Data Asset Protection Overview
Data asset protection provides functions such as data masking, data watermarking, database audit, and CBHs, ensuring the security of your data assets. Purchase and use the functions as required.
- After purchasing DSC professional edition, you can use basic data masking and watermarking. For details, see Data Masking Overview and Data Watermarking Overview.
 - After purchasing database audit, you can use the database audit function. Database audit records user access to databases in real time, generates fine-grained audit reports, and generates alarms for risky behaviors and attacks in real time.
 - After purchasing CBHs, you can use the CBH functions. CBH uses a unified O&M login entry and the protocol-based forward proxy and remote access isolation technologies to centrally manage and audit cloud resources, such as servers, cloud hosts, databases, and application systems.
 
Data Asset Protection
For details on data asset protection functions, refer to this section.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.
    
      
