About

Data-Centric high-performance database security software. Regulatory Compliance with SOX, HIPAA, GDPR, PCI DSS and other privacy laws and standards. Hybrid and Multi-Cloud Database Security Proxy on AWS, Azure, Google and On-Prem. Sensitive and PII data auditing, discovery and active protection. Data Auditing enables real-time tracking of user actions and changes made to data and databases to ensure compliance-ready environment, increased visibility. Database Firewall, role based & location aware Data Access Control & Protection. Secure corporate databases in cloud & on-prem against hostile, negligent actions. Secures sensitive data in development and testing environments; Encryption; completely eliminates the possibility to reverse engineer the masked data. Real-time role and location based data masking of production data. Prevents exposure of sensitive privacy data while production data is not changed physically.

About

Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.

About

The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.

About

Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. Whether you’re using Oracle Autonomous Database. Oracle Database Cloud Service (exadata, virtual machine, or bare metal), or Oracle Databases on-premises in your own data center, Data Safe delivers essential data security capabilities that help you reduce risk and improve security. Assess user risk by highlighting critical users, roles and privileges. Configure audit policies and collect user activity to identify unusual behavior. Discover sensitive data and understand where it is located. Remove risk from non-production data sets by masking sensitive data.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies of all sizes that want to manage their database security

Audience

Enterprises and companies searching for an encryption solutions to secure their data and their businesses

Audience

Organizations that need a flexible solution that discovers, masks and subsets sensitive data to safely share across non-production environments

Audience

Organizations that want to accelerate cloud adoption, achieve data privacy and compliance

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Pricing

$230 one-time payment
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

DataSunrise
Founded: 2014
United States
www.datasunrise.com

Company Information

IBM
Founded: 1911
United States
www.ibm.com/products/guardium-data-encryption

Company Information

Oracle
Founded: 1977
United States
www.oracle.com/database/technologies/security/data-masking-subsetting.html

Company Information

Oracle
Founded: 1977
United States
www.oracle.com/database/technologies/security/data-safe.html

Alternatives

Alternatives

CLEAR

CLEAR

Quantum Knight

Alternatives

IRI Voracity

IRI Voracity

IRI, The CoSort Company

Alternatives

VMware NSX

VMware NSX

Broadcom
IRI DMaaS

IRI DMaaS

IRI, The CoSort Company
IRI FieldShield

IRI FieldShield

IRI, The CoSort Company
iSecurity Field Encryption

iSecurity Field Encryption

Raz-Lee Security
IRI Data Protector Suite

IRI Data Protector Suite

IRI, The CoSort Company
HashiCorp Vault

HashiCorp Vault

HashiCorp

Categories

Categories

Categories

Categories

Database Features

Backup and Recovery
Creation / Development
Data Migration
Data Replication
Data Search
Data Security
Database Conversion
Mobile Access
Monitoring
NOSQL
Performance Analysis
Queries
Relational Interface
Virtualization

Integrations

IBM Cloud
IBM Db2
IBM Guardium
IBM Informix
Microsoft 365
MySQL
OpenText Analytics Database (Vertica)
Oracle Database
Oracle E-Business Suite
Recruitee
SQL Server

Integrations

IBM Cloud
IBM Db2
IBM Guardium
IBM Informix
Microsoft 365
MySQL
OpenText Analytics Database (Vertica)
Oracle Database
Oracle E-Business Suite
Recruitee
SQL Server

Integrations

IBM Cloud
IBM Db2
IBM Guardium
IBM Informix
Microsoft 365
MySQL
OpenText Analytics Database (Vertica)
Oracle Database
Oracle E-Business Suite
Recruitee
SQL Server

Integrations

IBM Cloud
IBM Db2
IBM Guardium
IBM Informix
Microsoft 365
MySQL
OpenText Analytics Database (Vertica)
Oracle Database
Oracle E-Business Suite
Recruitee
SQL Server
Claim DataSunrise Database Security and update features and information
Claim DataSunrise Database Security and update features and information
Claim IBM Guardium Data Encryption and update features and information
Claim IBM Guardium Data Encryption and update features and information
Claim Oracle Data Masking and Subsetting and update features and information
Claim Oracle Data Masking and Subsetting and update features and information
Claim Oracle Data Safe and update features and information
Claim Oracle Data Safe and update features and information