(13)
4.8 out of 5
Visit Website
Sponsored
Supported Databases | Supports different database platforms and data types. Typically integrates with a variety of existing databases. This feature was mentioned in 14 Trellix Database Security reviews. | 88% (Based on 14 reviews) | |
Data Management | Based on 14 Trellix Database Security reviews. Administrators can access and organize data related to incidents to produce reports or make data more navigable. | 87% (Based on 14 reviews) | |
Logging and Reporting | As reported in 13 Trellix Database Security reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing. | 81% (Based on 13 reviews) | |
API / integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data | |
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. This feature was mentioned in 10 Trellix Database Security reviews. | 83% (Based on 10 reviews) | |
Administration Console - | Based on 11 Trellix Database Security reviews. Provides a centralized console for administation tasks and unified control. | 82% (Based on 11 reviews) | |
API / integrations | As reported in 10 Trellix Database Security reviews. Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | 80% (Based on 10 reviews) |
Compliance | Based on 12 Trellix Database Security reviews. Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | 90% (Based on 12 reviews) | |
Access Management | Allows administrators to set user access privileges to permit approved parties to access sensitive data. This feature was mentioned in 15 Trellix Database Security reviews. | 86% (Based on 15 reviews) | |
Multi-Factor Authentication | Based on 12 Trellix Database Security reviews. Requires a second level of authentication, such as sms messaging or customized tokens, to access data. | 92% (Based on 12 reviews) |
Database Activity Monitoring | Documents the actions related to the database. Alerts users of incidents and abnormal activities and documents the access point. This feature was mentioned in 16 Trellix Database Security reviews. | 89% (Based on 16 reviews) | |
Firewall | Protects database and sensitive information from a variety of attacks and malware threats. This feature was mentioned in 16 Trellix Database Security reviews. | 85% (Based on 16 reviews) | |
Data Masking | Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. 13 reviewers of Trellix Database Security have provided feedback on this feature. | 87% (Based on 13 reviews) | |
Audits | Perform ad-hoc or ongoing IT audits at different levels of the company. This feature was mentioned in 11 Trellix Database Security reviews. | 85% (Based on 11 reviews) |
Intrusion Prevention | Enforces security paramaters to prevent unauthorized access. 11 reviewers of Trellix Database Security have provided feedback on this feature. | 86% (Based on 11 reviews) | |
Firewall | Based on 11 Trellix Database Security reviews. Protects servers, data center infrastructure and information from a variety of attacks and malware threats. | 79% (Based on 11 reviews) | |
Encryption | Provide some level of encryption of information, protecting sensitive data while it exists within the data center. 11 reviewers of Trellix Database Security have provided feedback on this feature. | 83% (Based on 11 reviews) | |
Security hardening | As reported in 12 Trellix Database Security reviews. Facilitates system and network security by identifying and remediating vulnerabilities | 81% (Based on 12 reviews) | |
Cloud Data Protection | Provides high quality and wide scope of in-cloud and offline data security capabilities. This feature was mentioned in 11 Trellix Database Security reviews. | 91% (Based on 11 reviews) |
Intrusion Detection | Detects unauthorized access and use of privileged systems. This feature was mentioned in 11 Trellix Database Security reviews. | 83% (Based on 11 reviews) | |
Security Monitoring | Detects anomalies in functionality, user accessibility, traffic flows, and tampering. This feature was mentioned in 12 Trellix Database Security reviews. | 86% (Based on 12 reviews) | |
Anti-Malware / Malware Detection | As reported in 11 Trellix Database Security reviews. Provides multiple techniques and information sources to alert users of malware occurrences. | 83% (Based on 11 reviews) |
Structure type | Searches structured, semi-structured, and unstructured data for sensitive data. | Not enough data | |
Contextual search | Offers contextual search functions to understand factors such as file type, sensitivity, user type, location, and other metadata. | Not enough data | |
Template algorithms | Has template rules and pattern matching algorithms (PII, PCI, PHI and more) | Not enough data | |
Custom algorithms | Offers the option to create custom templates and rules based on department, user type and data type. | Not enough data | |
False-positive management | Offers false-positive management functions | Not enough data | |
Multiple file and location types | Search multiple file types (images, PDFs, etc.) and repository locations (such as on-premise databases, cloud storage, email servers, websites, etc.) | Not enough data | |
Real-time monitoring | Monitors data stores in real-time searching for newly created sensitive data. | Not enough data | |
Dashboard | Offers a dashboard showing specific location of sensitive data. | Not enough data | |
Compliance | Facilitates compliance and enables adherence to common industry regulatory standards such as GDPR, CCPA, HIPAA, PCI DSS, ISO, and others. | Not enough data | |
Reporting | Offers reporting functionality. | Not enough data |
Autonomous Task Execution | Capability to perform complex tasks without constant human input | Not enough data | |
Multi-step Planning | Ability to break down and plan multi-step processes | Not enough data | |
Cross-system Integration | Works across multiple software systems or databases | Not enough data | |
Proactive Assistance | Anticipates needs and offers suggestions without prompting | Not enough data |