- Home
- IBM Netezza
DataSunrise Data Security and Compliance for IBM Netezza
DataSunrise for IBM Netezza offers tools to address database security threats that compromise critical business data: capabilities for continuous database audit and real-time detection of SQL injections and unauthorized access, sensitive data discovery, masking and automation compliance functionalities for improved data privacy.
Supported Versions: 6.0 and higher
Two-factor authentication
Full compliance
Technical support
DataSunrise Web Console at a Glance
Logical web console designed to intuitively set and manage your database security and compliance policies
Download FreeDataSunrise Supported Features for IBM Netezza
- Activity Monitoring
- Database Firewall
- Data Masking
- Database Regulatory Compliance
- Sensitive Data Discovery
- Sniffer
- Authentication Proxy
- Activity Monitoring
- Monitors of all user actions made to a database in real time
- Helps to detect access rights abuse attempts
- Prevents data breach preparations in advance
- Learn More
- Database Firewall
- Detects SQL injections and unauthorized access attempts in real time
- Blocks any malicious SQL query immediately
- Blocks DDOS and Brute-Force attempts
- Learn More
- Data Masking
- Avoids a potential data leakage and stay in compliance
- Obfuscates or encrypts the data
- Audits sensitive and PII data, discovery and active protection
- Learn More
- Database Regulatory Compliance
- Helps managing, automating and administrating the government regulations
- Automatic audit and security reports generation
- Prevents internal threats and minimizes data breaches
- Learn More
- Sensitive Data Discovery
- Detects where sensitive data resides in all databases and data warehouses
- Classifies and categorizes sensitive data
- Quickly creates security, audit and masking rules
- Learn More
- Sniffer
- Logs all database events
- Encrypted traffic is not supported on Oracle
- Defines monitoring policies for separate database objects
- Learn More
- Authentication Proxy
- Database-as-a-Service platforms provide access to the database without the need for implementing physical hardware and installing software. Many organizations choose cloud databases due to their scalability, advantageous pricing, and rapid provisioning. However, there are some essential issues that could dissuade them from using DBaaS. Cloud database providers are responsible for the security of data stored on hosted databases but they cannot protect against impersonation and account hijacking attacks.
- Learn more
Customizable Traffic Filtering
Creating granular security, audit, and compliance policies with modifiable traffic filters. Handle queries from certain users, client applications, hosts, and IP addresses as a single object, grouping them together.
Regulatory Compliance Automation
Accurately discover sensitive data to enforce security, masking, and auditing policies to meet certain compliance standards. Self-managing regulatory compliance automation requires no manual intervention.
Comprehensive Threat Detection
Real-time access and activity control to ensure malicious database activity identification, automatic detection and instant blocking of statements containing SQL injections.
Additional Authentication Methods
DataSunrise provides a secure authentication service for computer networks and supports Kerberos and LDAP authentication. All major operating systems, including Microsoft Windows, Linux, Apple OS X and Free BSD, support Kerberos protocol and LDAP.
Keep Your IBM Netezza Database Safe with DataSunrise
Request a DemoFind Your Unique Solution
1. Select Product Type
2. Select Supported Databases
- Activity Monitoring
- Database Firewall
- Data Masking
- Performance Monitoring
- Sensitive Data Discovery
1. Select Product Type
2. Select Supported Databases
Read More on the Topic
How to Audit Administrative Actions in Your Oracle RDS and EC2
Learn MoreAWS Market Commercial
Learn MoreHelp Yourself to Some Database Security in the Cloud
Learn More