Pre-configured characters are used to partly or fully replace sensitive data based on masking rules.
The Database Security Service (DBSS) is a security service that protects databases on clouds. Based on the reverse proxy and machine learning technologies, it provides functions such as data masking, database auditing, sensitive data discovery, and injection attack prevention.
Based on a user's permissions and a policy, sensitive or personal data is dynamically masked in real time, without the need to modify the database or application (stored procedures and views can also be masked).
An intrusion detection system (IDS) monitors network transmissions in real time and sends alarms when it detects suspicious transmissions.
An intrusion prevention system (IPS) is used between a firewall and a network device. When detecting an attack, the IPS stops the malicious communication before the attack spreads in the network.
Learning mode is the process of analyzing applications' access to databases, establishing a baseline for typical database access patterns, and creating a security policy from those patterns.
Based on TCP/IP, the Lightweight Directory Access Protocol (LDAP) is a protocol that allows access to the Directory System Agent (DSA). LDAP involves some simplified functions of X.500.
The regular expression is a simple and flexible method to specify and identify text character strings (for example, certain characters, words, or character modes). A regex mode is an object containing the following fields: name and regex-defined character string.
Risk profiles are action groups configured for risky operations. Different actions (allowing and blocking) are configured for different operations (such as viewing, modifying, creating, deleting, and running) on objects such as servers, databases, and service blocks. In addition, whether or not the action is logged is also configured. You can use risk profiles to create risk-based IPS/IDS policies.
Thank you for your score！Your feedback would help us improve the website.