Oh no! Some styles failed to load. 😵 Please try reloading this page

Database Security Software

Compare the Top Database Security Software of 2021

Database Security Software Guide

What is Database Security Software?

Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations. Compare the best Database Security software currently available using the table below.

  • 1
    ScaleGrid

    ScaleGrid

    ScaleGrid

    ScaleGrid is a fully managed Database-as-a-Service (DBaaS) platform that helps you automate your time-consuming database administration tasks both in the cloud and on-premises. Easily provision, monitor, backup and scale your open source databases with high availability, advanced security, full superuser and SSH access, query analysis, and troubleshooting support to improve the performance of your deployments. Supported databases include: - MySQL - PostgreSQL - Redis™ - MongoDB® database - Greenplum™ (coming soon) The ScaleGrid platform supports both public and private clouds, including AWS, Azure, Google Cloud Platform (GCP), DigitalOcean, Linode, Oracle Cloud Infrastructure (OCI), VMware and OpenStack. Used by thousands of developers, startups, and enterprise customers including Atlassian, Meteor, and Accenture, ScaleGrid handles all your database operations at any scale so you can focus on your application performance.
    Starting Price: $8 per month
    View Software
    Visit Website
  • 2
    Immuta

    Immuta

    Immuta

    Immuta is the universal cloud data access control platform, providing data engineering and operations teams one platform to control access to analytical data sets in the cloud. Only Immuta can automate access control for any data, on any cloud service, across all compute infrastructure. Data-driven organizations around the world rely on Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA.
  • 3
    Imunify360

    Imunify360

    CloudLinux, Inc.

    Imunify360 is a security solution for web-hosting servers. Imunify360 goes beyond antivirus and WAF and is a combination of an Intrusion Prevention and Detection system, a Application Specific Web Application Firewall, Real-time Antivirus protection, a Network Firewall, and Patch Management components in one security suite. Imunify360 is a fully-automated solution and it collects all statistics under an intuitive dashboard.
    Starting Price: $12
  • 4
    SQL Secure

    SQL Secure

    IDERA, an Idera, Inc. company

    SQL Secure helps database administrators to manage SQL Server security in physical, virtual, and cloud environments - including managed cloud databases. Unlike its competition, it provides configurable data collection, customizable templates to satisfy audits for multiple regulatory guidelines, extensive security checks and audit rules, automated server registration process, and server group tagging.
    Starting Price: $1,036 per instance
  • 5
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
    Starting Price: $159 per month
  • 6
    Acra

    Acra

    Cossack Labs

    Data leakage prevention in your app made simple. Acra encryption suite provides data protection in distributed applications, web and mobile apps with PostgreSQL, MySQL, KV backends through selective encryption. Encryption of sensitive and personal data is mandated by regulations (GDPR, HIPAA, CCPA, PCI DSS) and industry best practices. However, building cryptography into distributed application is often a tedious task, which has a limited security impact and plenty of architectural trade-offs. Acra is here to change it. Acra is one tool that covers 9 data security controls. Acra is built to mitigate data leakage risks while providing defense in depth across the whole data lifespan within the application. Acra is easy to integrate, doesn't require significant modifications in the existing code, provides reliable data security, reduces MTTD and MTTR. Acra provides an integration library that can encrypt any record with AcraServer’s key.
    Starting Price: $10000 per year
  • 7
    Enzoic

    Enzoic

    Enzoic

    Enzoic for Active Directory enables password policy enforcement and daily exposed password screening to secure passwords in Active Directory. With a fully automated compromised password detection, custom password dictionary, blocking of username derivatives, fuzzy matching with common character substitutions, and continuous ongoing monitoring; enterprises can easily adopt NIST password requirements and eliminate vulnerable passwords in Active Directory. Enzoic’s simple plug-in uses a standard password filter object to create a new password policy that works anywhere that defers to Active Directory, including Azure AD and third-party password reset tools. When a new password is being created, a partial hash is evaluated against Enzoic’s massive, continuously updated database. A list of candidate hashes is returned for a local comparison and no data is stored by Enzoic.
  • 8
    SecretHub

    SecretHub

    SecretHub

    Upgrade security throughout the stack with a unified secrets management platform that every engineer can use – from admin to intern. Putting passwords and API keys in source code creates a security risk. But handling them properly creates complexity that makes it extremely cumbersome to deploy. Git, Slack, and email are designed to share information, not to keep secrets. Copy-pasting values and waiting on that one admin who holds all the keys simply don't scale when you're deploying software multiple times a week. It's impossible to track who accessed what secrets at what time, making compliance audits a nightmare. Eliminate secrets in source code by replacing plaintext values with a reference to the secret. SecretHub then automatically loads secrets into your app the moment it starts. Use the CLI to encrypt and store secrets and then simply tell the code where to look for the secret. Your code is now free of secrets and can be shared with everyone on your team.
    Starting Price: $99 per month
  • 9
    JackDB

    JackDB

    JackDB

    Write and execute queries in a fully interactive SQL editor. JackDB has everything you'd want in a database client, including: syntax highlighting, code formatting, and intelligent autocompletion. Snippets allow your most useful SQL queries to be saved and shared. Simply write and save any query in JackDB, and share the snippet publicly with your team. Whenever anyone updates a snippet, everyone gets access to its latest version. Security is our highest priority at JackDB. Roles are a very convenient and secure way to restrict database access to authorized users and provision new users with access to data sources. Explore everything in your database, not just tables and views. View your indexes, schemas, and other important system details such as tablespaces and user sessions.
    Starting Price: $49 per user per month
  • 10
    SAP SQL Anywhere
    Run your business from anywhere with relational database management system (RDBMS) solutions from SAP SQL Anywhere. Enable secure, reliable data management for servers where no DBA is available and synchronization for tens of thousands of mobile devices, Internet of Things (IoT) systems, and remote environments. Deliver critical business data to remote offices and mobile devices for more accurate, real-time decision-making at the front lines of your business. Run mobile applications reliably and efficiently without on-site technical staff, giving mobile and remote workers an always on experience, even when they are offline. Streamline data maintenance tasks with built-in self-managing features that help users resolve issues quickly and efficiently. Protect and secure your data, even during data transmission and exchange, with powerful encryption features.
    Starting Price: $195 per license
  • 11
    MyDiamo

    MyDiamo

    Penta Security Systems Inc.

    Developed by Penta Security Systems, an APAC leader in encryption technology and web application firewall, MyDiamo is a free open-source database encryption solution, available to all for non-commercial use. The commercial license is available for enterprises and organizations that desire extended features. - Column-level or partial encryption makes index searching possible - Guarantees minimal system performance changes - Compatible with open-source DBMS like MySQL, MariaDB, Percona, and PostgreSQL - GDPR/PCI-DSS/HIPAA compliant - No code modification, operates parallel at the engine level
  • 12
    Scuba Database Vulnerability Scanner
    Scuba Database Vulnerability Scanner. Download Scuba, a free tool that uncovers hidden security risks. Scan enterprise databases for vulnerabilities and misconfiguration. Know the risks to your databases. Get recommendations on how to mitigate identified issues. Available for Windows, Mac, Linux (x32), and Linux (x64), Scuba offers over 2,300 assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Scuba is a free tool that scans leading enterprise databases for security vulnerabilities and configuration flaws, including patch levels, that allows you to uncover potential database security risks. It includes more than 2,300 assessment tests for Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2 and MySQL. It’s possible to run a Scuba scan from any Windows, Mac or Linux client. Depending on your database size, users, groups and network connection, an average Scuba scan normally takes 2-3 minutes. No pre-installation or other dependencies are required.
  • 13
    SearchInform Database Monitor
    Database Monitor is a DAM (Database Activity Monitoring) solution for automated monitoring and audit of operations on databases and business applications. Unauthorised access or changes to information in corporate databases threatens a company with profit decrease, regulatory fines and deterioration of business reputation. After a conflict with a manager an employee removed details concerning a company’s turnover, contractors and financial information stored in a corporate database. Before a dismissal a chief accountant of a manufacturer uploaded to a flash drive all the accounting data within a reporting period. Subcontractor employee hacked a database of a telecommunication company and copied customers’ personal data for sale. The software logs all queries to databases and responses and check the collected information against introduced rules – security policies. In case they get violated the solution notifies specialists responsible for risk mitigation within a company.
  • 14
    Trustwave DbProtect
    A highly scalable database security platform that enables organizations to secure their relational databases and big data stores, both on premises and in the cloud, with a distributed architecture and enterprise-level analytics. Databases contain sensitive and proprietary information, making them a prized target for cybercriminals who are constantly looking for ways to access valuable data for large financial payoffs. Trustwave DbProtect helps your business overcome resource limitations to uncover database configuration errors, access control issues, missing patches, and other weaknesses that could lead to data leakage and misuse and other serious repercussions. A real-time view of database assets, vulnerabilities, risk levels, user privileges, anomalies and incidents via a single intuitive dashboard. The ability to detect, alert and take corrective action against suspicious activities, intrusions and policy violations.
  • 15
    Satori

    Satori

    Satori

    Satori created the first DataSecOps solution which streamlines data access while solving the most difficult security and privacy challenges. The Secure Data Access Service is a universal visibility and control plane across all data stores, allowing you to oversee your data and its usage in real-time while automating access controls. The service maps all of the organization’s sensitive data and monitors all data flows in real-time across all data stores. Satori enables your organization to replace cumbersome permissions with streamlined just-in-time data access workflows. It acts as a universal policy engine for data access by enforcing access policies, masking or anonymizing data, and initiating off-band access workflows. Satori integrates into your environment in minutes by simply replacing the data store URL. Since Satori’s solution is transparent, there is no need to change your existing data flows or data store configuration.
  • 16
    Oracle Data Masking and Subsetting
    The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.
    Starting Price: $230 one-time payment
  • 17
    Imperva Database Security
    Imperva delivers analytics, protection and response across all your data assets, on-premise and in the cloud - giving you the risk visibility to prevent data breaches and avoid compliance incidents. Pre-configured and extensible templates, policies, reports and more come “out-of-the-box�? for quick, continuous compliance and risk management – with no manual/DIY work required. Single pane of glass across distributed environments on-premise, in-cloud and multi-cloud to find ungoverned database instances, classify data, assess vulnerabilities, and investigate user activity. Detect both outsider and insider threats and automate response procedures. Consolidate reporting operations and get cost effective multi-year retention of audit and forensic records. Imperva Database Security unifies governance across on-premise and hybrid cloud environments and presents it all in a single view.
  • 18
    IBM Security Guardium Data Encryption
    Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Security Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
  • 19
    McAfee Data Center Security Suite for DB
    Perform a fully automated discovery of all databases within your environment to identify databases that contain sensitive data. Choose from a preconfigured defense or build a custom security policy to help address the specific requirements of your organization. Get actionable information to prioritize and remediate security gaps, saving time and money. Safeguard databases with a software solution that requires no architecture changes or costly hardware. Get a real-time view of activity, including local privileged user access and sophisticated attacks from within the database. Detect and prevent attempted attacks and intrusions in real time without requiring database downtime or application testing. Learn how to plan your deployment, install and upgrade the software, manage users, and more.
  • 20
    Oracle Advanced Security
    Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer. Encrypt individual data columns, entire tablespaces, database exports, and backups to control access to sensitive data. Data Redaction complements TDE by reducing the risk of unauthorized data exposure in applications, redacting sensitive data before it leaves the database. Partial or full redaction prevents large-scale extraction of sensitive data into reports and spreadsheets. Encryption is implemented at the database kernel level, eliminating the need for any changes to applications.
  • 21
    BladeLogic Database Automation
    BladeLogic Database Automation is a multi-platform database automation solution that enables database administrators to deploy, patch, upgrade and maintain databases in 1/10th the normal provisioning time. Thus, administrators get more time to support the rollouts of new apps. In today’s digital economy, innovative applications depend on fast-performing databases. Skilled database administrators spend a majority of their time ensuring the existing environments are well maintained, compliant, and secure. Security threats seek vulnerabilities at the database level, which put more pressure on IT to keep current on patches and compliance policies. This gives IT little time to optimize database configurations and queries or push out new features for application releases.
  • 22
    McAfee Vulnerability Manager for Databases
    Know exactly where risks are and how to minimize the likelihood of a breach by automatically discovering databases on the network. Get comprehensive and up-to-date checks of the most popular database platforms and reporting on meaningful criteria like version/patch level, changed objects, modified privileges, and forensic traces from common hacker tools. Use a variety of techniques to detect weak and shared passwords, including hashed passwords such as SHA-1, MD5, and DES. View reports for PCI DSS and other regulations, as well as specific reports for stakeholders such as database administrators (DBAs), developers, and InfoSec users. McAfee Vulnerability Manager for Databases is managed with McAfee ePolicy Orchestrator, providing centralized reporting and summary information for thousands of databases.
  • 23
    Huawei Database Security Service (DBSS)
    Database Security Service (DBSS) uses machine learning and big data technologies to protect your databases on the cloud, intelligently auditing them and detecting risky behaviors like SQL injection. Purchase and get started with DBSS quickly without the need to manually install the service or adapt your database configurations. DBSS complies with the HIPAA, SOX, and PCI DSS, meeting your auditing requirements. Take advantage of algorithm models to detect SQL injection and abnormal behaviors, fast and accurate. DBSS works in bypass mode, having zero impact on your business. A wide range of policies are available to help you detect SQL injection and audit database behaviors. Monitor databases and detect anomalies in performance, data, and user actions. Audit reports are customized for different scenarios (pre-event and post-event) and roles (common users and administrators). Perform comprehensive database audit to comply with laws and regulation.
  • 24
    DataSunrise Database Security
    Data-Centric high-performance database security software. Regulatory Compliance with SOX, HIPAA, GDPR, PCI DSS and other privacy laws and standards. Hybrid and Multi-Cloud Database Security Proxy on AWS, Azure, Google and On-Prem. Sensitive and PII data auditing, discovery and active protection. Data Auditing enables real-time tracking of user actions and changes made to data and databases to ensure compliance-ready environment, increased visibility. Database Firewall, role based & location aware Data Access Control & Protection. Secure corporate databases in cloud & on-prem against hostile, negligent actions. Secures sensitive data in development and testing environments; Encryption; completely eliminates the possibility to reverse engineer the masked data. Real-time role and location based data masking of production data. Prevents exposure of sensitive privacy data while production data is not changed physically.
  • 25
    Adabas & Natural

    Adabas & Natural

    Software AG

    In an age of ever-faster change, you need a forward-thinking partner with a vision. someone who can help you take your powerful Adabas & Natural applications to 2050 and beyond. You’ve relied on Adabas & Natural to get the job done—for decades. Look ahead to a future where you can continue to make the most of that investment and the unique business logic built into your core applications. We’re that partner, committed to helping you digitalize your legacy, fast and risk-free. Together, let’s manage the generational change of developers, modernize your applications to save costs, expand the reach of your core apps, and accelerate development in an ultra-modern environment. Count on leading-edge Adabas & Natural technologies to help you optimize your IT environment and modernize your applications, risk free and fast. Connect to new services with APIs. Run Adabas & Natural in the cloud. Attract new developer talent with DevOps. Save costs by offloading mainframe workload to zIIP.
  • Previous
  • You're on page 1
  • 2
  • Next