Overview

2024-08-21 02:10:56

Database Audit provides you with the database security auditing function in a bypass mode. It records user access to the database in real time, generates fine-grained audit reports, and sends real-time alarms for high-risk operations and attacks. In addition, Database Audit generates compliance reports that meet data security standards (e.g., Sarbanes-Oxley) to locate internal violations and improper operations, thus ensuring data asset security.

 Supported Database Types

Database Protocol

Database Type

Domestic Database Protocol

DM, GBase, Kingbase, OSCAR, K-DB, OceanBase, PolarDB,   PolarDB-X, TiDB, AnalyticDB,

GaussDB, HighGo DB, Percona, Vastbase, teleDB-MySQL, and   teleDB-PostgreSQL.

Mainstream Database Protocol

Oracle, MySQL, DB2, SQL server, PostgreSQL, Informix, MariaDB,   Sybase ASE, Teradata, Sybase IQ,

HANA, libra, Vertica, and Clickhouse.

Non-relational Protocols

MongoDB, Redis, Graphbase, ArangoDB, OrientDB, and Neo4j.

Big Data Protocols

Hive, Hbase(Thrift), Hbase(Protobuf), Spark SQL(RESTful),   Spark SQL(Thrift), GreenPlum, Cassandra, Impala, SSDB,

HDFS, TDSQL-C, TBase, and MAX COMPUTE.


P74HmFFoTg8F