Best Web-Based Database Security Software of 2024

Find and compare the best Web-Based Database Security software in 2024

Use the comparison tool below to compare the top Web-Based Database Security software on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Satori Reviews
    See Software
    Learn More
    Satori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements.
  • 2
    ScaleGrid Reviews

    ScaleGrid

    ScaleGrid

    $8 per month
    3 Ratings
    ScaleGrid is a fully managed Database-as-a-Service (DBaaS) platform that helps you automate your time-consuming database administration tasks both in the cloud and on-premises. ScaleGrid makes it easy to provision, monitor, backup, and scale open-source databases. It offers advanced security, high availability, query analysis, and troubleshooting support to improve your deployments' performance. The following databases are supported: - MySQL - PostgreSQL - Redis™. - MongoDB®, database - Greenplum™ (coming soon) ScaleGrid supports both public and privately-owned clouds such as AWS, Azure and Google Cloud Platform (GCP), DigitalOcean and Linode, Oracle Cloud Infrastructure, (OCI), VMware, and OpenStack. ScaleGrid is used by thousands of developers, startups, as well as enterprise customers such as Accenture, Meteor and Atlassian. It handles all your database operations at any scale, so you can concentrate on your application performance.
  • 3
    BitNinja Reviews

    BitNinja

    BitNinja.com

    $10 per server
    BitNinja provides 3E Linux server protection for large hosting providers and small businesses equally. The three E stands for: effective, effortless, and enjoyable. Effective because of our unique Defense Network that uses the power of the Ninja Community. Every BitNinja-protected server worldwide shares attack information with each other, resulting in a more intelligent and stronger protection shield by every single assault. Effortless because it is fast and easy to install, so your server protection is up and running in no time. Enjoyable because you can take joy in the benefits of BitNinja, like the increased server capacity caused by the significant drop in the server load. Join our Defense Network for free today!
  • 4
    Immuta Reviews
    Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals.
  • 5
    MyDiamo Reviews

    MyDiamo

    Penta Security Systems Inc.

    MyDiamo was developed by Penta Security Systems (APAC leader in encryption technology) and is available to all for noncommercial use. Enterprises and organizations who require additional features can obtain a commercial license. Index searching is possible with column-level encryption or partial encryption - Minimal system performance changes guaranteed - Compatible with open-source DBMS such as MySQL, MariaDB and Percona - GDPR/PCI DSS/HIPAA compliant - Code modification is not required, it works parallel at the engine level
  • 6
    Privacy1 Reviews

    Privacy1

    Privacy1

    $159 per month
    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level
  • 7
    Monyog Reviews

    Monyog

    Webyog

    $199 one-time payment
    Agentless MySQL performance monitoring that is fully customizable allows you to optimize query performance real-time. Configuration management allows you to track all changes made to MySQL Global variables. You can track and compare the changes made to the configuration file, and pinpoint the cause of performance problems. You can monitor locked and running queries in real time. For queries that take longer than a certain amount of time to complete, you will receive notifications via mail, SNMP traps and Syslog. You can also configure Monyog to notify, kill, notify or notify and kill such queries. You don't need to learn new tools by using the same performance monitor tool for MySQL on-premise, on virtual and physical machines, in the private and public cloud on virtual machines and in the public cloud as managed databases.
  • 8
    DBHawk Reviews

    DBHawk

    Datasparc

    $99.00/month/user
    DBHawk enabled our customers to comply with GDPR and HIPAA, SOX and GLBA regulations. Self-Service BI & Adhoc Reporting Tool that allows you to set Data Access Policy, connect to multiple data sources, create powerful SQL charts, and dashboards. DBHawk SQL editor allows users to create, edit, and run SQL queries via a web-based interface. DBHawk Query Maker is compatible with all major databases, including Oracle, Microsoft SQL Server and PostgreSQL. A web-based central tool allows you to automate SQL tasks and batch jobs. Our all-in-one data platform provides secure access to SQL, NoSQL, and Cloud databases. Our customers trust us to protect their data and allow them to access it. Centralized Security, Auditing, and insights into your user's activities.
  • 9
    SecretHub Reviews

    SecretHub

    SecretHub

    $99 per month
    Unified secrets management platform for engineers that can be used by all levels of the stack - from intern to admin - will improve security across the stack. Security risks can be created by putting API keys and passwords in source code. However, they are complex to manage and make deployment difficult. Email, Git, and Slack are meant to share information, not keep secrets. When you deploy software multiple times per week, copy-pasting values and waiting for one admin to hold all the keys doesn't scale. Compliance audits can be difficult because it is impossible to track who accessed which secrets at what times. Replace plaintext values with a reference. This will eliminate secrets from source code. SecretHub will then load secrets into your app automatically when it starts. You can use the CLI to encrypt or store secrets, and then tell the code where to find it. Your code is now unencrypted and can be shared with your entire team.
  • 10
    JackDB Reviews

    JackDB

    JackDB

    $49 per user per month
    A fully interactive SQL editor allows you to create and execute queries. JackDB offers everything you need in a database client: syntax highlighting and code formatting as well as intelligent autocompletion. Snippets let you save and share your most important SQL queries. Simply create and save any query in JackDB and then share the snippet with your team. Everyone has access to the latest version of a snippet if anyone updates it. JackDB is committed to security. Roles are a convenient and secure way of limiting database access to authorized users, and granting new users access to data sources. You can view everything in your database, not just views and tables. View your schemas, indexes, and other system details like tablespaces or user sessions.
  • 11
    SAP SQL Anywhere Reviews

    SAP SQL Anywhere

    SAP

    $195 per license
    With relational database management systems (RDBMS), solutions from SAP SQL Anywhere, you can run your business from anywhere. Secure, reliable data management for servers without a DBA. Also, synchronization for thousands of mobile devices, IoT systems, and remote environments. Remote offices and mobile devices can receive critical business data for faster, more accurate decision-making. Mobile applications can be run reliably and efficiently even without the need for technical staff. This gives remote workers and mobile workers a seamless experience, even when they're not on-site. With built-in self-managing capabilities, users can streamline data maintenance tasks and resolve issues quickly and efficiently. Strong encryption features can help protect and secure your data even during data exchange and transmission.
  • 12
    IBM Security Guardium Insights Reviews
    Many cloud data sources have security controls that monitor only one source. This creates a fragmented view, which can put data privacy, security, compliance, and security at risk. Guardium Insights allows you to adapt and scale to multicloud environments. It centralizes data security, reduces compliance time, and understands risky user behavior across data sources in support of a zero trust approach. Built on containerized architecture, Guardium Insights is a lightweight-but-powerful platform that can flexibly deploy wherever an organization needs - aligning to data security goals without hindering business objectives in the cloud. Automated compliance audits and reporting can reduce the time spent on preparation and execution by 75%. 34% of organizations use at least two cloud sources. 11% use more cloud sources than two. Guardium Insights can be deployed in Kubernetes containers and scale to meet that growth.
  • 13
    DataSunrise Database Security Reviews
    High-performance database security software Data-Centric. Compliance with SOX and HIPAA, GDPR and PCI DSS, as well as other privacy laws and standards. Hybrid and Multicloud Database Security Proxy on AWS Azure, Google, and On-Prem Active protection, discovery, and auditing of sensitive and PII data. Data Auditing allows for real-time monitoring of user actions and data changes to ensure compliance and increased visibility. Database Firewall, role-based and location-aware Data Access Control & Protection. Protect corporate databases in the cloud and on-prem from hostile, negligent actions. Secures sensitive data in testing and development environments; Encryption completely eliminates the possibility of reverse engineering the masked data. Production data can be hidden using real-time location and role-based data masking. Protects sensitive privacy data from being exposed even if production data is not physically altered.
  • 14
    Scuba Database Vulnerability Scanner Reviews
    Scuba Database Vulnerability Scanner. Scuba is a free tool that reveals hidden security risks. Check enterprise databases for potential vulnerabilities and misconfigurations. Know the risks to your database. Get advice on how to address identified issues. Scuba is available for Windows, Mac and Linux (x32) and Linux (x64). It offers over 2,300 assessment tests for Oracle and Microsoft SQL, SAP Sybase and IBM DB2 as well as MySQL. Scuba scans enterprise databases for security flaws and configuration flaws. It is free and allows you to identify potential security risks. It contains more than 2,300 assessments for Oracle, Microsoft SQL Server and SAP Sybase. Scuba scans can be performed from any Windows, Mac, or Linux client. A typical Scuba scan takes between 2 and 3 minutes depending on the size of your database, users, groups, and network connection. There are no other requirements or pre-installation.
  • 15
    Trustwave DbProtect Reviews
    This database security platform is highly scalable and can be used to protect relational databases and big data stores on premises or in the cloud. It features a distributed architecture and enterprise level analytics. Cybercriminals are always looking for ways to gain access to sensitive and proprietary data in order to make databases a lucrative target. Trustwave DbProtect can help your business overcome resource limitations and uncover database configuration errors, access control problems, missing patches, or other weaknesses that could cause data leakage, misuse, and other serious consequences. A single, intuitive dashboard provides a real-time overview of all database assets, vulnerabilities and risk levels, user privileges, anomalies, incidents, and other information. You can detect, alert, and correct suspicious activities, intrusions, and policy violations.
  • 16
    AppDetectivePRO Reviews
    A database and big-data scanner that identifies configuration errors, access control and identification issues, missing patches, and any other toxic combination of settings that could result in data loss or DDoS attacks. Cybercriminals are attracted to databases as they are valuable repositories for customer information and intellectual property. Trustwave AppDetectivePRO allows you to quickly assess, report and evaluate the security, risk, or compliance status of any database or big-data store in your environment, whether it is on premises or in cloud. AppDetectivePRO scans big data and databases for configuration errors, access control and identification issues, missing patches and any other toxic combination of settings that could result in data leakage, denial of service (DoS), unauthorized modification or escalation in privilege attacks.
  • 17
    Oracle Data Masking and Subsetting Reviews
    Due to increasing security threats and expanding privacy regulations, it is imperative to limit the exposure of sensitive data. Oracle Data Masking and Subsetting allows database customers to improve security, speed compliance, and lower IT costs. It sanitizes production data for testing, development, and any other activities and easily eliminates unnecessary data. Oracle Data Masking and Subsetting allows for entire copies or subsets to be extracted from the database and obfuscated. This data can then be shared with business partners. Assuring continuity of applications, the integrity of the database is maintained. Application Data Modeling automatically detects columns in Oracle Database tables that contain sensitive information using built-in discovery patterns like national identifiers, credit cards numbers, or other personally identifiable information. It automatically detects parent-child relationships in the database.
  • 18
    Imperva Database Security Reviews
    Imperva provides analytics, protection, and response across all data assets, both on-premise as well as in the cloud. This gives you the visibility to identify risk and prevent data breaches and comply with compliance. For quick, continuous compliance, and risk management, Imperva provides pre-configured, extensible templates, policies and reports that can be used "out-of the box". This is without any manual/DIY work. A single pane of glass that can be used across multiple environments (on-premise, in the cloud, multi-cloud) to locate ungoverned databases, classify data and assess vulnerabilities, and investigate user activities. Automate response procedures and detect both insider and outsider threats. Consolidate your reporting operations and enjoy cost-effective multi-year retention for audit and forensic records. Imperva Database Security combines governance across hybrid cloud and on-premise environments and presents it all in one view.
  • 19
    IBM Security Guardium Data Encryption Reviews
    This suite of integrated encryption products will help you comply with industry regulations and protect your file and database data. IBM Security Guardium Data Encryption is an integrated suite of products that are built on a common infrastructure. These highly-scalable solutions offer encryption, tokenization and data masking capabilities. They also have key management capabilities. This allows you to protect and control access to files, databases, and containers in the hybrid multicloud-securing environments that include on-premise, cloud, virtual, big-data, and on-premise assets. Organizations can comply with industry and government regulations by securely encrypting file or database data using such functionalities like tokenization, key rotation, data masking, and data masking. Guardium Data Encryption's capabilities, such as data access audit logging and tokenization, key management, data masking, data masking, and data masking, help meet regulations like HIPAA, CCPA, or GDPR.
  • 20
    Oracle Advanced Security Reviews
    Oracle Advanced Security can be used to encrypt application tablespaces and prevent out-of band access to sensitive data. Redaction policies help to prevent sensitive data from being spread and ensure compliance with data protection regulations. Transparent Data Encryption prevents potential attackers from bypassing the database to read sensitive information directly from storage. This is done by enforcing data at rest encryption in the database layer. To protect sensitive data, you can encrypt individual data columns, entire tablesspaces, backups, and database exports. Data Redaction is an extension of TDE. It reduces the risk of data being exposed in applications by redacting sensitive information before it leaves the database. Redaction can be partial or complete to prevent large-scale extraction of sensitive information into spreadsheets and reports. Encryption is implemented at database kernel level, eliminating any need to make changes to applications.
  • 21
    BladeLogic Database Automation Reviews
    BladeLogic Database Automation, a multi-platform database automation system, allows database administrators to deploy, patch and update databases in a fraction of the usual time. Administrators have more time to support new app rollouts. Innovative applications are dependent on efficient databases in today's digital economy. Database administrators are skilled and spend most of their time making sure that existing environments are secure, compliant, maintained, and updated. Security threats look for vulnerabilities at the database level. This puts more pressure on IT staff to stay current with patches and comply with compliance policies. IT has little time to improve database configurations, queries, or release new features for applications.
  • 22
    Huawei Database Security Service (DBSS) Reviews
    Database Security Service (DBSS), which uses machine learning and big-data technologies, protects your cloud databases by intelligently auditing them and detecting suspicious behavior like SQL injection. DBSS is easy to install and use. DBSS is compliant with the HIPAA and SOX regulations, which will meet your auditing needs. Use algorithm models to quickly and accurately detect SQL injections and other abnormal behavior. DBSS works in bypass mode and has no impact on your business. There are many policies that can be used to detect SQL injection and audit the database behavior. Monitor databases to detect anomalies in performance, data, or user actions. Audit reports can be customized for different scenarios (preventive and post-event) as well as roles (common users, administrators). To comply with regulations and laws, perform a comprehensive database audit.
  • 23
    Adabas & Natural Reviews
    You need a forward-thinking partner who has a vision in an age of fast change. Someone who can help you bring your Adabas & Natural applications into the future. Adabas & Natural has been there for you for decades. You can look forward to a future in which you can make the most of your investment and the unique business logic embedded into your core applications. We are that partner, dedicated to helping you digitalize the legacy of your family, quickly and without risk. Let's work together to manage the generational change in developers, modernize applications to reduce costs, increase the reach of core apps, and accelerate the development process in a highly-modern environment. You can rely on Adabas & Natural technologies for rapid and secure IT optimization and modernization of your applications. Connect to APIs to connect to new services. Adabas & Natural can be run in the cloud. DevOps can help you attract new developers talent. Reduce costs by delegating mainframe workloads to zIIP.
  • 24
    Assure Security Reviews
    Assure Compliance Monitoring is a bundle that includes Assure Security features. They can be used together to quickly identify security and compliance problems by producing alerts, reports, and reports on IBM system activity, database changes, and views of Db2 information. Two features are also included in the bundle, which can be purchased separately. Assure Monitoring & Reporting seamlessly extracts insights directly from IBM i journal data, and generates alerts and reports about security incidents and compliance deviations. You can use the system and database monitoring capabilities separately or together. You can also send data directly to your enterprise SIEM software, allowing IBM security to be monitored on all enterprise platforms. Assure Db2 Security Monitor is an innovative solution that monitors Db2 data views and blocks records. Assure Security offers market-leading IBM i security capabilities that will help you and your organization comply with cybersecurity regulations.
  • 25
    Voltage SecureData Reviews
    Secure sensitive data wherever it flows - on premises, in the cloud and in big data analytics platforms. Voltage encryption provides data privacy protection and neutralizes data breaches. It also drives business value through secure data usage. Data protection builds customer trust, and enables compliance with global regulations such as GDPR, CCPA and HIPAA. Privacy regulations recommend anonymization, pseudonymization and encryption to protect personal data. Voltage SecureData allows enterprises to de-identify structured data and supports the use of data within its protected state to safely drive business value. Secure data flows through your enterprise without gaps, encryption, or overhead. SecureData supports a wide range of platforms and encrypts data using any language. Structured Data Manager integrates SecureData to allow businesses to easily and continuously protect data all through its lifecycle, from discovery through encryption.
  • Previous
  • You're on page 1
  • 2
  • Next