View definitions of the features and discover new technology terms.
Storage | Not enough data | ||
Availability | Not enough data | ||
Stability | Not enough data | ||
Scalability | Not enough data | ||
Security | Not enough data | ||
Data Manipulation | See feature definition | Not enough data | |
Query Language | Not enough data |
Data Migration | Based on 14 ApexSQL reviews. Allows data movement from one database to another. | 87% (Based on 14 reviews) | |
Backup and Recovery | As reported in 14 ApexSQL reviews. Provides data backup and recovery functionality to protect and restore a database. | 85% (Based on 14 reviews) | |
Multi-User Environment | Based on 14 ApexSQL reviews. Allows users to access and work on data concurrently, supporting several views of the data. | 86% (Based on 14 reviews) |
Data dictionary | Stores the database metadata, that is the definitions of data elements, types, relationships etc. This feature was mentioned in 14 ApexSQL reviews. | 88% (Based on 14 reviews) | |
Data Replication | Creates a copy of the database to maintain consistency and integrity. 14 reviewers of ApexSQL have provided feedback on this feature. | 83% (Based on 14 reviews) | |
Query Language | Allows users to create, update and retrieve data in a database. 14 reviewers of ApexSQL have provided feedback on this feature. | 89% (Based on 14 reviews) | |
Data Modeling | See feature definition | Based on 14 ApexSQL reviews. Defines the logical design of the data before building the schemas. | 90% (Based on 14 reviews) |
Performance Analysis | Monitors and analyzes critical database attributes like query performance, user sessions, dead lock detail, system errors etc and visualize them on a custom dashboard. This feature was mentioned in 14 ApexSQL reviews. | 88% (Based on 14 reviews) |
Data Encryption | Based on 14 ApexSQL reviews. Encrypts and transforms data at the database from a readable state into a ciphertext of unreadable characters. | 89% (Based on 14 reviews) | |
User Access Control | Allows restricted user acess to modify depending on the access level. This feature was mentioned in 14 ApexSQL reviews. | 89% (Based on 14 reviews) | |
Database Locking | Prevents other users and applications from accessing data while it is being updated to avoid data loss or update. | Not enough data | |
Access Control | Allows permissions to be granted or revoked in the database, schema or table levels. | Not enough data | |
Encryption | Built-in native encryption with enterprise key management. | Not enough data | |
Authentication | Provides multi-factor authentication with certificates. | Not enough data |
Text Search | Provides support for international character sets and full text search. | Not enough data | |
Data Types | Supports multiple data types like primitive, structured, document etc. | Not enough data | |
Languages | Supports multiple procedural programming languages like PL/PGSQL, Perl, Python etc. | Not enough data | |
Operating Systems | Available on multiple operating systems like Linux, Windows, MacOS etc. | Not enough data |
Disaster Recovery | Provides data recovery functionality to protect and restore data in a database. | Not enough data | |
Data Concurrency | Allows multi-version concurrency control. | Not enough data | |
Workload Management | Handles workloads, from single machines to data warehouses or web services with many concurrent users. | Not enough data | |
Advanced Indexing | Allows users to quickly retrieve data through various types of indexing like B-tree, hash table etc. | Not enough data | |
Query Optimizer | Helps interpret SQL queries and determine the fastest method of execution. | Not enough data |
Data Schema | Data is organized as a set of tables with columns and rows like a table structure. | Not enough data | |
Query Language | Allows users to create, update and retrieve data in a database. | Not enough data | |
ACID - Complaint | Adheres to ACID (atomicity, consistency, isolation, durability), a set of database transaction properties. | Not enough data | |
Data Replication | Provides log-based or/and trigger-based replication. | Not enough data |