(13)
4.8 out of 5
Visit Website
Sponsored
Sensitive Fields | As reported in 11 Oracle Data Safe reviews. The ability to create fields that automatically mask data such as credit card numbers or passwords. | 91% (Based on 11 reviews) | |
Dynamic Masking | The ability to mask data in real time as it is entered. This feature was mentioned in 11 Oracle Data Safe reviews. | 86% (Based on 11 reviews) | |
Static Masking | As reported in 11 Oracle Data Safe reviews. The ability to apply or remove masking after data has been entered. | 85% (Based on 11 reviews) | |
Consistent Masking | As reported in 11 Oracle Data Safe reviews. Tools to mask data using a consistent ruleset. | 85% (Based on 11 reviews) | |
Random Masking | Tools to mask data using random characters and data. This feature was mentioned in 10 Oracle Data Safe reviews. | 85% (Based on 10 reviews) |
Supported Databases | As reported in 17 Oracle Data Safe reviews. Supports different database platforms and data types. Typically integrates with a variety of existing databases. | 88% (Based on 17 reviews) | |
Data Management | Based on 17 Oracle Data Safe reviews. Administrators can access and organize data related to incidents to produce reports or make data more navigable. | 84% (Based on 17 reviews) | |
Logging and Reporting | As reported in 16 Oracle Data Safe reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing. | 83% (Based on 16 reviews) | |
API / integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. This feature was mentioned in 16 Oracle Data Safe reviews. | 85% (Based on 16 reviews) |
Compliance | Based on 16 Oracle Data Safe reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 88% (Based on 16 reviews) | |
Access Management | Allows administrators to set user access privileges to permit approved parties to access sensitive data. This feature was mentioned in 17 Oracle Data Safe reviews. | 84% (Based on 17 reviews) | |
Multi-Factor Authentication | Requires a second level of authentication, such as sms messaging or customized tokens, to access data. This feature was mentioned in 17 Oracle Data Safe reviews. | 86% (Based on 17 reviews) |
Database Activity Monitoring | As reported in 17 Oracle Data Safe reviews. Documents the actions related to the database. Alerts users of incidents and abnormal activities and documents the access point. | 87% (Based on 17 reviews) | |
Firewall | As reported in 15 Oracle Data Safe reviews. Protects database and sensitive information from a variety of attacks and malware threats. | 84% (Based on 15 reviews) | |
Data Masking | Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. This feature was mentioned in 17 Oracle Data Safe reviews. | 91% (Based on 17 reviews) | |
Audits | As reported in 16 Oracle Data Safe reviews. Perform ad-hoc or ongoing IT audits at different levels of the company. | 88% (Based on 16 reviews) |
Structure type | Searches structured, semi-structured, and unstructured data for sensitive data. | Not enough data | |
Contextual search | Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata. | Not enough data | |
Template algorithms | Has template rules and pattern matching algorithms (PII, PCI, PHI and more) | Not enough data | |
Custom algorithms | Offers the option to create custom templates and rules based on department, user type and data type. | Not enough data | |
False-positive management | Offers false-positive management functions | Not enough data | |
Multiple file and location types | Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.) | Not enough data | |
Real-time monitoring | Monitors data stores in real-time searching for newly created sensitive data. | Not enough data | |
Dashboard | Offers a dashboard showing specific location of sensitive data. | Not enough data | |
Compliance | Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others. | Not enough data | |
Reporting | Offers reporting functionality. | Not enough data |
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Multi-step Planning | Ability to break down and plan multi-step processes | Not enough data | |
Cross-system Integration | Works across multiple software systems or databases | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data |