    Average: 8.7
    10.0
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Asna
    Year Founded
    1982
    HQ Location
    Sant Cugat del Vallès, Barcelona
    Twitter
    @ASNAinc
    317 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    99 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Simple, secure, and performant database access is the key to creating successful enterprise applications. And that's just what ASNA DataGate provides. ASNA DataGate works directly with either the IBM

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Mid-Market
ASNA DataGate features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
10.0
Access Management
Average: 9.0
9.2
Quality of Support
Average: 8.7
10.0
Supported Databases
Average: 8.7
Seller Details
Seller
Asna
Year Founded
1982
HQ Location
Sant Cugat del Vallès, Barcelona
Twitter
@ASNAinc
317 Twitter followers
LinkedIn® Page
www.linkedin.com
99 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Imperva Data Protection analyzes all user access to business-critical web applications and protects applications and data from cyber attacks.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 40% Mid-Market
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Imperva Cloud Data Protection Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Custom Rules
    1
    Cybersecurity
    1
    Protection
    1
    Security
    1
    WAF (Web Application Firewall)
    1
    Cons
    Ineffective Blocking
    1
    Unclear Guidance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Imperva Cloud Data Protection features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    10.0
    Access Management
    Average: 9.0
    8.8
    Quality of Support
    Average: 8.7
    10.0
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Imperva
    Year Founded
    2002
    HQ Location
    Redwood Shores, CA
    Twitter
    @Imperva
    84,603 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,590 employees on LinkedIn®
    Ownership
    NASDAQ: IMPV
Product Description
How are these determined?Information
This description is provided by the seller.

Imperva Data Protection analyzes all user access to business-critical web applications and protects applications and data from cyber attacks.

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 40% Mid-Market
Imperva Cloud Data Protection Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Custom Rules
1
Cybersecurity
1
Protection
1
Security
1
WAF (Web Application Firewall)
1
Cons
Ineffective Blocking
1
Unclear Guidance
1
Imperva Cloud Data Protection features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
10.0
Access Management
Average: 9.0
8.8
Quality of Support
Average: 8.7
10.0
Supported Databases
Average: 8.7
Seller Details
Seller
Imperva
Year Founded
2002
HQ Location
Redwood Shores, CA
Twitter
@Imperva
84,603 Twitter followers
LinkedIn® Page
www.linkedin.com
1,590 employees on LinkedIn®
Ownership
NASDAQ: IMPV
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Download Scuba, a free tool that uncovers hidden security risks

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Enterprise
    • 33% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Scuba Database Vulnerability Scanner Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Ease of Use
    1
    Security
    1
    Vulnerability Identification
    1
    Cons
    Lack of Information
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Scuba Database Vulnerability Scanner features and usability ratings that predict user satisfaction
    7.5
    Data Management
    Average: 8.7
    9.2
    Access Management
    Average: 9.0
    8.3
    Quality of Support
    Average: 8.7
    8.3
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Imperva
    Year Founded
    2002
    HQ Location
    Redwood Shores, CA
    Twitter
    @Imperva
    84,603 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,590 employees on LinkedIn®
    Ownership
    NASDAQ: IMPV
Product Description
How are these determined?Information
This description is provided by the seller.

Download Scuba, a free tool that uncovers hidden security risks

Users
No information available
Industries
No information available
Market Segment
  • 67% Enterprise
  • 33% Small-Business
Scuba Database Vulnerability Scanner Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Ease of Use
1
Security
1
Vulnerability Identification
1
Cons
Lack of Information
1
Scuba Database Vulnerability Scanner features and usability ratings that predict user satisfaction
7.5
Data Management
Average: 8.7
9.2
Access Management
Average: 9.0
8.3
Quality of Support
Average: 8.7
8.3
Supported Databases
Average: 8.7
Seller Details
Seller
Imperva
Year Founded
2002
HQ Location
Redwood Shores, CA
Twitter
@Imperva
84,603 Twitter followers
LinkedIn® Page
www.linkedin.com
1,590 employees on LinkedIn®
Ownership
NASDAQ: IMPV
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Through time-tested technology and design, the SecureAge Security Suite achieves Data protection with a careful balance of 100% Data security, application integrity, and real-world usability.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • SecureAge Security Suite Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Cloud Services
    1
    Email Management
    1
    Encryption
    1
    Features
    1
    Protection
    1
    Cons
    Compatibility Issues
    1
    Limited OS Compatibility
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • SecureAge Security Suite features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    8.3
    Access Management
    Average: 9.0
    7.1
    Quality of Support
    Average: 8.7
    8.3
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2003
    HQ Location
    N/A
    LinkedIn® Page
    www.linkedin.com
    34 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Through time-tested technology and design, the SecureAge Security Suite achieves Data protection with a careful balance of 100% Data security, application integrity, and real-world usability.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
SecureAge Security Suite Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cloud Services
1
Email Management
1
Encryption
1
Features
1
Protection
1
Cons
Compatibility Issues
1
Limited OS Compatibility
1
SecureAge Security Suite features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
8.3
Access Management
Average: 9.0
7.1
Quality of Support
Average: 8.7
8.3
Supported Databases
Average: 8.7
Seller Details
Year Founded
2003
HQ Location
N/A
LinkedIn® Page
www.linkedin.com
34 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    A highly scalable database security platform that enables organizations to secure their relational databases and big data stores, both on premises and in the cloud, with a distributed architecture and

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Trustwave DbProtect features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    10.0
    Access Management
    Average: 9.0
    6.7
    Quality of Support
    Average: 8.7
    8.3
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Trustwave
    Year Founded
    1995
    HQ Location
    Chicago, IL
    Twitter
    @Trustwave
    22,121 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    1,097 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

A highly scalable database security platform that enables organizations to secure their relational databases and big data stores, both on premises and in the cloud, with a distributed architecture and

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Trustwave DbProtect features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
10.0
Access Management
Average: 9.0
6.7
Quality of Support
Average: 8.7
8.3
Supported Databases
Average: 8.7
Seller Details
Seller
Trustwave
Year Founded
1995
HQ Location
Chicago, IL
Twitter
@Trustwave
22,121 Twitter followers
LinkedIn® Page
www.linkedin.com
1,097 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The CipherTrust Data Security Platform is an integrated suite of data-centric security products and solutions that unify data discovery and classification, protection (encryption, tokenization & k

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 75% Enterprise
    • 25% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Thales CipherTrust Data Security Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    HQ Location
    Austin, Texas
    Twitter
    @ThalesCloudSec
    6,798 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    941 employees on LinkedIn®
    Ownership
    EPA:HO
    Total Revenue (USD mm)
    $15,854
Product Description
How are these determined?Information
This description is provided by the seller.

The CipherTrust Data Security Platform is an integrated suite of data-centric security products and solutions that unify data discovery and classification, protection (encryption, tokenization & k

Users
No information available
Industries
No information available
Market Segment
  • 75% Enterprise
  • 25% Small-Business
Thales CipherTrust Data Security Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Quality of Support
Average: 8.7
0.0
No information available
Seller Details
HQ Location
Austin, Texas
Twitter
@ThalesCloudSec
6,798 Twitter followers
LinkedIn® Page
www.linkedin.com
941 employees on LinkedIn®
Ownership
EPA:HO
Total Revenue (USD mm)
$15,854
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Alibaba Cloud develops highly scalable cloud computing and data management services.

    Users
    No information available
    Industries
    • Information Technology and Services
    Market Segment
    • 38% Small-Business
    • 25% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Alibaba ApsaraDB RDS for MySQL features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    8.3
    Quality of Support
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Alibaba
    HQ Location
    Hangzhou
    Twitter
    @alibaba_cloud
    1,059,398 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    4,580 employees on LinkedIn®
    Ownership
    BABA
    Total Revenue (USD mm)
    $509,711
Product Description
How are these determined?Information
This description is provided by the seller.

Alibaba Cloud develops highly scalable cloud computing and data management services.

Users
No information available
Industries
  • Information Technology and Services
Market Segment
  • 38% Small-Business
  • 25% Mid-Market
Alibaba ApsaraDB RDS for MySQL features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
8.3
Quality of Support
Average: 8.7
0.0
No information available
Seller Details
Seller
Alibaba
HQ Location
Hangzhou
Twitter
@alibaba_cloud
1,059,398 Twitter followers
LinkedIn® Page
www.linkedin.com
4,580 employees on LinkedIn®
Ownership
BABA
Total Revenue (USD mm)
$509,711
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    iSecurity AP-Journal protects business-critical information from insider threats and from external security breaches, notifies managers of any changes to information assets and streamlines IBM i journ

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • iSecurity AP-Journal Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Security
    1
    Cons
    Slow Performance
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iSecurity AP-Journal features and usability ratings that predict user satisfaction
    10.0
    Data Management
    Average: 8.7
    10.0
    Access Management
    Average: 9.0
    10.0
    Quality of Support
    Average: 8.7
    10.0
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1983
    HQ Location
    Nanuet, NY
    Twitter
    @razleesecurity
    496 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

iSecurity AP-Journal protects business-critical information from insider threats and from external security breaches, notifies managers of any changes to information assets and streamlines IBM i journ

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
iSecurity AP-Journal Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Security
1
Cons
Slow Performance
1
iSecurity AP-Journal features and usability ratings that predict user satisfaction
10.0
Data Management
Average: 8.7
10.0
Access Management
Average: 9.0
10.0
Quality of Support
Average: 8.7
10.0
Supported Databases
Average: 8.7
Seller Details
Year Founded
1983
HQ Location
Nanuet, NY
Twitter
@razleesecurity
496 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    DB-Gate empowers IBM i customers with exciting data access capabilities, based on Open Database Connectivity (ODBC), employing standard IBM i facilities to enable fully database-transparent access to

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 50% Enterprise
    • 50% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • iSecurity DB-Gate features and usability ratings that predict user satisfaction
    10.0
    Data Management
    Average: 8.7
    10.0
    Access Management
    Average: 9.0
    6.7
    Quality of Support
    Average: 8.7
    10.0
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    1983
    HQ Location
    Nanuet, NY
    Twitter
    @razleesecurity
    496 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

DB-Gate empowers IBM i customers with exciting data access capabilities, based on Open Database Connectivity (ODBC), employing standard IBM i facilities to enable fully database-transparent access to

Users
No information available
Industries
No information available
Market Segment
  • 50% Enterprise
  • 50% Small-Business
iSecurity DB-Gate features and usability ratings that predict user satisfaction
10.0
Data Management
Average: 8.7
10.0
Access Management
Average: 9.0
6.7
Quality of Support
Average: 8.7
10.0
Supported Databases
Average: 8.7
Seller Details
Year Founded
1983
HQ Location
Nanuet, NY
Twitter
@razleesecurity
496 Twitter followers
LinkedIn® Page
www.linkedin.com
22 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    SecureData provides a flexible range of native interfaces, REST and Simple APIs, to enable easy integration across applications and systems, from legacy databases to mobile, web, and IoT.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 33% Enterprise
    • 33% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • OpenText Voltage SecureData Enterprise features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    8.3
    Access Management
    Average: 9.0
    8.3
    Quality of Support
    Average: 8.7
    8.3
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    OpenText
    Year Founded
    1991
    HQ Location
    Waterloo, ON
    Twitter
    @OpenText
    21,716 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    22,403 employees on LinkedIn®
    Ownership
    NASDAQ:OTEX
Product Description
How are these determined?Information
This description is provided by the seller.

SecureData provides a flexible range of native interfaces, REST and Simple APIs, to enable easy integration across applications and systems, from legacy databases to mobile, web, and IoT.

Users
No information available
Industries
No information available
Market Segment
  • 33% Enterprise
  • 33% Mid-Market
OpenText Voltage SecureData Enterprise features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
8.3
Access Management
Average: 9.0
8.3
Quality of Support
Average: 8.7
8.3
Supported Databases
Average: 8.7
Seller Details
Seller
OpenText
Year Founded
1991
HQ Location
Waterloo, ON
Twitter
@OpenText
21,716 Twitter followers
LinkedIn® Page
www.linkedin.com
22,403 employees on LinkedIn®
Ownership
NASDAQ:OTEX
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Database Monitoring solution offers a robust real-time data activity monitoring and cognitive analytics that automatically discovers unusual activity around sensitive data. It protects against unautho

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Database Security Monitor features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    8.3
    Access Management
    Average: 9.0
    0.0
    No information available
    10.0
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Database Monitoring solution offers a robust real-time data activity monitoring and cognitive analytics that automatically discovers unusual activity around sensitive data. It protects against unautho

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Database Security Monitor features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
8.3
Access Management
Average: 9.0
0.0
No information available
10.0
Supported Databases
Average: 8.7
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The DataVault Storage SaaS is a private blockchain operating system (OS) for enterprises, providing an exceptionally secure environment for data management. Specifically created to help Fortune 500 en

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Mid-Market
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Datavault storage SaaS features and usability ratings that predict user satisfaction
    10.0
    Data Management
    Average: 8.7
    10.0
    Access Management
    Average: 9.0
    0.0
    No information available
    8.3
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

The DataVault Storage SaaS is a private blockchain operating system (OS) for enterprises, providing an exceptionally secure environment for data management. Specifically created to help Fortune 500 en

Users
No information available
Industries
No information available
Market Segment
  • 100% Mid-Market
Datavault storage SaaS features and usability ratings that predict user satisfaction
10.0
Data Management
Average: 8.7
10.0
Access Management
Average: 9.0
0.0
No information available
8.3
Supported Databases
Average: 8.7
Seller Details
LinkedIn® Page
www.linkedin.com
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Database Access Manager & Dynamic Data Masking is the single point of access control management for database layer, secures data access with logging, policy enforcement, and masking.

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Krontech Single Connect Database Access Manager and Dynamic Data Masking features and usability ratings that predict user satisfaction
    8.3
    Data Management
    Average: 8.7
    6.7
    Access Management
    Average: 9.0
    10.0
    Quality of Support
    Average: 8.7
    6.7
    Supported Databases
    Average: 8.7
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2007
    HQ Location
    Istanbul, TR
    LinkedIn® Page
    www.linkedin.com
    48 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Database Access Manager & Dynamic Data Masking is the single point of access control management for database layer, secures data access with logging, policy enforcement, and masking.

Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Krontech Single Connect Database Access Manager and Dynamic Data Masking features and usability ratings that predict user satisfaction
8.3
Data Management
Average: 8.7
6.7
Access Management
Average: 9.0
10.0
Quality of Support
Average: 8.7
6.7
Supported Databases
Average: 8.7
Seller Details
Year Founded
2007
HQ Location
Istanbul, TR
LinkedIn® Page
www.linkedin.com
48 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Small-Business
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Mage Database Activity Monitoring features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Mage
    Year Founded
    2014
    HQ Location
    New York, NY
    LinkedIn® Page
    www.linkedin.com
    78 employees on LinkedIn®
Users
No information available
Industries
No information available
Market Segment
  • 100% Small-Business
Mage Database Activity Monitoring features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Mage
Year Founded
2014
HQ Location
New York, NY
LinkedIn® Page
www.linkedin.com
78 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 67% Small-Business
    • 33% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • PHEMI Health DataLab Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    Data Privacy
    1
    Data Security
    1
    Deployment Flexibility
    1
    Ease of Management
    1
    Cons
    Connector Issues
    1
    Data Management Issues
    1
    Data Privacy
    1
    Data Security
    1
    Dependency Issues
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • PHEMI Health DataLab features and usability ratings that predict user satisfaction
    10.0
    Data Management
    Average: 8.7
    10.0
    Access Management
    Average: 9.0
    8.8
    Quality of Support
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Year Founded
    2013
    HQ Location
    Vancouver, British Columbia
    Twitter
    @PHEMIsystems
    759 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    8 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

The PHEMI Trustworthy Health DataLab is a unique, cloud-based, integrated big data management system that allows healthcare organizations to enhance innovation and generate value from healthcare data

Users
No information available
Industries
No information available
Market Segment
  • 67% Small-Business
  • 33% Enterprise
PHEMI Health DataLab Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
Data Privacy
1
Data Security
1
Deployment Flexibility
1
Ease of Management
1
Cons
Connector Issues
1
Data Management Issues
1
Data Privacy
1
Data Security
1
Dependency Issues
1
PHEMI Health DataLab features and usability ratings that predict user satisfaction
10.0
Data Management
Average: 8.7
10.0
Access Management
Average: 9.0
8.8
Quality of Support
Average: 8.7
0.0
No information available
Seller Details
Year Founded
2013
HQ Location
Vancouver, British Columbia
Twitter
@PHEMIsystems
759 Twitter followers
LinkedIn® Page
www.linkedin.com
8 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    AQtive Guard is a comprehensive cryptographic management platform designed to provide organizations with a complete inventory of their cryptographic assets, enabling proactive detection and remediatio

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • AQtive Guard features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    SandboxAQ
    Year Founded
    2021
    HQ Location
    New York, NY
    Twitter
    @SandboxAQ
    4,014 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    245 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

AQtive Guard is a comprehensive cryptographic management platform designed to provide organizations with a complete inventory of their cryptographic assets, enabling proactive detection and remediatio

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
AQtive Guard features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
SandboxAQ
Year Founded
2021
HQ Location
New York, NY
Twitter
@SandboxAQ
4,014 Twitter followers
LinkedIn® Page
www.linkedin.com
245 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Omega DB Security Reporter is a security assessment and reporting, software-only, and out-of-box solution for Oracle databases. It implements quick reporting, visualization and documentation of the se

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Omega DB Security Reporter features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    DATAPLUS
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Omega DB Security Reporter is a security assessment and reporting, software-only, and out-of-box solution for Oracle databases. It implements quick reporting, visualization and documentation of the se

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Omega DB Security Reporter features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
DATAPLUS
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Privacera, based in Fremont, CA, was founded in 2016 by the creators of Apache Ranger™ and Apache Atlas. Delivering trusted and timely access to data consumers, Privacera provides data privacy, securi

    Users
    No information available
    Industries
    No information available
    Market Segment
    • 100% Enterprise
  • Pros and Cons
    Expand/Collapse Pros and Cons
  • Privacera Data Security Platform Pros and Cons
    How are these determined?Information
    Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
    Pros
    Access Control
    1
    API Integration
    1
    Cloud Computing
    1
    Compliance
    1
    Compliance Management
    1
    Cons
    Complex Coding
    1
    Complex Implementation
    1
    Complexity
    1
    Complexity Issues
    1
    Difficult Learning
    1
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Privacera Data Security Platform features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    6.7
    Quality of Support
    Average: 8.7
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Company Website
    HQ Location
    Hayward, CA
    Twitter
    @privacera
    495 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    118 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

Privacera, based in Fremont, CA, was founded in 2016 by the creators of Apache Ranger™ and Apache Atlas. Delivering trusted and timely access to data consumers, Privacera provides data privacy, securi

Users
No information available
Industries
No information available
Market Segment
  • 100% Enterprise
Privacera Data Security Platform Pros and Cons
How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Access Control
1
API Integration
1
Cloud Computing
1
Compliance
1
Compliance Management
1
Cons
Complex Coding
1
Complex Implementation
1
Complexity
1
Complexity Issues
1
Difficult Learning
1
Privacera Data Security Platform features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
6.7
Quality of Support
Average: 8.7
0.0
No information available
Seller Details
Company Website
HQ Location
Hayward, CA
Twitter
@privacera
495 Twitter followers
LinkedIn® Page
www.linkedin.com
118 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    QueryPie performs access control and auditing through a centralized access control system between authenticated users and target resources. It identifies users and grants minimal privileges to authori

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • QueryPie DAC(Database Access Controller) features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    QueryPie
    Year Founded
    2016
    HQ Location
    Seoul, KR
    Twitter
    @querypie
    77 Twitter followers
    LinkedIn® Page
    www.linkedin.com
    64 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

QueryPie performs access control and auditing through a centralized access control system between authenticated users and target resources. It identifies users and grants minimal privileges to authori

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
QueryPie DAC(Database Access Controller) features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
QueryPie
Year Founded
2016
HQ Location
Seoul, KR
Twitter
@querypie
77 Twitter followers
LinkedIn® Page
www.linkedin.com
64 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    🔒 Introducing Velvetauth: Your Key to Seamless Security! 🔒 Are you ready to elevate your software security game? Look no further than Velvetauth – the cutting-edge licensing and authentication soluti

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Velvetauth features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    LinkedIn® Page
    www.linkedin.com
    1 employees on LinkedIn®
Product Description
How are these determined?Information
This description is provided by the seller.

🔒 Introducing Velvetauth: Your Key to Seamless Security! 🔒 Are you ready to elevate your software security game? Look no further than Velvetauth – the cutting-edge licensing and authentication soluti

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Velvetauth features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
LinkedIn® Page
www.linkedin.com
1 employees on LinkedIn®
  • Overview
    Expand/Collapse Overview
  • Product Description
    How are these determined?Information
    This description is provided by the seller.

    Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems. Fo

    We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
    Industries
    No information available
    Market Segment
    No information available
  • User Satisfaction
    Expand/Collapse User Satisfaction
  • Walacor features and usability ratings that predict user satisfaction
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
    0.0
    No information available
  • Seller Details
    Expand/Collapse Seller Details
  • Seller Details
    Seller
    Walacor
    LinkedIn® Page
    www.linkedin.com
Product Description
How are these determined?Information
This description is provided by the seller.

Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems. Fo

We don't have enough data from reviews to share who uses this product. Write a review to contribute, or learn more about review generation.
Industries
No information available
Market Segment
No information available
Walacor features and usability ratings that predict user satisfaction
0.0
No information available
0.0
No information available
0.0
No information available
0.0
No information available
Seller Details
Seller
Walacor
LinkedIn® Page
www.linkedin.com

Learn More About Database Security Software

What is Database Security Software?

Database security software is crucial for maintaining the confidentiality, integrity, and availability of information within databases, adhering to the CIA triad—a core principle in information security. 

By employing advanced encryption and tokenization techniques, database security platforms ensure that sensitive data remains protected from unauthorized access, solidifying their role as essential database security solutions. These tools are pivotal in safeguarding data integrity by preventing unauthorized modifications, whether from internal threats, external hackers, or accidental errors caused by employees.

To maintain availability, the best database security software ensures that databases remain operational and are quickly recoverable in case of disruptions. These platforms continuously monitor and analyze database activity, whether on-premises or in the cloud, offering detailed audit reports for security teams to evaluate. 

Furthermore, database security tools proactively scan for and address vulnerabilities, such as configuration errors.

What are the Common Features of Database Security Software?

Database security software offers comprehensive protection to safeguard sensitive data across businesses of all sizes. These solutions offer essential features that defend against threats and also provide compliance, scalability, and seamless integration with broader security frameworks.

Some of the core features of database security software include:

  • Real-time monitoring and auditing: Database security software monitors database activities to detect suspicious behavior, providing features like auditing user actions, logging database queries, and triggering alerts for anomalous activities.
  • Access control and authentication: These tools implement strong access control measures by using role-based access control (RBAC), multi-factor authentication (MFA), and single sign-on (SSO) to ensure secure and authorized database usage.
  • Data encryption: Comprehensive encryption capabilities are offered, protecting data at rest and in transit using industry-standard algorithms while providing essential key management features.
  • Vulnerability assessment: Database security solutions can scan databases for known vulnerabilities and misconfigurations, helping organizations proactively identify and address potential security weaknesses.
  • Intrusion detection and prevention: Advanced database security tools come equipped with intrusion detection systems (IDS) and intrusion prevention systems (IPS) to actively defend against malicious threats, such as SQL injection attacks.
  • Data masking: To safeguard sensitive information, these tools can dynamically mask or tokenize data, preventing unauthorized users from accessing it while still allowing authorized access.
  • Patch management: Automated patching features ensure that database systems remain up-to-date, securing them against vulnerabilities with the latest security patches.
  • Compliance management: Database security platforms often include features to help organizations meet regulations like GDPR, HIPAA, and PCI DSS, ensuring compliance with industry standards.
  • Reporting and analytics: Comprehensive reporting tools are provided to deliver insights into database security posture and assist with forensic analysis when needed.
  • Scalability and integration: The best database security solutions are built to scale with organizational needs and integrate smoothly with existing security infrastructures to enhance overall data protection.

What are the Benefits of Database Security Software?

The best database security software not only protects data assets but also provides benefits such as:

  • Protection against data breaches. Database security platforms implement strong security measures to defend against unauthorized access.
  • Cost efficiency. Investing in robust database security tools can prevent the repercussions associated with non-compliance, offering businesses a prudent financial safeguard.
  • Reputation management. Maintaining a secure database helps organizations protect their reputation by ensuring customer trust and confidence.
  • Simplified compliance. Database security solutions simplify compliance with various industry regulations, minimizing the administrative burden and reducing the risk of sanctions.
  • Business continuity. These solutions guarantee that business operations continue smoothly during security incidents by providing reliable backup and recovery functions.
  • Risk management and mitigation. By proactively identifying and addressing vulnerabilities, organizations can more effectively manage and mitigate security risks, promoting a secure business environment.

Who Uses Database Security Software?

Database security solutions serve a diverse range of industries and roles, such as:

  • Infosec teams monitor network traffic and database usage to prevent malicious uses of a company’s data, whether from external hackers or insider threats.
  • Database administrators are responsible for the day-to-day operations and availability of the database and may use database security software.
  • Financial institutions use database security solutions to protect customer financial data and adhere to strict regulatory standards.
  • Healthcare providers rely on these tools to secure patient records and maintain compliance with healthcare regulations, such as HIPAA.
  • Retail and e-commerce companies need database security platforms to safeguard customer data during online transactions.
  • Government agencies utilize these solutions to secure sensitive data and protect citizen information.

Challenges with Database Security Software

Software solutions can come with their own set of challenges. 

  • Balancing usability and security: The most common challenge with database security is striking the right balance between data usability and security. The more accessible a company’s data is, the more vulnerable it is to misuse and security threats. Ensuring that legitimate uses are streamlined while guaranteeing the overall database is secure is a balance each company must find to meet its own needs.
  • Database threats: No company wants to suffer from data breaches. Databases are desirable targets for cyber threats, including SQL or NoSQL attacks, denial of service (DoS) or DDoS attacks, exploiting software vulnerabilities, malware, employee errors, and insider threats. Combating these threats requires a multi-layered, advanced security approach. Relying solely on database security to address these risks may not be enough.  
  • Physical security: In addition to software protecting company assets, physical security risks at data center locations must be considered. The company’s data access plan should include both software and physical permissions. If the business uses cloud databases, its cloud provider will be responsible for the physical security of servers. However, the company is always responsible for the overall security posture.

Database Security Software Pricing Models

Database security solutions are offered through various pricing models, each catering to organizational needs and budget considerations. Here's an overview:

  • Subscription-based pricing: Many vendors offer a subscription model, typically billed monthly or annually. This model scales based on the number of users, databases, or features required. 
  • Perpetual licensing: This model involves a one-time upfront payment for a perpetual license to use the software. Additional costs may include ongoing maintenance and support fees, usually a percentage of the initial license cost. 
  • Usage-based pricing: Some vendors offer usage-based models, where costs are determined by the volume of data processed or stored. This model can appeal to organizations with fluctuating data volumes, allowing for scaling up or down based on need.
  • Freemium and tiered pricing: Vendors may offer a freemium model, providing a basic set of features for free with the option to upgrade to more comprehensive features at a cost. Tiered pricing lets users choose a plan that suits their needs, with higher tiers offering more advanced functionality and support.
  • Customized pricing: For enterprises with specific needs, vendors may provide custom quotes based on a detailed assessment of their requirements, ensuring the solution aligns closely with their business objectives.

How to Buy the Best Database Security Software

Requirements Gathering (RFI/RFP) for Database Security Software

Begin the process by thoroughly understanding your organization's specific needs concerning database security solutions. 

  • Identify business goals: Clearly define the purpose behind acquiring database security software and the desired outcomes.
  • Classify data sensitivity: Determine the data type needing protection and any relevant compliance requirements.
  • Determine protection needs: Decide if protection is needed at the cell, row, file, or database level.
  • Specify encryption requirements: Outline the encryption standards needed and consider any regulatory impacts.
  • Evaluate additional security tools: Assess your organization's data tokenization or masking need.
  • Choose deployment models: Decide whether an on-premises, cloud, or hybrid environment best suits your needs, including multi-cloud considerations.
  • Plan for integration: List any existing software the new solution must integrate to ensure seamless operation.
  • Define access and audit policies: Establish access policies, identify privileged users, and audit requirements to support compliance.
  • Consider implementation support: Determine if cybersecurity consulting services are necessary for deployment.

Compare Database Security Software Products

  • Compile a long list: Research platforms such as G2 to gather information on potential database security tools that meet your requirements.
  • Create a shortlist: Refine your list based on requirement alignment, user reviews, and specific features the tools offer.
  • Conduct product demos: Engage with vendors to view demonstrations that show how the software meets your needs, focusing on integrations and pricing models.

Selection of Database Security Software

  • Assemble a selection team: Include infosec, IT, and finance team members to evaluate and implement the software.
  • Negotiate terms: Discuss licensing costs and service agreements, considering current and future security needs.
  • Make a final decision: With input from key stakeholders, choose the solution that best meets technical specifications, usability requirements, budget considerations, and overall organizational goals.


Researched and written by Lauren Worth