Introducing G2.ai, the future of software buying.Try now
iSecurity DB-Gate
Save to My Lists
Claimed
Claimed

Top Rated iSecurity DB-Gate Alternatives

SAP SQL Anywhere
(85)
4.1 out of 5

iSecurity DB-Gate Reviews & Product Details

iSecurity DB-Gate Overview

What is iSecurity DB-Gate?

DB-Gate empowers IBM i customers with exciting data access capabilities, based on Open Database Connectivity (ODBC), employing standard IBM i facilities to enable fully database-transparent access to remote systems.

iSecurity DB-Gate Details
Show LessShow More
Product Description
DB-Gate empowers IBM i customers with exciting data access capabilities, based on Open Database Connectivity (ODBC), employing standard IBM i facilities to enable fully database-transparent access to remote systems.

Seller
Description

iSecurity Field Encryption, offered by Raz-Lee Security, is a comprehensive data encryption solution designed to protect sensitive data within IBM i environments. This product ensures that critical information, such as personal data, financial details, and other sensitive attributes, are encrypted at the field level, thereby enhancing security and compliance with regulations such as GDPR, PCI DSS, and HIPAA.Field Encryption by Raz-Lee employs strong encryption algorithms to secure data while maintaining performance efficiency. It provides dynamic data masking to secure data access dynamically and enables restricted access to sensitive data, ensuring that only authorized personnel can view or modify it. The solution is tailored to seamlessly integrate into existing IBM i systems, enhancing security without disrupting operational workflows.The configurability of Raz-Lee's Field Encryption allows organizations to apply encryption based on specific fields within databases, giving businesses a flexible and focused approach to data security. The product also includes auditing capabilities to track access and changes to encrypted fields, supporting adherence to strict security and compliance mandates.

Overview Provided by:

iSecurity DB-Gate Media

Product Avatar Image

Have you used iSecurity DB-Gate before?

Answer a few questions to help the iSecurity DB-Gate community

2 iSecurity DB-Gate Reviews

3.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 iSecurity DB-Gate Reviews
3.5 out of 5
2 iSecurity DB-Gate Reviews
3.5 out of 5
G2 reviews are authentic and verified.
SD
Associate Engineer
Enterprise (> 1000 emp.)
"Average"
What do you like best about iSecurity DB-Gate?

DB-gate simplifies the integration process between APIs and databases by eliminating the need for writing API integration code and the requirement of learning different query languages for each database. Instead, native SQL queries can be used, and the focus can be on coding rather than managing databases, thanks to the use of ODBC drivers. Review collected by and hosted on G2.com.

What do you dislike about iSecurity DB-Gate?

Although the solution may be highly effective, it is not publicly accessible as it is developed and managed by IBM, a profit-driven organization. This means that access to the solution will likely require some sort of financial commitment in the form of a paywall. This presents a major issue, as it creates vendor lock-in, effectively limiting our options and tying us exclusively to IBM. This not only restricts our ability to explore alternative solutions but also limits our flexibility in choosing the best solution for our specific needs and budget. The lack of open-source access may also prevent other developers and organizations from contributing to the solution's ongoing development, which could limit its overall potential. Review collected by and hosted on G2.com.

Lankit P.
LP
AWS DevOps Engineer | Full-stack Laravel Developer
Small-Business (50 or fewer emp.)
"old school SQL + bleeding edge databases = no learning curve & powerfull DB 🥳"
What do you like best about iSecurity DB-Gate?

Native SQL queries do the work. Traditionally, one has to write some API integration code. This code then requires a specific type of Query language. All this can be thrown out of the window along with the steep learning curve for each DB. DB-gate makes it seamless to integrate all this backend using ODBC drivers. i like the way i can just focus on code instead of managing DB. Review collected by and hosted on G2.com.

What do you dislike about iSecurity DB-Gate?

However good the solution is, it is not open source. It's developed and managed by IBM. as a profit-oriented company; it will impose some type of paywall. Other than that, It creates a vendor locking, due to which we're bound to IBM. Review collected by and hosted on G2.com.

There are not enough reviews of iSecurity DB-Gate for G2 to provide buying insight. Below are some alternatives with more reviews:

1
SAP SQL Anywhere Logo
SAP SQL Anywhere
4.1
(85)
SAP SQL Anywhere SQL database management software keeps data synchronized with thousands of mobile devices or remote offices, so that all business users can access vital data – anytime, anywhere.
2
Satori Data Security Platform Logo
Satori Data Security Platform
4.8
(74)
The Satori Data Security Platform is a highly-available and transparent proxy service that sits in front of your data stores (databases, data warehouses and data lakes).
3
Oracle Data Safe Logo
Oracle Data Safe
4.3
(63)
Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. Whether you’re using Oracle Autonomous Database or Oracle Database Cloud Service (Exadata, Virtual Machine, or Bare Metal), Data Safe delivers essential data security capabilities as a service on Oracle Cloud Infrastructure.
4
HashiCorp Vault Logo
HashiCorp Vault
4.3
(45)
HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach
5
Trellix Database Security Logo
Trellix Database Security
4.3
(33)
Maximum data security, minimal impact on hardware resources
6
IBM Guardium Data Detection and Response Logo
IBM Guardium Data Detection and Response
4.4
(32)
Enhance your visibility and protection, understand risk, and uncover hidden threats by centralizing data security and audit data
7
DBHawk Logo
DBHawk
4.9
(25)
DBHawk provides seamless access to heterogeneous database platforms. Its central database security, access control, and auditing capabilities allow companies to comply with regulations. Its many flexible customization features make the total value of ownership much higher than any other SQL Data Analytics/Business Intelligence tools in the market.
8
Oracle Audit Vault and Database Firewall Logo
Oracle Audit Vault and Database Firewall
4.4
(25)
Oracle Audit Vault and Database Firewall monitors Oracle and non-Oracle database traffic to detect and block threats, as well as improves compliance reporting by consolidating audit data from databases, operating systems, directories, and other sources.
9
SQL Secure Logo
SQL Secure
4.2
(21)
SQL Secure does not install any components, DLLs, scripts, stored procedures or tables on the SQL Server instances being monitored.
10
Oracle Data Masking and Subsetting Logo
Oracle Data Masking and Subsetting
4.5
(21)
Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data.
Show More
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

iSecurity DB-Gate