Database Security Features

Read what people say are the most valuable features of the solutions they use.
Sidney Monteiro says in an IBM Guardium Data Protection review
Information Security Analyst at a tech services company with 501-1,000 employees
The most valuable feature is using the capture operation mode “S-TAP/K-TAP agent”, because all activities in the database are captured, including direct access to the database server by privileged users. This is useful because, even if the database server logs were deleted, the Guardium Collector has already stored such data to enable traceability of access. View full review »
Trusted Security Advisor at a tech services company with 501-1,000 employees
This solution has a lot of functionality and there are hundreds of use cases for it. We are talking about the database, which is the main business core for the company that holds all of the data. The features used by any one customer are dependent on their requirements and the relevant regulations. That said, IBM Guardium has a lot of capabilities, even compared to other solutions on the market. It can do everything from detection to prevention, and it provides reports about this as well. View full review »
‎IT Security Analyst at a tech services company with 11-50 employees
* Audit Process Builder – Workflow generator to enhance audit tasks and compliance workflows. * Compliance Quick Start – Quick, GUI, step-by-step guide to automate compliance and give the customer a quick ROI. View full review »
Security8fd0 says in a CA ACF2 review
Security Analyst
One of the values in this industry is how it manages user security. We use this tool to quickly assign privileges to different users as soon as they come in. As soon as we onboard the users, we use CA ACF to assign privileges and assign rules to all the users. When the rule changes, we use CA ACF to change the rules or deprovision them from those rules and assign them new rules. It is done quickly and almost automatically. View full review »
JoelSadomba says in a Fortinet FortiDB review
IT Engineer at BAZ
The most valuable feature is database security. This solution provides file-level protection. Automatic database discovery finds all databases on the network, including those across subnet and WAN boundaries. View full review »
reviewer1059522 says in a Fortinet FortiDB review
IT Assistant at a international affairs institute with 10,001+ employees
The most valuable features of this solution are the security aspects. View full review »
Sanjeet Kumar Bhuyan says in an Imperva SecureSphere Database Security review
Senior IT Governance and Security Specialist and Technical Auditor at a government with 501-1,000 employees
* DB Activity Monitoring * DB Firewall * CounterBreach Their web application firewall (WAF) is quite good. View full review »
MosesMoloi says in an Oracle Audit Vault review
Director (Core Technology Services) and Partner at a tech services company with self employed
The most valuable features of this solution are: * Autonomous data collection. * Ease of deployment to work and integrate with heterogeneous platforms. * Reporting infrastructure is awesome and very flexible. * The interfaces are intuitive and easy to use and navigate through. * The solution has a well designed RBAC for the support of the business and it is secure. View full review »
Cedric Agokeng Kitio says in an Oracle Audit Vault review
Senior Database Administrator at ITGStore
We have a situation for a bank as a client. We were able to deploy Oracle Audit Vault for them. The end-user is a key part of the system in the information department. For maintenance, only one person is required and he's an admin. Oracle Audit Vault was used extensively and our clients are quite comfortable with it. We believe the product will be used for a long time. View full review »
Unix System Administrator at a financial services firm with 1,001-5,000 employees
The most valuable features include the compliance with standards for security in web applications, and the ability to detect vulnerabilities. View full review »
Rashid Alsalmi says in a Trustwave DbProtect review
Consultant at a tech services company
The competitive edge is that this is an agent-based solution. We usually provide network-level solutions, but if the server is misplaced or removed then the control is gone. Since this is installed on the server itself, it is safer to use and there is more control over the database. View full review »
Senior IT Security Specialist at National Water Company
The features which are most valuable are from the security perspective. We do not have other specific tools for vulnerability assessment. The package allows user activity monitoring. The second thing is for assessing the vulnerability of the database while it is running. View full review »
Examin677 says in a CA ACF2 review
IT Examiner at a financial services firm with 5,001-10,000 employees
The real-time reporting on the event logs is the only thing we need to use it for. The time it saves makes it very valuable to us and our allocation of resources. View full review »
CEO at eLAAB Limited
The reporting ends up being the most visible feature even though the protection and automated blocking are as valuable. The reporting is very flexible, and users can create any type of reports they want. It gives them insight into the information they need to be effective at what they are responsible for. View full review »
CTO- Consulting Services at 2bsecure
The most valuable feature of this solution is the database security policy. View full review »
Cloud Solutions Architect at a tech services company with 11-50 employees
The most valuable feature is the Data Masking. Most of our customers inquire about it, so it is very important to us. View full review »
ArchSolute344 says in an Oracle Audit Vault review
Solution Architect at a tech services company with 201-500 employees
We use the separation of duty feature because part of the database is encrypted, and the database administrators, such as myself, should have no access to this area. It belongs to the security team. View full review »
Manish Khanijo says in an Oracle Audit Vault review
Lead Network and Security at Qatar Credit Bureau
The most valuable feature is that Oracle Access Vault is integrated with our SIM (Security Information Management tool), which gives us a complete picture of what access is being provisioned in our organization. We do not use the interface provided by Oracle Audit Vault, except to export the data into our SIM. View full review »
Andrii Ponomarenko says in an Imperva SecureSphere Database Security review
IT Security at rmrf-tech
The most valuable feature is the protection from Botnets. The DDoS attack is one of the things that it protects against. The functionality is very useable and easy to understand. It is also easy to update if you follow the instructions. View full review »
Software Developer at a tech services company with 201-500 employees
The best feature of this solution is the integration between components. It has a lot of different components that cover the needs of our customers. View full review »
MosesMoloi says in an Oracle Audit Vault review
Director (Core Technology Services) and Partner at a tech services company with self employed
The most valuable feature is the ability to create inbuilt reports for compliance, which have dealt with the rules made it easier. This means that we don't have to develop them from scratch, which makes life so much easier. View full review »
AaronMasembe says in an Oracle Audit Vault review
Information Technology and Services Professional at Independent
The ability to isolate the view and who has the rights to view the audit logs is valuable to us. Senior executives can check the system, the IT team, the IT individuals, and the administrators. Another interesting feature is the ability to view the traffic by the IT, as well as individual machines. This can help scale down trailing traffic on the network. It makes it possible to look into a traffic jam from a particular machine by MAC and IP address. Also, address administrators cannot go in and delete audit trails which would otherwise allow users to circumvent the audit trail. In the implementation of the Oracle Audit Vault, we can monitor not only Oracle Databases, but also monitoring, server databases that within the environment. It isn't only specific Oracle Database. View full review »
Project Manager at a energy/utilities company with 10,001+ employees
The tool happens to be very intelligent when it comes to processing policies and sounding alerts. It allows us to implement policies and measure actions against them, raising alerts accordingly. That is the best feature. View full review »
ReviewerSE399 says in a Fortinet FortiDB review
Network Security Consultant at a tech services company
It is critical to monitor the action in a database. This is the most important feature of FortiDB. You can create queries, delete data, block as a firewall and more. You can also reset the station user if you want to do a specific update. View full review »
Osama Mustafa says in an Oracle Audit Vault review
Cloud Expert | DevOps | Oracle Consultant at confidential
Different features I have been using in this product: * Audit policies for Oracle Database * Reports and report schedules * Entitlement auditing for Oracle Database * Stored procedure auditing * Alerts and email notifications All the above features will allow you to manage and monitor the infrastructure, databases very easily and create custom reports depending on what you want. View full review »
Sign Up with Email