About
Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer. Encrypt individual data columns, entire tablespaces, database exports, and backups to control access to sensitive data. Data Redaction complements TDE by reducing the risk of unauthorized data exposure in applications, redacting sensitive data before it leaves the database. Partial or full redaction prevents large-scale extraction of sensitive data into reports and spreadsheets. Encryption is implemented at the database kernel level, eliminating the need for any changes to applications.
|
About
The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.
|
About
DPM easyData is a high-performance data spoofing or de-identification engine. Data spoofing examples include masking, tokenization, anonymization, pseudonymization and encryption. DPM data spoofing processes replace whole or parts of sensitive data with a non-sensitive equivalent (creates fake data) and is a very powerful data protection tool. DPM easyData is a software data security solution that allows web and app server applications and databases to tokenize and anonymize data and apply masking policies for unauthorized users when retrieving sensitive data. The software allows a high level of granularity, defining which authorized users have access to which protection policies, and what operations they may perform with those protection policies. DPM easyData is extremely customizable and is able to protect and tokenize many different types of data. The software has been designed to be flexible and users are free to define any format of input data and token format.
|
About
Enjoy the highest performance and unlimited possibilities when working with SQL Server. SQL Server Data Access Components (SDAC) is a library of components that provides native connectivity to SQL Server from Delphi and C++Builder including Community Edition, as well as Lazarus (and Free Pascal) for Windows, Linux, macOS, iOS, and Android for both 32-bit and 64-bit platforms. SDAC-based applications connect to SQL Server directly through OLE DB, which is a native SQL Server interface. SDAC is designed to help programmers develop faster and cleaner SQL Server database applications. SDAC, a high-performance, and feature-rich SQL Server connectivity solution is a complete replacement for standard SQL Server connectivity solutions and presents an efficient native alternative to the Borland Database Engine (BDE) and standard dbExpress driver for access to SQL Server. SDAC-based DB applications are easy to deploy, and do not require the installation of other data provider layers.
|
|||
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
Platforms Supported
Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook
|
|||
Audience
Companies that want to stop attackers from bypassing the database and reading sensitive information
|
Audience
Organizations that need a flexible solution that discovers, masks and subsets sensitive data to safely share across non-production environments
|
Audience
Companies looking for a software data security solution to tokenize and anonymize data and apply masking policies for unauthorized users
|
Audience
Programmers in need of a tool to develop faster and cleaner SQL Server database applications
|
|||
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
Support
Phone Support
24/7 Live Support
Online
|
|||
API
Offers API
|
API
Offers API
|
API
Offers API
|
API
Offers API
|
|||
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
Screenshots and Videos |
|||
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$230 one-time payment
Free Version
Free Trial
|
Pricing
No information available.
Free Version
Free Trial
|
Pricing
$199.95 per year
Free Version
Free Trial
|
|||
Reviews/
|
Reviews/
|
Reviews/
|
Reviews/
|
|||
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
Training
Documentation
Webinars
Live Online
In Person
|
|||
Company InformationOracle
Founded: 1977
United States
www.oracle.com/security/database-security/advanced-security/
|
Company InformationOracle
Founded: 1977
United States
www.oracle.com/database/technologies/security/data-masking-subsetting.html
|
Company InformationRandtronics
Founded: 2002
Australia
randtronics.com/products/randtronics-dpm-easydata/
|
Company InformationDevart
Founded: 1997
Czech Republic
www.devart.com/sdac/
|
|||
Alternatives |
Alternatives |
Alternatives |
Alternatives |
|||
|
|
|
|||||
|
|
|
|
|
|||
|
|
|
|||||
|
|
||||||
Categories |
Categories |
Categories |
Categories |
|||
Integrations
Azure SQL Database
Cisco Multicloud Defense
Delphi
FreeBSD
IBM Db2
IBM Informix
Kkonnect.io
MySQL
Oracle Data Guard
Oracle Database
|
Integrations
Azure SQL Database
Cisco Multicloud Defense
Delphi
FreeBSD
IBM Db2
IBM Informix
Kkonnect.io
MySQL
Oracle Data Guard
Oracle Database
|
Integrations
Azure SQL Database
Cisco Multicloud Defense
Delphi
FreeBSD
IBM Db2
IBM Informix
Kkonnect.io
MySQL
Oracle Data Guard
Oracle Database
|
Integrations
Azure SQL Database
Cisco Multicloud Defense
Delphi
FreeBSD
IBM Db2
IBM Informix
Kkonnect.io
MySQL
Oracle Data Guard
Oracle Database
|
|||
|
|
|
|
|