Best Trustwave DbProtect Alternatives in 2024
Find the top alternatives to Trustwave DbProtect currently available. Compare ratings, reviews, pricing, and features of Trustwave DbProtect alternatives in 2024. Slashdot lists the best Trustwave DbProtect alternatives on the market that offer competing products that are similar to Trustwave DbProtect. Sort through Trustwave DbProtect alternatives below to make the best choice for your needs
-
1
Satori
Satori
86 RatingsSatori is a Data Security Platform (DSP) that enables self-service data and analytics for data-driven companies. With Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. That means your data consumers get data access in seconds instead of weeks. Satori’s DSP dynamically applies the appropriate security and access policies, reducing manual data engineering work. Satori’s DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously classifies sensitive data in all your data stores (databases, data lakes, and data warehouses), and dynamically tracks data usage while applying relevant security policies. Satori enables your data use to scale across the company while meeting all data security and compliance requirements. -
2
ScaleGrid is a fully managed Database-as-a-Service (DBaaS) platform that helps you automate your time-consuming database administration tasks both in the cloud and on-premises. ScaleGrid makes it easy to provision, monitor, backup, and scale open-source databases. It offers advanced security, high availability, query analysis, and troubleshooting support to improve your deployments' performance. The following databases are supported: - MySQL - PostgreSQL - Redis™. - MongoDB®, database - Greenplum™ (coming soon) ScaleGrid supports both public and privately-owned clouds such as AWS, Azure and Google Cloud Platform (GCP), DigitalOcean and Linode, Oracle Cloud Infrastructure, (OCI), VMware, and OpenStack. ScaleGrid is used by thousands of developers, startups, as well as enterprise customers such as Accenture, Meteor and Atlassian. It handles all your database operations at any scale, so you can concentrate on your application performance.
-
3
Immuta
Immuta
Immuta's Data Access Platform is built to give data teams secure yet streamlined access to data. Every organization is grappling with complex data policies as rules and regulations around that data are ever-changing and increasing in number. Immuta empowers data teams by automating the discovery and classification of new and existing data to speed time to value; orchestrating the enforcement of data policies through Policy-as-code (PaC), data masking, and Privacy Enhancing Technologies (PETs) so that any technical or business owner can manage and keep it secure; and monitoring/auditing user and policy activity/history and how data is accessed through automation to ensure provable compliance. Immuta integrates with all of the leading cloud data platforms, including Snowflake, Databricks, Starburst, Trino, Amazon Redshift, Google BigQuery, and Azure Synapse. Our platform is able to transparently secure data access without impacting performance. With Immuta, data teams are able to speed up data access by 100x, decrease the number of policies required by 75x, and achieve provable compliance goals. -
4
IBM Guardium Vulnerability Assessment scans your data infrastructures to detect vulnerabilities. It also suggests remedial actions. The solution identifies vulnerabilities such as missing patches and weak passwords. It also identifies unauthorized changes, misconfigured privileges, and unauthorized changes. The full reports and suggestions to fix all vulnerabilities are provided. Guardium Vulnerability Assessment detects behavior vulnerabilities such as account-sharing, excessive administrative logins, and unusual after hours activity. It identifies security gaps and threats in databases that hackers could exploit. Discover and classify sensitive information in heterogeneous environment. View detailed reports on entitlements and configurations that are risky. Automate compliance audits, exception management and exception management.
-
5
AppDetectivePRO
Trustwave
A database and big-data scanner that identifies configuration errors, access control and identification issues, missing patches, and any other toxic combination of settings that could result in data loss or DDoS attacks. Cybercriminals are attracted to databases as they are valuable repositories for customer information and intellectual property. Trustwave AppDetectivePRO allows you to quickly assess, report and evaluate the security, risk, or compliance status of any database or big-data store in your environment, whether it is on premises or in cloud. AppDetectivePRO scans big data and databases for configuration errors, access control and identification issues, missing patches and any other toxic combination of settings that could result in data leakage, denial of service (DoS), unauthorized modification or escalation in privilege attacks. -
6
Scuba Database Vulnerability Scanner. Scuba is a free tool that reveals hidden security risks. Check enterprise databases for potential vulnerabilities and misconfigurations. Know the risks to your database. Get advice on how to address identified issues. Scuba is available for Windows, Mac and Linux (x32) and Linux (x64). It offers over 2,300 assessment tests for Oracle and Microsoft SQL, SAP Sybase and IBM DB2 as well as MySQL. Scuba scans enterprise databases for security flaws and configuration flaws. It is free and allows you to identify potential security risks. It contains more than 2,300 assessments for Oracle, Microsoft SQL Server and SAP Sybase. Scuba scans can be performed from any Windows, Mac, or Linux client. A typical Scuba scan takes between 2 and 3 minutes depending on the size of your database, users, groups, and network connection. There are no other requirements or pre-installation.
-
7
Trellix Database Security
Trellix
Trellix Database Security protects sensitive data in databases against accidental leakage or intentional exposure, while maintaining security, optimizing performance and managing access. Discover sensitive and proprietary data in databases. Blocking unauthorized access to sensitive information will improve regulatory compliance. Address vulnerabilities quickly and with minimal downtime. Monitor, log and control database access in addition to identifying potential threats and blocking them before they can cause damage. Automated scans are performed to identify supported databases and sensitive data contained within them. Receive detailed remediation advice. Protect databases against known and unknown vulnerabilities, without any downtime. Stop intrusions, exploits and other threats before they affect your environment. -
8
Imperva Database Security
Imperva
2 RatingsImperva provides analytics, protection, and response across all data assets, both on-premise as well as in the cloud. This gives you the visibility to identify risk and prevent data breaches and comply with compliance. For quick, continuous compliance, and risk management, Imperva provides pre-configured, extensible templates, policies and reports that can be used "out-of the box". This is without any manual/DIY work. A single pane of glass that can be used across multiple environments (on-premise, in the cloud, multi-cloud) to locate ungoverned databases, classify data and assess vulnerabilities, and investigate user activities. Automate response procedures and detect both insider and outsider threats. Consolidate your reporting operations and enjoy cost-effective multi-year retention for audit and forensic records. Imperva Database Security combines governance across hybrid cloud and on-premise environments and presents it all in one view. -
9
BladeLogic Database Automation
BMC Software
BladeLogic Database Automation, a multi-platform database automation system, allows database administrators to deploy, patch and update databases in a fraction of the usual time. Administrators have more time to support new app rollouts. Innovative applications are dependent on efficient databases in today's digital economy. Database administrators are skilled and spend most of their time making sure that existing environments are secure, compliant, maintained, and updated. Security threats look for vulnerabilities at the database level. This puts more pressure on IT staff to stay current with patches and comply with compliance policies. IT has little time to improve database configurations, queries, or release new features for applications. -
10
This suite of integrated encryption tools will help you protect your database and file data from misuse, and comply with government and industry regulations. IBM Guardium Data Encryption is an integrated suite of products based on a common architecture. These highly-scalable products provide encryption, tokenization and data masking capabilities, as well as key management, to help protect and manage access to databases, containers and files across the hybrid multicloud, securing assets in cloud, virtual, Big Data and on-premise environments. By encrypting database and file data using features such as data masking, tokenization and key rotation, organizations can ensure compliance with industry and government regulations, such as GDPR, CCPA and PCI DSS. Guardium Data Encryption features, such as data access audit logging and tokenization, data masking, and key management, help organizations meet regulations like HIPAA, CCPA, or GDPR.
-
11
Assure Security
Precisely
Assure Compliance Monitoring is a bundle that includes Assure Security features. They can be used together to quickly identify security and compliance problems by producing alerts, reports, and reports on IBM system activity, database changes, and views of Db2 information. Two features are also included in the bundle, which can be purchased separately. Assure Monitoring & Reporting seamlessly extracts insights directly from IBM i journal data, and generates alerts and reports about security incidents and compliance deviations. You can use the system and database monitoring capabilities separately or together. You can also send data directly to your enterprise SIEM software, allowing IBM security to be monitored on all enterprise platforms. Assure Db2 Security Monitor is an innovative solution that monitors Db2 data views and blocks records. Assure Security offers market-leading IBM i security capabilities that will help you and your organization comply with cybersecurity regulations. -
12
Huawei Database Security Service (DBSS)
Huawei Cloud
Database Security Service (DBSS), which uses machine learning and big-data technologies, protects your cloud databases by intelligently auditing them and detecting suspicious behavior like SQL injection. DBSS is easy to install and use. DBSS is compliant with the HIPAA and SOX regulations, which will meet your auditing needs. Use algorithm models to quickly and accurately detect SQL injections and other abnormal behavior. DBSS works in bypass mode and has no impact on your business. There are many policies that can be used to detect SQL injection and audit the database behavior. Monitor databases to detect anomalies in performance, data, or user actions. Audit reports can be customized for different scenarios (preventive and post-event) as well as roles (common users, administrators). To comply with regulations and laws, perform a comprehensive database audit. -
13
Omega DB Security Reporter
DATAPLUS
$899 USDOmega DB Security Reporter is a security auditing, software-only, and out-of-box solution for Oracle databases. It implements quick reporting, visualization and documentation of the security posture of the Oracle database and addresses the internal and external security compliance requirements. Omega DB Security Reporter provides detailed, integrated, categorized and evaluated assessment of the Oracle Database, enabling the security personnel to dispense with this complex task in a few minutes. Compliance Performs any SQL assessable control of Oracle security checklists CIS and STIG-DISA. Features compliance reports for Overall Security and advanced Reports. Addresses requirements of IT Security Frameworks and Standards, like: ISO 27001/2, ISACA, PCI-DSS, HIPAA Privileges: for system, objects, and roles Audits: on system privileges, user statements, audited system actions, object privileges and operations audits Others: User password profile resources Initialization (security) parameters The inter-relations of Oracle security are presented to user in flexible application forms and assessed items visualized by user-friendly data-aware components. Reports Comparison of type Target vs Baseline -
14
Randtronics DPM Database Manager
Randtronics
Randtronics DPM Database Manager protects column-level data in a database. This software can do this without requiring any changes to the application code. It is completely transparent to both database users and applications. DPM Database Manager can protect data on Oracle, Microsoft SQL Server, and IBM DB for iSeries database. DPM Token Manager can integrate with DPM Database Manager to tokenise or mask data. Rules are flexible and can be applied to any application or user. The software will protect sensitive data from database admins (DBAs). All rules can dynamically be modified using the console and applied to the data immediately. No application level code changes are required to mask column-level data. Integrating with DPM Token Manager allows for tokenization of column-level data. -
15
The Database Access Controller from Delinea allows enterprises to adopt cloud databases from AWS and Google, Azure, Oracle and Redis while still enforcing appropriate access, multi-factor authentication and complete reporting. Proxy connections can be made through a central portal to restrict direct database access. Protect databases with layers of authentication, authorization, as well as granular role-based access controls. Time-based access, auditable logs, reports, and notifications can be generated. You can gain granular control over databases such as Oracle, MySQL and PostgreSQL, MariaDB. Redis, AWS RDS and Google DB. You can see who is accessing your databases and control their access with capabilities like multi-factor authentication (MFA), logging activities, and other security features. Protect your most important information by securing database access.
-
16
DataGate
ASNA
Accessing databases quickly, securely, and efficiently is key to successful enterprise applications. ASNA DataGate®, provides this service. ASNA DataGate can be used with either the MS SQL Server®, or IBM i databases. DateGate allows transparent record-level access for IBM i DB or Microsoft SQL Server databases. It offers outstanding performance, security, and performance. DataGate separates database access from the.NET app. This allows an ASNA Visual RPG to connect to either IBM i DB2 (or Microsoft SQL Server) without having to make any changes to the database access logic. This is especially useful in RPG-to.NET migration scenarios. -
17
Oracle Data Safe
Oracle
Data Safe is a unified control centre for Oracle Databases. It helps you understand the sensitivity and risks to your data, mask sensitive information, implement and monitor security controls and assess user activity. You can use Oracle Autonomous Database. Data Safe provides essential data security capabilities to help you reduce risk and increase security. You can assess user risk by highlighting the roles and privileges of critical users. To identify unusual behavior, create audit policies and collect user activity. Find sensitive data and find out where it is located. By masking sensitive data, you can reduce risk from non-production data. -
18
Oracle Advanced Security
Oracle
Oracle Advanced Security can be used to encrypt application tablespaces and prevent out-of band access to sensitive data. Redaction policies help to prevent sensitive data from being spread and ensure compliance with data protection regulations. Transparent Data Encryption prevents potential attackers from bypassing the database to read sensitive information directly from storage. This is done by enforcing data at rest encryption in the database layer. To protect sensitive data, you can encrypt individual data columns, entire tablesspaces, backups, and database exports. Data Redaction is an extension of TDE. It reduces the risk of data being exposed in applications by redacting sensitive information before it leaves the database. Redaction can be partial or complete to prevent large-scale extraction of sensitive information into spreadsheets and reports. Encryption is implemented at database kernel level, eliminating any need to make changes to applications. -
19
KSign SecureDB
KSign
KsignSecureDB for database privacy protection. Encrypting customer personal information stored by the organization can help prevent leakage and minimize damage in the event of an accident. It is a product that guarantees safety. This has been proven by its successful construction and stable operation in a variety of financial, educational, and public sectors. It is possible to use an encryption method that suits the customer's internal environment by supporting different types of encryption, from unstructured encryption to structured data encryption. It is possible to create the basis for compliance with various laws regarding personal information, such as the Personal Information Protection Act and the Information and Communication Network Act. Secure compliance can also be achieved. -
20
Oracle Data Masking and Subsetting
Oracle
$230 one-time paymentDue to increasing security threats and expanding privacy regulations, it is imperative to limit the exposure of sensitive data. Oracle Data Masking and Subsetting allows database customers to improve security, speed compliance, and lower IT costs. It sanitizes production data for testing, development, and any other activities and easily eliminates unnecessary data. Oracle Data Masking and Subsetting allows for entire copies or subsets to be extracted from the database and obfuscated. This data can then be shared with business partners. Assuring continuity of applications, the integrity of the database is maintained. Application Data Modeling automatically detects columns in Oracle Database tables that contain sensitive information using built-in discovery patterns like national identifiers, credit cards numbers, or other personally identifiable information. It automatically detects parent-child relationships in the database. -
21
Oracle Audit Vault & Database Firewall monitor Oracle and non-Oracle databases traffic to detect and block potential threats. They also improve compliance reporting by consolidating audit information from operating systems, directories, and databases. It can be deployed on-premises and in the Oracle Cloud. Oracle Audit Vault and Database Firewall is a complete Database Activity Monitoring solution (DAM). It combines native audit data with networked SQL traffic capture. AVDF includes an enterprise-quality audit data warehouse, host based audit data collection agents and powerful reporting and analysis tools. It also includes an audit dashboard, alert framework, multi-stage Database Firewall, and a multistage audit dashboard. Numerous out-of-the box compliance reports allow for easy, schedulable and customized reporting for regulations like GDPR, PCI (General Data Protection Act), HIPAA, IRS 1075/SOX, and UK DPA.
-
22
Omega Core Audit
DATAPLUS
$1499 USDYour Oracle database is often the most valuable informational asset of your company. It contains data on customers, partners and financial transactions. Even small and medium-sized companies now have millions of these records. Database security is now a top concern for companies that must comply with stricter information security controls and practices. Omega Core Audit, a software-only security and compliance tool, is out-of-box and can be used to address compliance issues. It provides access control, continuous audit monitoring, real-time protection, and access control. This allows for duty separation, control over privileged accounts, and meets compliance requirements. Splunk SIEM and GrayLog SIEM support is included. -
23
DataSunrise Database Security
DataSunrise
High-performance database security software Data-Centric. Compliance with SOX and HIPAA, GDPR and PCI DSS, as well as other privacy laws and standards. Hybrid and Multicloud Database Security Proxy on AWS Azure, Google, and On-Prem Active protection, discovery, and auditing of sensitive and PII data. Data Auditing allows for real-time monitoring of user actions and data changes to ensure compliance and increased visibility. Database Firewall, role-based and location-aware Data Access Control & Protection. Protect corporate databases in the cloud and on-prem from hostile, negligent actions. Secures sensitive data in testing and development environments; Encryption completely eliminates the possibility of reverse engineering the masked data. Production data can be hidden using real-time location and role-based data masking. Protects sensitive privacy data from being exposed even if production data is not physically altered. -
24
JackDB
JackDB
$49 per user per monthA fully interactive SQL editor allows you to create and execute queries. JackDB offers everything you need in a database client: syntax highlighting and code formatting as well as intelligent autocompletion. Snippets let you save and share your most important SQL queries. Simply create and save any query in JackDB and then share the snippet with your team. Everyone has access to the latest version of a snippet if anyone updates it. JackDB is committed to security. Roles are a convenient and secure way of limiting database access to authorized users, and granting new users access to data sources. You can view everything in your database, not just views and tables. View your schemas, indexes, and other system details like tablespaces or user sessions. -
25
iSecurity DB-Gate
Raz-Lee Security
DB-Gate provides IBM i customers with data access capabilities based on Open Database Connectivity. This is a standard IBM i facility that allows for fully database-transparent remote access. Native SQL on the IBM i allows users to access files on DB2 or non-DB2 remote systems without the need for any special hardware appliances or software. Access is made easier and more natural with interactive STRSQL, as well as any standard program in RPG or Cobol, C or other languages. DB-Gate has been shown to be a complete, effective replacement for OAM (Oracle Access Manager), which was discontinued with IBM i release 7.3. Accessing multiple databases from the main application server is becoming more important as your enterprise applications grow in complexity and database requirements. Accessing files from remote databases within the IBM i requires a lot of time and resources. -
26
Privacy1
Privacy1
$159 per monthPrivacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level -
27
DBHawk
Datasparc
$99.00/month/ user DBHawk enabled our customers to comply with GDPR and HIPAA, SOX and GLBA regulations. Self-Service BI & Adhoc Reporting Tool that allows you to set Data Access Policy, connect to multiple data sources, create powerful SQL charts, and dashboards. DBHawk SQL editor allows users to create, edit, and run SQL queries via a web-based interface. DBHawk Query Maker is compatible with all major databases, including Oracle, Microsoft SQL Server and PostgreSQL. A web-based central tool allows you to automate SQL tasks and batch jobs. Our all-in-one data platform provides secure access to SQL, NoSQL, and Cloud databases. Our customers trust us to protect their data and allow them to access it. Centralized Security, Auditing, and insights into your user's activities. -
28
DBArtisan
IDERA
All major DBMSs (SQL server, Azure SQL Database and Oracle Database, Sybase ASE, IQ, Db2 LUW, and z/OS) can be managed from a single interface. It reduces training time and facilitates collaboration between different teams within the organization. Multiple Oracle-specific schema object types can be managed, as well as advanced SQL Server object properties like temporal tables, in memory tables, natively compiled triggers and procedures, and functions. Comprehensive tools allow you to manage space, data, and performance to keep your database's availability optimized. A built-in process monitor helps you manage the performance of your database. It shows who is connected to your database, as well as current activity and session-related information. Advanced diagnostics can help you identify performance inefficiencies, track key database metadata, and monitor performance metrics over time. -
29
Imunify360
CloudLinux, Inc.
$12 3 RatingsImunify360 provides security solutions for web-hosting servers. Imunify360 is more than antivirus and WAF. It combines an Intrusion Prevention & Detection system with an Application Specific Web Application Firewall, Real time Antivirus protection, and Patch Management components into one security suite. Imunify360 is fully automated and displays all statistics in an intuitive dashboard. -
30
Acra
Cossack Labs
$10000 per yearIt's easy to prevent data leakage in your app. Acra encryption suite offers data protection in distributed apps, web and mobile applications with PostgreSQL MySQL, KV backends. Regulations (GDPR, HIPAA and PCI DSS) require encryption of sensitive and personal data. It can be tedious to integrate cryptography into distributed applications. This has limited security benefits and requires many architectural trade-offs. Acra is here for that. Acra is a tool that covers 9 data security measures. Acra is designed to protect data from leakage and provide protection throughout the entire data lifecycle. Acra is easy-to-integrate, requires no modifications to the existing code, provides reliable security, and reduces MTTD/MTTR. Acra is an integration library that can encrypt all records with AcraServer key. -
31
SQL Secure
IDERA, an Idera, Inc. company
$1,036 per instanceSQL Secure allows database administrators to manage SQL Server security in virtual, physical, and cloud environments. This includes managed cloud databases. It is different from other competitors because it allows for configurable data collection and customizable templates to meet audits for multiple regulatory guidelines. -
32
DB CyberTech
DB CyberTech
Structured high-value data, such as personal information on databases, is highly concentrated in one central location. What happens if a hacker gains access your network and valuable structured data environment? Recent and past breaches have shown hackers were able to gain access to networks for months or even years before high-value and high-volume data was stolen. How can we detect and stop structured data leakage in real-time? Alerting to a potential threat and identification of it before it occurs. Monitoring any insider threat. This adds to existing policy-based unstructured solutions and continuous monitoring for structured data. -
33
Krontech Single Connect
Krontech
The world's most trusted Privileged Access Management platform allows you to create a flexible, centrally managed, and layered defense system against insider threats. The Single Connect™, Privileged Access Management Suite is known for being the fastest to deploy and most secure PAM solution. It delivers IT operational security to Enterprises and Telcos worldwide. Single Connect™, which enables IT managers to effectively secure access, control configurations, and indisputable record all activities in the network infrastructure or data center, in which any breach of privileged accounts access might have a material impact on business continuity, allows network admins and IT managers to do so. Single Connect™, which provides tools, capabilities and indisputable log records, and audit trails, helps organizations comply with regulations such as ISO 27001, ISO 31000, 2009, KVKK and SOX. It also assists in compliance with regulations such as HIPAA and GDPR in highly regulated sectors like finance, energy and telecommunications. -
34
iSecurity AP-Journal
Raz-Lee Security
iSecurity AP Journal protects business-critical information against insider threats and external security breaches. It notifies managers of any information asset changes and streamlines IBM i journaling processes. iSecurity AP Journalnal logs who, what and when activities. It logs database access (READ Operations) directly into journal receivers. This is an important component to compliance and is not provided by IBM journaling. Monitors changes to members, application files, and objects. Supports periodic file structure modifications to application files. Allows monitoring of application files across file structure changes. Programmable exit routines for specific fields. Alerts that are sent in real-time when business-critical data changes are activated using user-defined thresholds. Comprehensive reports that show all application changes in one timeline, in different formats. -
35
SAP SQL Anywhere
SAP
$195 per licenseWith relational database management systems (RDBMS), solutions from SAP SQL Anywhere, you can run your business from anywhere. Secure, reliable data management for servers without a DBA. Also, synchronization for thousands of mobile devices, IoT systems, and remote environments. Remote offices and mobile devices can receive critical business data for faster, more accurate decision-making. Mobile applications can be run reliably and efficiently even without the need for technical staff. This gives remote workers and mobile workers a seamless experience, even when they're not on-site. With built-in self-managing capabilities, users can streamline data maintenance tasks and resolve issues quickly and efficiently. Strong encryption features can help protect and secure your data even during data exchange and transmission. -
36
HashiCorp Vault
HashiCorp
Securely store, secure, and tightly control access tokens, passwords and certificates to protect secrets and other sensitive data using a UI or CLI or HTTP API. -
37
iSecurity Field Encryption
Raz-Lee Security
iSecurity Field Encryption provides protection for sensitive data with strong encryption, key management, and auditing. Encryption is essential for protecting confidential information and expediting compliance to PCI-DSS and other state privacy laws. Ransomware can attack any file it can access, including connected devices, mapped network driver, shared local networks, cloud storage services, and cloud storage service that are mapped to infected computers. Ransomware doesn't discriminate. Ransomware encrypts all data files it has access to, even the IFS files. Anti-Ransomware quickly detects cyber threats of high volume from an external source and isolates them. It also protects performance and prevents data from being damaged. -
38
Monyog
Webyog
$199 one-time paymentAgentless MySQL performance monitoring that is fully customizable allows you to optimize query performance real-time. Configuration management allows you to track all changes made to MySQL Global variables. You can track and compare the changes made to the configuration file, and pinpoint the cause of performance problems. You can monitor locked and running queries in real time. For queries that take longer than a certain amount of time to complete, you will receive notifications via mail, SNMP traps and Syslog. You can also configure Monyog to notify, kill, notify or notify and kill such queries. You don't need to learn new tools by using the same performance monitor tool for MySQL on-premise, on virtual and physical machines, in the private and public cloud on virtual machines and in the public cloud as managed databases. -
39
MyDiamo
Penta Security Systems Inc.
MyDiamo was developed by Penta Security Systems (APAC leader in encryption technology) and is available to all for noncommercial use. Enterprises and organizations who require additional features can obtain a commercial license. Index searching is possible with column-level encryption or partial encryption - Minimal system performance changes guaranteed - Compatible with open-source DBMS such as MySQL, MariaDB and Percona - GDPR/PCI DSS/HIPAA compliant - Code modification is not required, it works parallel at the engine level -
40
OpenText Voltage SecureData
OpenText
Secure sensitive data wherever it flows - on premises, in the cloud and in big data analytics platforms. Voltage encryption provides data privacy protection and neutralizes data breaches. It also drives business value through secure data usage. Data protection builds customer trust, and enables compliance with global regulations such as GDPR, CCPA and HIPAA. Privacy regulations recommend anonymization, pseudonymization and encryption to protect personal data. Voltage SecureData allows enterprises to de-identify structured data and supports the use of data within its protected state to safely drive business value. Secure data flows through your enterprise without gaps, encryption, or overhead. SecureData supports a wide range of platforms and encrypts data using any language. Structured Data Manager integrates SecureData to allow businesses to easily and continuously protect data all through its lifecycle, from discovery through encryption. -
41
Simplifies data regulations, improves visibility and streamlines the monitoring IBM®, Guardium®, Data Compliance helps organizations meet regulatory compliance and audit requirements faster and easier, while safeguarding regulated information wherever it is located. IBM Guardium Data Compliance, available in IBM®, Guardium®, Data Security Center, can reduce audit prep times for data compliance regulations and provide continuous visibility of data security control. It also solves data compliance and data monitoring challenges.
-
42
BitNinja
BitNinja.com
$10 per serverBitNinja provides 3E Linux server protection for large hosting providers and small businesses equally. The three E stands for: effective, effortless, and enjoyable. Effective because of our unique Defense Network that uses the power of the Ninja Community. Every BitNinja-protected server worldwide shares attack information with each other, resulting in a more intelligent and stronger protection shield by every single assault. Effortless because it is fast and easy to install, so your server protection is up and running in no time. Enjoyable because you can take joy in the benefits of BitNinja, like the increased server capacity caused by the significant drop in the server load. Join our Defense Network for free today! -
43
Mage Platform
Mage Data
Protect, Monitor, and Discover enterprise sensitive data across multiple platforms and environments. Automate your subject rights response and demonstrate regulatory compliance - all in one solution -
44
iSecurity Safe-Update
Raz-Lee Security
iSecurity Safe-Update safeguards IBM i business data from unauthorised programs. These programs are programs that come from a library that is not used for file editors, production programs, DFU, Start SQL (STRSQL) and file producers. It ensures that updates can only be made by verified programs or programs not known to be file editors. Sarbanes-Oxley, GDPR, PCI and HIPAA are all industry regulations that companies must follow to ensure data security and monitoring. They require that only authorized programs are allowed to make updates to business-critical information in production environments. Safe-Update protects against unauthorized updates by dangerous programs. These programs are not designed to follow the company's business rules. A window will appear asking for tickets if an unauthorized update attempts to be made. -
45
IBM Db2®, Analytics Accelerator, is a high-performance component that integrates with Db2 for Z/OS®. It provides high-speed processing of complex Db2 queries to support business critical reporting and analytical workloads. The accelerator transforms mainframe into a hybrid processing and transaction environment (HTAP). It reduces cost and complexity, and allows for analytics on transactional data as it's generated. To integrate real-time insights with operational decisions, you can use your business-critical data wherever it comes from. You can quickly gain insight from enterprise data to support your time-sensitive decisions. Analytics and business insight can be used to quickly identify risks, improve customer experience, predict the impact of global events on businesses, and much more. Reduce data movement off-platform, simplify your infrastructure and free up computing resources.
-
46
Adabas & Natural
Software AG
You need a forward-thinking partner who has a vision in an age of fast change. Someone who can help you bring your Adabas & Natural applications into the future. Adabas & Natural has been there for you for decades. You can look forward to a future in which you can make the most of your investment and the unique business logic embedded into your core applications. We are that partner, dedicated to helping you digitalize the legacy of your family, quickly and without risk. Let's work together to manage the generational change in developers, modernize applications to reduce costs, increase the reach of core apps, and accelerate the development process in a highly-modern environment. You can rely on Adabas & Natural technologies for rapid and secure IT optimization and modernization of your applications. Connect to APIs to connect to new services. Adabas & Natural can be run in the cloud. DevOps can help you attract new developers talent. Reduce costs by delegating mainframe workloads to zIIP. -
47
Security Insights Platform is a tool that helps you create a trust environment for your customers, employees, and customers. It quickly identifies and reduces risk from threats. It can quickly assess and interpret the security status of your Mainframe. It can also help you develop remediation steps for any risky findings - all on an ongoing or ad hoc basis. Security Insights provides a foundation that allows your Mainframe to connect to your network and hybrid clouds across your enterprise. It allows you to securely support digital transformation. CA Security Insights output can be integrated with other in-house tools like SIEMs and SOC to give an enterprise-wide view on your security posture. To help mitigate mainframe security risks, collect, aggregate, analyze and interpret security data. Data collection is time-consuming, resource-intensive, and manual. Automate the heavy lifting.
-
48
Noname Security
Noname Security
APIs are essential to business. They can be used for everything from generating revenue through customer experiences, to saving money on the back-end. Noname's API security will protect you from all threats. Discover APIs, domains and issues automatically. Build a robust API Inventory and find exploitable intelligence such as leaked data to understand the attack pathways available to adversaries. Understanding every API in the ecosystem of your organization with all its business context is key. Discover vulnerabilities, protect sensitive information, and proactively monitor any changes to reduce the attack surface of your APIs. Automated machine learning-based detection identifies the broadest range of API vulnerabilities including data leakage and data tampering. Misconfigurations, data policies violations, suspicious behaviors, and API security threats are also identified. -
49
SecretHub
SecretHub
$99 per monthUnified secrets management platform for engineers that can be used by all levels of the stack - from intern to admin - will improve security across the stack. Security risks can be created by putting API keys and passwords in source code. However, they are complex to manage and make deployment difficult. Email, Git, and Slack are meant to share information, not keep secrets. When you deploy software multiple times per week, copy-pasting values and waiting for one admin to hold all the keys doesn't scale. Compliance audits can be difficult because it is impossible to track who accessed which secrets at what times. Replace plaintext values with a reference. This will eliminate secrets from source code. SecretHub will then load secrets into your app automatically when it starts. You can use the CLI to encrypt or store secrets, and then tell the code where to find it. Your code is now unencrypted and can be shared with your entire team. -
50
Trustwave
Trustwave
A cloud-native platform that provides enterprises unprecedented visibility and control over how security resource provisioning, monitoring and management are done in any environment. Trustwave Fusion is a cloud-based cybersecurity platform which serves as the foundation for Trustwave managed security products, services and other cybersecurity offerings. The Trustwave Fusion platform was designed to meet enterprises where they are in their operations today and in the future, as they embrace digital transformation and deal with an ever-changing security landscape. Connects enterprises and government agencies' digital footprints to a robust security cloud that includes the Trustwave data lake, advanced analysis, threat intelligence, and a wide range security products and Trustwave SpiderLabs. This is the company's elite security team.