Updated on 2025-08-12 GMT+08:00

Data Asset Protection Overview

Data asset protection provides data masking, data watermarking, database audit, database encryption, cloud bastion host, and API data security protection to ensure your asset security. You can purchase and use these services as required.

  • After purchasing DSC Professional Edition, you can use basic data masking and watermarking. For details, see Data Masking Overview and Data Watermarking Overview.
  • After purchasing database audit, you can use the database audit function. Database audit records user access to databases in real time, generates fine-grained audit reports, and generates alarms for risky behaviors and attacks in real time.
  • After purchasing database encryption, you can use the database encryption function. Database encryption provides the Transparent Data Encryption (TDE) capability for RDS or third-party relational databases. Sensitive data is encrypted and stored based on the gateway proxy encryption technology.
  • After purchasing CBHs, you can use the CBH functions. CBH uses a unified O&M login entry and the protocol-based forward proxy and remote access isolation technologies to centrally manage and audit cloud resources, such as servers, cloud hosts, databases, and application systems.
  • After purchasing API data security protection, you can use the API data security protection function. API Data Security Protection automatically sorts out application APIs to implement fine-grained access control, API exception risk detection, API sensitive data detection, masking, and watermarking.

Data Asset Protection

For details on data asset protection functions, refer to this section.