Database Audit provides the Database Audit function in a bypass mode, enabling the system to generate real-time alarms for risky operations. In addition, Database Audit generates compliance reports that meet data security standards. In this way, it locates internal violations and improper operations, protecting data assets.
Comprehensive Protocol Support
l Supports over 40 protocols, including relational protocols, non-relational protocols, big data protocols, and other common protocols.
l Supports common database systems at home and abroad, including traditional database systems, big data systems, and Web systems.
Database Security Analysis
Database Audit has rich vulnerability rules built-in, which can detect unusual configuration items and security vulnerabilities of the database through rule matching during the audit process, and provide practical security suggestions and audit rules based on the vulnerabilities.
Intelligent Correlation Analysis
Database Audit can extract the specific request URLs, POST/GET values, business accounts, original client IP addresses, MAC addresses, and submission parameters from the protocol traffic of the Web business and the database at the same time. Through intelligent and automatic multi-layer association, Database Audit can find out the URL corresponding to each SQL statement and its original client IP address and other clues to trace back to the source.
Bidirectional Audit
Bidirectional audit includes not only basic information such as the execution status of a SQL statement, and the returned number of rows, execution duration but also the result content returned from the database.
Simple and Easy to Use
The bypass deployment method is simple and quick to deploy Database Audit. This method requires an audit server to be set up independently of the database server to capture database operations and log information in a bypass manner, implementing real-time monitoring and recording for the database. It is convenient for users to get started quickly and simple to operate database instances.
Comprehensive Audit for eSurfing Cloud's Self-built Databases
Database Audit supports the audit of self-built databases on the management console and is also compatible with common databases at home and abroad.
Database Behavior Model Analysis
Database Audit builds a database behavior model through automatic learning. The behavior model is based on a summary-detail logical analytical mode and displays the behavior status of the entire database layer by layer. By analyzing changes using the behavior model, users can easily grasp the access trends up to date.