SAP ASE in Cyber Security Domain.
Rating: 8 out of 10
IncentivizedUse Cases and Deployment Scope
We use SAP ASE to run in-house built-in applications related to cybersecurity. We use it to monitor the DBMS-related vulnerabilities. We store, process, and manage a large amount of product-related data and query statements, alert management, and security threat mechanisms. This helps us to efficiently handle a large number of SQL statements and generate alerts in case of any security vulnerability by generating alerts to the DBA and other users for the DB.
Pros
- Handle large amount of data.
- Highly secure database.
- High throughput, i.e., transactions per second, is on the higher side compared to other similar DBMS.
- Minimal cost of handling compared to other vendors.
- Less DBA intervention is needed.
Cons
- More frequent patch and feature updates are required.
- Very less DBA resources available.
- A lot of dependencies in setting up setup for the SAP ASE DBMS.
- Supported OS platforms can be increased.
Likelihood to Recommend
We use this for an inbuilt security management system, where it performs well in a scaled setup with a large volume of live data with high availability. Also, the performance is up to the mark for the large statement flow. From a DBA perspective, a lot of parameters need to be fine-tuned for the specific environment needs, which can cause overhead. Expertise is limited, and the learning curve is steep for the SAP ASE.