Database Security10Database security tools perform vulnerability assessments, monitors database access and activity to detect intrusion, and attempts to prevent threats and block malicious or unauthorized behavior that may lead to data loss.Sophos Intercept X for Server1https://media.trustradius.com/vendor-logos/aW/xM/0AFACIEHNKRT-180x180.JPEGIBM Security Guardium2https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGOracle Audit Vault and Database Firewall3https://media.trustradius.com/vendor-logos/e7/6G/F3JK0T3RS775-180x180.PNGDbProtect4https://media.trustradius.com/vendor-logos/2A/tk/VKTU2N003FWJ-180x180.jpgTrend Micro ServerProtect5https://media.trustradius.com/vendor-logos/ad/Vt/9I9JZSMX7IHN-180x180.PNGImperva Data Security (formerly SecureSphere for Data)6https://media.trustradius.com/vendor-logos/Ju/3f/ZODO0FS3XXK4-180x180.JPEGMcAfee Data Center Security Suite7https://media.trustradius.com/vendor-logos/eB/ri/277N5FG3B8SN-180x180.JPEGDBrow - Smart Database Browser8https://media.trustradius.com/product-logos/9l/XU/LLQ69BT1EFT9-180x180.PNGSQL Secure9https://media.trustradius.com/vendor-logos/G3/xv/51QZUTGT5N57-180x180.JPEGIDM36510https://media.trustradius.com/product-logos/GE/e4/ALA48SMQT1BV-180x180.JPEGVoltage SecureData (formerly HP Data Security Voltage)11https://media.trustradius.com/vendor-logos/Zi/ju/TCH0JRTW622Q-180x180.JPEGDataSunrise Database & Data Security12https://media.trustradius.com/product-logos/Er/Lg/4LMEDF6L9EXG-180x180.JPEGIBM Security zSecure13https://media.trustradius.com/vendor-logos/yf/sf/DNSXTG99HOK3-180x180.JPEGKaspersky Security for Storage14https://media.trustradius.com/vendor-logos/RZ/RK/QTA0JQCKJP1L-180x180.JPEGKogni15https://media.trustradius.com/product-logos/oC/3S/3ITEUTS9ITPB-180x180.JPEGCisco Tetration16https://media.trustradius.com/vendor-logos/KP/BJ/EKH5RFTLCO4X-180x180.PNGD'Amo17https://media.trustradius.com/vendor-logos/7Z/6f/ZQ1E0V2N5C5A-180x180.JPEGdbWatch18https://media.trustradius.com/product-logos/jy/wW/VHQJN6C8CRRS-180x180.PNGSyncsort Assure Security19https://media.trustradius.com/vendor-logos/t5/RQ/3OV1XOV53NUX-180x180.JPEGBMC Automated Mainframe Intelligence (AMI)20https://media.trustradius.com/vendor-logos/I8/AI/M1BJKI1M3C52-180x180.PNGUnbound Key Control21https://media.trustradius.com/product-logos/Q9/wx/J72W04QJW0WB-180x180.JPEGFortiDB22https://media.trustradius.com/vendor-logos/MZ/NA/I0WLZ36A46RB-180x180.JPEGSymantec Data Center Security23https://media.trustradius.com/product-logos/fW/iK/20F9GV2JWLVG-180x180.PNG

Database Security Tools

Database Security Tools Overview

What are Database Security Tools?

In theory, databases are already protected against malicious activity by firewalls and intrusion detection systems. However, databases require their own protection as networks have been opened up to the Internet.

In broad terms, unauthorized access to a database compromises potential loss of data confidentiality, integrity and availability. Since corporate databases frequently contain valuable client data and other sensitive information, protecting databases from malicious intent is often a high priority.

Some of the ways in which database security tools do this:
  • Access control to prevent unauthorized access by implementing multifactor access and other data management controls
  • Physical security of database and servers from theft and natural disasters
  • Monitoring system for vulnerabilities and compiling a plan to mitigate them

Database Security Products

Listings (1-23 of 23)

We don't have enough ratings and reviews to provide an overall score.

DBrow is a web based database portal that can be used to query, view, and share data in the business user’s relational databases on RDS. There is no need to connect to the databases from user desktops, as cloud database endpoints can be secured further. Individual records and query responses can be…

We don't have enough ratings and reviews to provide an overall score.

SQL Secure from Idera Software in Houston, Texas is a database security offering.

We don't have enough ratings and reviews to provide an overall score.

IDM365 is a hybrid between RBAC and ABAC and is a unique identity and access management solution that is designed to make managing systems and governing users simple and cost-effective. To do this, automated tools are used to clean up and organize existing users and roles before taking over the task…

We don't have enough ratings and reviews to provide an overall score.

DataSunrise Database & Data Security is a cross-platform, high-performance software. DataSunrise delivers Real-Time Database Security and Compliance, in Clouds solutions such as Microsoft Azure, Amazon AWS, Google Cloud. It is also available on-premise.DataSunrise secures databases such as MS SQ…

We don't have enough ratings and reviews to provide an overall score.

IBM Security offers the zSecure suite of mainframe security applications for intrusion and threat detection and prevention, system management facility (SMF) audit, audit analysis and reporting, and other related applications.

We don't have enough ratings and reviews to provide an overall score.

Kogni continuously discovers, classifies and protects sensitive data across organizations regardless of source or location of data. The vendor states that Kogni's use of AI & machine learning capabilities mitigates the possibility of data breaches with near-perfect detection capabilities for eve…

We don't have enough ratings and reviews to provide an overall score.

The Cisco Tetration Analytics platform offers holistic workload protection for multicloud data centers by enabling a zero-trust model using segmentation. This approach allows you to identify security incidents faster, contain lateral movement, and reduce your attack surface. Tetration's infrastructu…

We don't have enough ratings and reviews to provide an overall score.

Korean company Penta Security offers the D'Amo suite of database security products.

We don't have enough ratings and reviews to provide an overall score.

According to the vendor, dbWatch is a complete and scalable database monitoring solution, helping enterprises monitor and manage any number of SQLServer and Oracle database servers efficiently. dbWatch also supports Azure, MySQL, PostgreSQL and Sybase. The vendor promises that dbWatch will give comp…

We don't have enough ratings and reviews to provide an overall score.

Syncsort offers Assure Security a complete IBM i security solution that includes features that assess risks, monitor for compliance, ensure data privacy and control access to your systems and data.

We don't have enough ratings and reviews to provide an overall score.

Unbound Key Control (UKC) is a unified key manager and virtual HSM which provides full key lifecycle management across on-premise data centers and multiple cloud environments. This pure-software solution manages all keys from all on-premises or cloud workloads and from any cloud service provider (CS…

We don't have enough ratings and reviews to provide an overall score.

FortiDB from Fortinet in San Francisco is a database security option.

Docker containers make it easy to develop, deploy, and deliver applications where containers can be deployed and brought down in a matter of seconds. This flexibility makes it very useful for DevOps to automate deployment of containers. Symantec Data Center Security: Server Advanced provides agent-l…