iSecurity Field Encryption

iSecurity Field Encryption

Raz-Lee Security

About

Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. Whether you’re using Oracle Autonomous Database. Oracle Database Cloud Service (exadata, virtual machine, or bare metal), or Oracle Databases on-premises in your own data center, Data Safe delivers essential data security capabilities that help you reduce risk and improve security. Assess user risk by highlighting critical users, roles and privileges. Configure audit policies and collect user activity to identify unusual behavior. Discover sensitive data and understand where it is located. Remove risk from non-production data sets by masking sensitive data.

About

Oracle NoSQL Database is designed to handle high-volume, high-velocity data applications requiring low-latency responses and flexible data models. It supports JSON, table, and key-value data types, and operates both on-premise and as a cloud service. The database scales elastically to meet dynamic workloads and provides distributed data storage across multiple shards, ensuring high availability and rapid failover. It includes Python, Node.js, Java, C, C#, and REST API drivers for easy application development. Additionally, it integrates with Oracle products such as IoT, Golden Gate, and Fusion Middleware. Oracle NoSQL Database Cloud Service is a fully managed service, freeing developers from backend infrastructure management. Oracle NoSQL Database Cloud Service is a fully managed database service for developers who want to focus on application development without dealing with the hassle of managing the back-end hardware and software infrastructure.

About

Trellix Database Security finds and protects sensitive information in databases from accidental leakage and intentional exposure while maintaining security, optimizing performance, and managing access. Discover sensitive and proprietary information in databases across the environment. Improve regulatory compliance by blocking unauthorized access to sensitive data. Address vulnerabilities quickly, with little to no downtime. Monitor, log, and control database access, in addition to identifying and blocking potential threats before they can damage the environment. Perform automated scans to find supported databases and the sensitive data they contain. Identify and prioritize known vulnerabilities, and receive detailed remediation advice. Protect databases from known and unknown vulnerabilities without downtime. Stop intrusions and other exploits before they impact your environment.

About

iSecurity Field Encryption protects sensitive data using strong encryption, integrated key management and auditing. Encryption is vital for protecting confidential information and expediting compliance with PCI-DSS, GDPR, HIPAA, SOX, other government regulations and state privacy laws. Ransomware attacks any file it can access including connected devices, mapped network drivers, shared local networks, and cloud storage services that are mapped to the infected computer. Ransomware doesn’t discriminate. It encrypts every data file that it has access to, including the IFS files. Anti-Ransomware quickly detects high volume cyber threats deployed from an external source, isolates the threat, and prevents it from damaging valuable data that is stored on the IBM i while preserving performance.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Organizations that want to accelerate cloud adoption, achieve data privacy and compliance

Audience

Developers and businesses needing a solutions to manage their applications

Audience

Companies seeking a solution to find and defend databases and the information they contain

Audience

Companies that want to protect sensitive data using strong encryption

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

Oracle
Founded: 1977
United States
www.oracle.com/database/technologies/security/data-safe.html

Company Information

Oracle
Founded: 1977
United States
www.oracle.com/database/nosql/technologies/nosql/

Company Information

Trellix
Founded: 2022
United States
www.trellix.com/products/database-security/

Company Information

Raz-Lee Security
Founded: 1983
United States
www.razlee.com/field-encryption/

Alternatives

VMware NSX

VMware NSX

Broadcom

Alternatives

Alternatives

Alternatives

iSecurity Anti-Ransomware

iSecurity Anti-Ransomware

Raz-Lee Security
Halcyon.ai

Halcyon.ai

Halcyon

Categories

Categories

Categories

Categories

Integrations

C
C#
JSON
Java
Node.js
Oracle Database
Oracle IoT Intelligent Applications Cloud
Python
Trellix Security Platform
Trellix XDR

Integrations

C
C#
JSON
Java
Node.js
Oracle Database
Oracle IoT Intelligent Applications Cloud
Python
Trellix Security Platform
Trellix XDR

Integrations

C
C#
JSON
Java
Node.js
Oracle Database
Oracle IoT Intelligent Applications Cloud
Python
Trellix Security Platform
Trellix XDR

Integrations

C
C#
JSON
Java
Node.js
Oracle Database
Oracle IoT Intelligent Applications Cloud
Python
Trellix Security Platform
Trellix XDR
Claim Oracle Data Safe and update features and information
Claim Oracle Data Safe and update features and information
Claim Oracle NoSQL Database and update features and information
Claim Oracle NoSQL Database and update features and information
Claim Trellix Database Security and update features and information
Claim Trellix Database Security and update features and information
Claim iSecurity Field Encryption and update features and information
Claim iSecurity Field Encryption and update features and information