Database Audit provides you with the database security auditing function in a bypass mode. It records user access to the database in real time, generates fine-grained audit reports, and sends real-time alarms for high-risk operations and attacks. In addition, Database Audit generates compliance reports that meet data security standards (e.g., Sarbanes-Oxley) to locate internal violations and improper operations, thus ensuring data asset security.
Supported Database Types
Database Protocol | Database Type |
Domestic Database Protocol | DM, GBase, Kingbase, OSCAR, K-DB, OceanBase, PolarDB, PolarDB-X, TiDB, AnalyticDB, GaussDB, HighGo DB, Percona, Vastbase, teleDB-MySQL, and teleDB-PostgreSQL. |
Mainstream Database Protocol | Oracle, MySQL, DB2, SQL server, PostgreSQL, Informix, MariaDB, Sybase ASE, Teradata, Sybase IQ, HANA, libra, Vertica, and Clickhouse. |
Non-relational Protocols | MongoDB, Redis, Graphbase, ArangoDB, OrientDB, and Neo4j. |
Big Data Protocols | Hive, Hbase(Thrift), Hbase(Protobuf), Spark SQL(RESTful), Spark SQL(Thrift), GreenPlum, Cassandra, Impala, SSDB, HDFS, TDSQL-C, TBase, and MAX COMPUTE. |