SAP ASE in Cyber Security Domain.
Use Cases and Deployment Scope
We use SAP ASE to run in-house built-in applications related to cybersecurity. We use it to monitor the DBMS-related vulnerabilities. We store, process, and manage a large amount of product-related data and query statements, alert management, and security threat mechanisms. This helps us to efficiently handle a large number of SQL statements and generate alerts in case of any security vulnerability by generating alerts to the DBA and other users for the DB.
Pros
- Handle large amount of data.
- Highly secure database.
- High throughput, i.e., transactions per second, is on the higher side compared to other similar DBMS.
- Minimal cost of handling compared to other vendors.
- Less DBA intervention is needed.
Cons
- More frequent patch and feature updates are required.
- Very less DBA resources available.
- A lot of dependencies in setting up setup for the SAP ASE DBMS.
- Supported OS platforms can be increased.
Return on Investment
- Licensing cost is significantly less compared to peer vendors.
- Better performance in a scaled and cybersecurity-specific environment.
- Significantly fewer CVEs for the database.
- Need to spend a significant amount of time in training and development.
Usability
Alternatives Considered
Oracle Database, SAP HANA Cloud and PostgreSQL
Other Software Used
Jenkins, IntelliJ IDEA, Apache JMeter, Atlassian Jira, Atlassian Confluence, Eclipse, Google Gemini, ChatGPT, GitHub, Microsoft Visual Studio Code


