Advertisement
  • SmartCryptor 
     0

    Software by PerfectCloud

    Encrypt your data and securely share it with others

     
  • SmartCryptor helps you encrypt your data so that you can store them securely on any cloud storage. You can also share it with others anytime, using any device and retain complete control over who has authority to decrypt and access the data.

    Learn more about SmartCryptor →

    Compare    
  • CloudPassage Halo 
     0

    Software by CloudPassage

    Automate Your Cloud Infrastructure Security

     
  • CloudPassage Halo is the first cloud server security platform with utility pricing that automates security across private, public and hybrid cloud environments, and even your data center.

    Learn more about CloudPassage Halo →

    Compare    
  • Cloudflare 
     0

    Software by Cloudflare

    Performance & Security for Any Website

     
  • CloudFlare protects and accelerates any website online. Once your website is a part of the CloudFlare community, its web traffic is routed through an intelligent global network. The delivery of your web pages is automatically optimized so your visitors get the fastest page load times and best performance.

    Learn more about Cloudflare →

    Compare    
  • SAS Anti-Money Laundering 
     0

    Software by SAS Institute Inc.

    SAS Anti-Money Laundering

     
  • Take a risk-based approach to monitoring transactions for illicit activity. Only SAS delivers high-performance analytics and multiple detection methods so you can monitor more risks – in very large data volumes – in minutes, not hours, to comply with anti-money laundering and counterterrorist financing regulations. And safeguard your institution’s reputation.

    Learn more about SAS Anti-Money Laundering →

    Compare    
  • Fiserv 
     0

    Software by Fiserv

    Financial crime risk management

     
  • We are focused on the financial industry, transforming how banks, credit unions and thrifts serve their tech savvy customers. Choose Fiserv as your partner to gain vital, innovative technology expertise in information management products, services, and practices. Our Financial Crime Risk Management solutions reside on a common platform featuring an integrated real-time detection engine to deliver advanced integration, modelling, detection and resolution capabilities.

    Learn more about Fiserv →

    Compare    
  • GDC Global Gateway 
     0

    Software by GDC

    Electronic Identity Verification Solution

     
  • Global Data Company uniquely specializes in ID and age verification, providing businesses with reliable data sources in more than 30 countries. Global Gateway pulls information from multiple data sources spread throughout the 3 billion records that GDC has access to through government and credit data, among others. While some verification providers use a single source solution, GDC prides itself on utilizing all of the tools are our disposal to give you accurate and reliable answers that adhere to strict regulations.

    Learn more about GDC Global Gateway →

    Compare    
  • Incapsula 
     1

    Software by Incapsula Inc.

    Safer, Faster Website

     
  • "With its ability to optimize, protect and enhance just any site in a way that is both fast and cost-effective, Incapsula stands as one of these services that webmasters are bound to try out at one point or other in their lives." (killerstartups_com) Incapsula gives any website the security and performance previously only available to the website elite. Through a simple DNS settings change, website traffic is seamlessly routed through Incapsula’s global network of high-powered servers allowing Incoming traffic to be intelligently profiled, in real-time, blocking even the latest web threats, ranging from sophisticated SQL injection attacks to malicious bots and intruding comment spammers. Meanwhile, outgoing traffic is accelerated and optimized for faster load times, keeping welcome visitors speeding through. In short, Incapsula keeps the good traffic flowing through fast and the bad traffic securely out. Pricing: Get your FREE 30-day trial today!

    Learn more about Incapsula →

    Compare    
  • Bizmanualz Onpolicy.com 
     0

    Software by Bizmanualz, Inc.

     

     
  • Easily maintain policy and procedure compliance with online shared documents. Simple document workflows, email notifications, and required reading options streamline your compliance for one low monthly subscription. Track your document's life cycle and produce audit trails in conformance with ISO, JCAHO, CFR, ITIL, and other standards — all from a secure, backed-up SAS70/II server. You don't have to reinvent best practices using the Bizmanualz Policies and Procedures Library. Thousands of MS-Word files are instantly available, all pre-loaded, covering your most critical compliance departments: * Accounting & Finance * Computer & IT * ISO 9000 Quality * Security & Disaster * Human Resources * Sales & Marketing Thousands of Bizmanualz customer experiences are built into Bizmanualz Onpolicy from the ground up. Since 1995, Bizmanualz has deployed the most complete set of policies and procedures templates available.

    Learn more about Bizmanualz Onpolicy.com →

    Compare    
  • OpSource Application Operations 
     0

    Software by OpSource

     

     
  • OpSource Application Operations provide application management solutions that help clients to scale their SaaS and web-based programs. Application Operations is a result of our best practices and consistent architectures that have been developed by working with lots of SaaS ISVs. OpSource provides Application Operations to lots of clients that support millions of end-users. Application Operations are available in conjunction with both Managed Hosting and Cloud Hosting environments.

    Learn more about OpSource Application Operations →

    Compare    
  • IdentiFlo 
     0

    Software by Electronic Verification Systems

    Comprehensive Fraud Prevention, Identity Verification and Authentication

     
  • EVS knows that identity fraud prevention measures are most effective when fully integrated with the interactions that occur between a business and their customers. The identity verification solutions offered by EVS provide the flexibility, simplicity, and value required to empower businesses to realize this level of integration.

    Learn more about IdentiFlo →

    Compare    
  • Hosted FTP Cloud File Sharing 
     0

    Software by Hosted FTP

     

     
  • Hosted FTP provides an easy upgrade path from our Personal account all the way up to our Enterprise account. Our accounts offer you pay as you go, cancel anytime, no risk file sharing, No quotas or upgrades. If you require additional storage beyond what is included in your account just go ahead and use more. When you no longer require additional storage your monthly fee is automatically reduced. We include your own Cloud FTP Server, Wordpress Plug In as well as all the tools to help your company manage files in the cloud.

    Learn more about Hosted FTP Cloud File Sharing →

    Compare    
  • Kontrollbase 
     0

    Software by Kontrollsoft LLC

     

     
  • Monitoring, analytics, reporting, and historical analysis webapp for MySQL database administrators and advanced users of MySQL databases. It is an enterprise grade application that is built on the open-source software model and features advanced frameworks (CodeIgniter, ExtJS) to provide you with the tools to automate the administration of hundreds and even thousands of database servers.

    Learn more about Kontrollbase →

    Compare    
  • EMBASSY Remote Administration Server 
     0

    Software by Wave Systems

     

     
  • Enables centralized IT administration to remotely deploy and manage PC clients that are secured with hardware or software encryption technologies. ERAS remotely manages any or all of the following hardware and software security environments: Self-encrypting hard drives by Seagate and Samsung, OPAL-compliant self-encrypting hard drives from any manufacturer, SafeNet ProtectDrive FDE software for systems that do not contain self encrypting hard...

    Learn more about EMBASSY Remote Administration Server →

    Compare    
  • DataWall 
     0

    Software by Secerno

     

     
  • Data Security and Database Activity Monitoring for SQL databases. Intrusion Detection (IDS) + Intrusion Prevention (IPS) Products

    Learn more about DataWall →

    Compare    
  • EMBASSY® Authentication Server 
     0

    Software by Wave Systems

     

     
  • Provides centralized management, provisioning and enforcement of multifactor domain access policies. With EAS, authentication policies can be based on Trusted Platform Module (TPM) credentials, Smart Card credentials, user passwords and fingerprint templates. All major PC manufacturers ship PCs with embedded TPM hardware. Embedded TPM hardware provides secure storage and secure transactions for PKI credentials. TPM-based authentication with...

    Learn more about EMBASSY® Authentication Server →

    Compare    
  • Central Console Software: SE2000 Series 
     0

    Software by Bosch

     

     
  • Controls system operation and houses databases. The software shows the security dispatcher a display with the user or asset location during an alarm event.

    Learn more about Central Console Software: SE2000 Series →

    Compare    
  • LogLogic Portfolio 
     0

    Software by Loglogic

     

     
  • Suite of log and security management products

    Learn more about LogLogic Portfolio →

    Compare    
  • RedFox Crypto chip 
     0

    Software by Fox-IT

     

     
  • Crypto chip for the provision of hardware-based encryption.The RedFox Crypto chip is the successor to the current generation of crypto chips used to protect state secrets. Its main benefits are a wider range of applications and faster processing speeds.

    Learn more about RedFox Crypto chip →

    Compare    
  • EMBASSY® Key Management Server 
     0

    Software by Wave Systems

     

     
  • Server software product for secure backup and restoration of protected keys from one TPM-enabled system to another according to security policies defined on the server. The KTM client software formats TPM-secured keys into individual migration packages and securely transmits them to the server for storage and subsequent recovery. Retrieval of the archived information requires authorized access based upon the enterprise?s security policy settings.

    Learn more about EMBASSY® Key Management Server →

    Compare    
  • Enterprise Data Protection 
     0

    Software by Safenet

     

     
  • This core-to-edge encryption secures databases, applications, file servers and endpoint devices and includes centralized key management and policy control to achieve true enterprise data protection.

    Learn more about Enterprise Data Protection →

    Compare    
  • Hedgehog Enterprise 
     0

    Software by Sentrigo

     

     
  • It is a scalable database activity monitoring and intrusion prevention solution.

    Learn more about Hedgehog Enterprise →

    Compare    
  • Ingres Icebreaker ECM 
     0

    Software by Ingres

     

     
  • Integrated solution that combines linux and the Ingres 2006 database into an integrated install. Only those portions of the Linux operating system needed for the Ingres 2006 database are included in Icebreaker. The resulting benefits of the Icebreaker simplified stack include: One implementation instead of two. One maintenance stream instead of two - throughout the solution lifecycle. A smaller footprint. Enhanced security. Fewer QA cycles...

    Learn more about Ingres Icebreaker ECM →

    Compare    

Filter this search


Devices supported
Geographies served
Pricing model
Customer types
Platforms

Advertisement
Advertisement
Advertisement

What is Database Security Monitoring Software?

Find the best Database Security software, compare and choose your Database Security solution. All the best Database Security Monitoring software, applications and tools with user reviews and ratings. GetApp.com provides quality software, SaaS and Cloud listings for Database Security.

Database Security Monitoring Software Comparison

Use GetApp to find the best database security monitoring software and services for your needs. Our intuitive directory allows you to make an easy online database security monitoring software comparison in just a few minutes by filtering by deployment method (such as Web-based, Cloud Computing or Client-Server), operating system (including Mac, Windows, Linux, iOS, Android) pricing (including Free, Freemium, Subscription), platform (including Google Apps, Salesforce, Intuit, NetSuite, SAP) and supported location.


Database Security Monitoring Features

Refine your search for Database Security Monitoring Software


Page last modified