Over 253,234 professionals have used IT Central Station research.
Compare the best Database Security vendors based on product reviews, ratings, and comparisons.
All reviews and ratings are from real users, validated by our triple authentication process.
The total ranking of a product, represented by the bar length, is based on a weighted aggregate
score. For Views, Comparisons, Reviews, and Followers the score is calculated as follows: The
product with the highest count in each area gets the highest available score of 17.5 points.
Every other product gets assigned points based on its total in proportion to the #1 product in
that area. For example, if a product has 80% of the number of reviews compared to the product
with the most reviews then the product's score for reviews would be 17.5% (weighting factor) *
80% = 14. For Average Rating, the maximum score is 30 points awarded linearly based on our
rating scale of 1-10. If a product has fewer than ten reviews, the point contribution
for Average Rating is reduced (one-third reduction in points for products with 5-9 reviews;
two-thirds reduction for products with fewer than five reviews). Reviews that are more than 24 months old,
as well as those written by resellers, are completely excluded from the ranking algorithm.
WAF is a great security layer to protect an organization from a wide spectrum of application attacks residing in OSI layer 7. The Imperva device relies on signature-based policies, as well as on a web correlation engine. In addition, the... more»
Imperva helps you comply with data regulations such as SOX or PCI. It helps SOC analysts to enlarge the scope analysis, significantly providing great procedures to drill down into the audit or a customizable enrichment fed by several types of... more»
To have the mind at ease with a security solution has been always a chimera. Even SecureSphere suffers from some limitations, which I believe will be handled in the near future. I see two main things to improve at this point: * SSL tunnel... more»
The following features of the product provide additional benefits for the user: * If it's from an Oracle family, we can get quick support from Oracle support. * Reporting screens are more useful, we can get many summary reports very quickly.... more»
Before this product was used in the company, the tables with some critical presets were checked with the triggers on them. The old and new versions of the changing records were written to another table. These triggers caused the database... more»
We were using Audit Vault 10.3 before and could not migrate to the new version (AVDF 12.1 and 12.2) (because Oracle support said it was not possible) and we continued to get old Audit Vault databases when we needed old audit records, and we... more»
The two most valuable features of this product are: * Database access control * Auditing of users First of all, it is very easy to configure users and their appropriate roles and permissions on a database. The product allows us to set rules... more»
Information technology outsourcing: Audit Vault and Database Firewall has helped us in many ways; specifically, to restrict and control access to data. It also has helped us identify/recover from many accidental transactions. The product has... more»
According to Oracle, the best practice is that Audit Vault Server and DB Firewall should be deployed on different boxes (servers). There is no option to co-locate them together. If you wish to deploy AV server and Database Firewall, you will... more»
Reports and alerts are most valuable to us. Management wanted complete traceability of non-DBAs accessing databases using a database power user account. With the help of Audit Vault custom alerts, we were able to control this with 100%... more»
Some major improvements in organizational operations: * Our organization has a complete alert and control mechanism to identify unauthorized access of PROD databases. * Compliance with United States government security and audit standards. *... more»
Large scope of improvements: * A method to group targets (databases generating audit files) logically is missing; for example, PROD, QA, UAT & DEV targets. * An alert mechanism based on logical grouping is missing. * A simplified graphic... more»
Oracle Database Firewall, Database Vault and Data hiding tools present a layered security approach to protecting, controlling, auditing and hiding sensitive data and access to sensitive data. The following key features make this product a... more»
Oracle Audit Vault and Database Firewall expands protection beyond Oracle and third party databases with support for auditing the operating system, directories and custom sources. Our client needed a product which can provide a holistic... more»
Although Oracle Audit Vault and Database Firewall serves as a critical detective and preventive control to protect against the abuse of legitimate access to databases responsible for almost all data breaches and cyber attacks, using Database... more»
It was instrumental in scanning a large inventory of databases to identify sensitive data. Using Imperva Assessment scans, we were able to identify SHR, PII & confidential data sources in a large inventory of database systems. This helped... more»
I would like to see a better web management console; the UI is not very intuitive, unless you really know what you’re doing. And scan error details should be readable from the web console, instead of running Unix commands on the backend... more»
Idera SQL Secure provides printable reports along with advice on how security settings should be configured. That in itself allows for more clear and detailed discussions with the organization’s auditing/compliance, as you move towards... more»
We were about to receive a group level audit when we deployed Idera SQL Secure. In a previous audit, we had received some bad ratings and advice on security for our SQL Server instances. Idera SQL Secure comes bundled with the best practices... more»
Before SecureSphere was used, the native auditing tools were used, and now there is a segregation of duties when managing audit data from DBAs and DBS teams. It is a much more secure way to have audit data from databases and to monitor... more»
All areas of this product have room for improvement. There are a lot of things that can be improved if you want this to run in a corporate environment with thousands of database servers. If your database server count is low, it is a fine... more»
The most valuable features of this product are auditing the old and new values after each change in the database, REDO_COLL and capturing application context functionalities. REDO_COLL is a function provided by Oracle Audit Vault where the... more»
Auditing as an imperative function of any Enterprise company. We require the audit logs for compliance needs and for tighter control of the infrastructure. Being in the Health Insurance industry and handling PHI & PII data, there are... more»
The price factor makes it “out of reach" for small players in the IT industry. Even the SaaS model is very expensive. SaaS is an alternative hosting model where Oracle hosts the audit vault in their data center and installs audit collection... more»
Heterogeneous support for data activity monitoring. I have not been able to find any other product that can monitor as many platforms from one application. Guardium can monitor Windows servers, Linux, Unix, mainframe, and big data... more»
We now have one go-to application for all data monitoring. This has decreased the number of skills needed and enabled a faster route to compliance. Reporting is automated and activity alerts are routed to the appropriate responders.
While Guardium is great at structured monitoring (DAM), the product is lacking features on the file activity side (FAM). We would also like to see tighter integration with Active Directory and Exchange monitoring.
* Quick search * Ability to define reports based on SQL query, especially when you have complex report criteria. * Stream audit data to 2 collectors simultaneously. * GIM passive install. You can connect GIM from Colletor or CM when GIM is... more»
* First of all. GUI and user experience needs to be reworked from scratch. Product management console look like from 90's. * Deployment process is very complicated as you need to now all advanced parameters. Almost not possible to figure out... more»
AVDF can monitor SQL traffic to look for alerts on and prevent unauthorized or out-of-policy SQL statements. Because the final target of external attacks is SQL, it's very effective to check SQL level. In addition, this product transparently... more»
AVDF not only has an audit function, but it also has a database firewall function that protects the database, which is an important company asset, from external attacks typified by SQL injection. It supports a wide range of databases (Oracle... more»
I would like to see a link-state tracking feature that quickly notices network failures. The benefit would be quick detection of network disconnection in DPE (inline) mode. If there is a network disconnection inline configuration, AVDF... more»
* Audit log collection from a heterogeneous RDBMS environment * Offers warehouse-based control over the log DB in a secured and encrypted way Additionally, it offers a RAC option along with DB vault configuration.
I am in the training field and I can express my views based on that experience only. This is a configuration-based product that offers you full control of the audit settings and the configurations. It helps in generating all the required... more»
The most valuable feature of this product is vulnerability management since you don’t need to run different scans by logging into different databases. Everything can be done and monitored through the centralized console by a few clicks and... more»
Some of the ways in which this product has helped our organization are: * All the databases are being monitored. * All the compliance requirements can be taken care of through a console. * The daily and weekly reports are helpful in... more»
The stability and the ease of use of this product can be improved. I believe the product can be made more flexible and stable. Additionally, it is very unlikely for a new professional to easily use this tool to its full potential. For this... more»
The most valuable features of this product are: * PL/SQL auditing: It helps to control the code updates in a sensitive environment. * Inbuilt compliance reports - In data-sensitive environments where auditing teams require generation of... more»
This product should improve capturing more auditing information for database sessions that connect via applications and also through database links. When the database sessions are generated from the applications that use database links from... more»
* Monitors database activities of end users who are connected to databases (DBAs and developers) * Classifies critical objects on the databases * Discovers databases on your network * Finds vulnerabilities of your databases * Blocks critical... more»
Basically, it ensures that data is handled only by those who should be handling it and only in the way that they should be handling it. This product provides visibility and security as to how the data is being used.
There is always room for improvement in this product. If possible, I would recommend to have an Eclipse interface which can provide simplicity in programmable access. This will help in putting together more flexible solutions that interact... more»
IBM Guardium provides a unified key management system to help simplify encryption key management. In a large organization, this is a critical feature and IBM went above and beyond while developing the software.
Efficiency is key and IBM Guardium provides information in a heartbeat, but protects the data with military grade encryption. IBM Guardium is used for file and database security for protecting structured and unstructured data. Security policy... more»
Personally, I would like to see IBM Guardium have other encryption algorithms employed, such as DES/3DES or TripleDES, Twofish, Blowfish, or IDEA. I especially would like to see Twofish used, since it is a block cipher designed by Counterpane... more»
Database auditing has become simple and easy, releasing storage previously used for native database audit processes. We found new patterns of database users' behaviour and corrected some user authorisations.
Mainframe mappings/agents/optimization for CPU usage are areas with room for improvement. Agent on z/OS does not have a limit for CPU usage like on other platforms. If you specify filter too "wide", the agent would consume too much cpu so that could cause more cost for your mainframe. Agents are a bit special for configuration because the logic is different than... more»
The most valuable features are: * DAM Module * Third-party data source integration: Feeds automation * Data enrichment: Provides better data quality and session handling * API: Used for process automation
The solution has improved our organization as follows: * Better agent performance compared to v9.5 * Gateways are much more stable * Gateway cluster improves resource utilization and provides better resiliency * Offers the option to manage... more»
BUGs, BUGs, BUGs. The product is under high development and the amount of bugs is bit disappointing. The product has lots of limitations which are not clearly documented. You can only find out the limitations by engaging the support By using... more»
I am a ㊙️ Security guy and have titles like Security Officer, Security Manager, Säkerhetschef and Säkerhetsskyddschef.
These are only titles and not limitations. My knowledge of Management, IT, Processes and people are broad and i love to do many things and help people wherever I go.
My focus is on everything related to Database and *nix System Administration and around this topic:
- Implementing Oracle database environments of any complexity
- Database operations and keep system running
- Database and SQL performance tuning
- Database troubleshooting
- Database... more>>