About

Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer. Encrypt individual data columns, entire tablespaces, database exports, and backups to control access to sensitive data. Data Redaction complements TDE by reducing the risk of unauthorized data exposure in applications, redacting sensitive data before it leaves the database. Partial or full redaction prevents large-scale extraction of sensitive data into reports and spreadsheets. Encryption is implemented at the database kernel level, eliminating the need for any changes to applications.

About

The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.

About

Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. Whether you’re using Oracle Autonomous Database. Oracle Database Cloud Service (exadata, virtual machine, or bare metal), or Oracle Databases on-premises in your own data center, Data Safe delivers essential data security capabilities that help you reduce risk and improve security. Assess user risk by highlighting critical users, roles and privileges. Configure audit policies and collect user activity to identify unusual behavior. Discover sensitive data and understand where it is located. Remove risk from non-production data sets by masking sensitive data.

About

Trellix Database Security finds and protects sensitive information in databases from accidental leakage and intentional exposure while maintaining security, optimizing performance, and managing access. Discover sensitive and proprietary information in databases across the environment. Improve regulatory compliance by blocking unauthorized access to sensitive data. Address vulnerabilities quickly, with little to no downtime. Monitor, log, and control database access, in addition to identifying and blocking potential threats before they can damage the environment. Perform automated scans to find supported databases and the sensitive data they contain. Identify and prioritize known vulnerabilities, and receive detailed remediation advice. Protect databases from known and unknown vulnerabilities without downtime. Stop intrusions and other exploits before they impact your environment.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Companies that want to stop attackers from bypassing the database and reading sensitive information

Audience

Organizations that need a flexible solution that discovers, masks and subsets sensitive data to safely share across non-production environments

Audience

Organizations that want to accelerate cloud adoption, achieve data privacy and compliance

Audience

Companies seeking a solution to find and defend databases and the information they contain

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

$230 one-time payment
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Oracle
Founded: 1977
United States
www.oracle.com/security/database-security/advanced-security/

Company Information

Oracle
Founded: 1977
United States
www.oracle.com/database/technologies/security/data-masking-subsetting.html

Company Information

Oracle
Founded: 1977
United States
www.oracle.com/database/technologies/security/data-safe.html

Company Information

Trellix
Founded: 2022
United States
www.trellix.com/products/database-security/

Alternatives

Alternatives

IRI Voracity

IRI Voracity

IRI, The CoSort Company

Alternatives

VMware NSX

VMware NSX

Broadcom

Alternatives

IRI FieldShield

IRI FieldShield

IRI, The CoSort Company
IRI Data Protector Suite

IRI Data Protector Suite

IRI, The CoSort Company

Categories

Categories

Categories

Categories

Integrations

Cisco Multicloud Defense
IBM Db2
IBM Informix
Kkonnect.io
MySQL
Oracle Data Guard
Oracle Database
Oracle E-Business Suite
Oracle Exadata
SQL Server
Sandfly Security
TSM
Trellix Security Platform
Trellix XDR

Integrations

Cisco Multicloud Defense
IBM Db2
IBM Informix
Kkonnect.io
MySQL
Oracle Data Guard
Oracle Database
Oracle E-Business Suite
Oracle Exadata
SQL Server
Sandfly Security
TSM
Trellix Security Platform
Trellix XDR

Integrations

Cisco Multicloud Defense
IBM Db2
IBM Informix
Kkonnect.io
MySQL
Oracle Data Guard
Oracle Database
Oracle E-Business Suite
Oracle Exadata
SQL Server
Sandfly Security
TSM
Trellix Security Platform
Trellix XDR

Integrations

Cisco Multicloud Defense
IBM Db2
IBM Informix
Kkonnect.io
MySQL
Oracle Data Guard
Oracle Database
Oracle E-Business Suite
Oracle Exadata
SQL Server
Sandfly Security
TSM
Trellix Security Platform
Trellix XDR
Claim Oracle Advanced Security and update features and information
Claim Oracle Advanced Security and update features and information
Claim Oracle Data Masking and Subsetting and update features and information
Claim Oracle Data Masking and Subsetting and update features and information
Claim Oracle Data Safe and update features and information
Claim Oracle Data Safe and update features and information
Claim Trellix Database Security and update features and information
Claim Trellix Database Security and update features and information