Database Audit

Database Audit is designed to monitor, record, and analyze database activities. Based on intelligent database protocol parsing and accurate SQL parsing technology, it can identify and root out all potential risks and hidden dangers during database operation by auditing and tracing comprehensive database behaviors, ensuring the security of the cloud database. Database Audit is also a powerful tool for enterprises to guarantee compliance.

  • Product Advantages
  • Features
  • Scenarios
  • Help

Product Advantages

Real-time monitoring and alarm

Provides real-time monitoring capabilities to promptly detect and alert you of abnormal database activities, and helps you cope with potential security threats in short order.

Comprehensive audit and record

Audits and records all database behaviors, including user login, query, modification, and deletion, which provides comprehensive audit traceability for the security team.

Event tracing and accurate responsibility identification

Conducts in-depth analysis from multiple dimensions such as behavior, risk, statement, session, and database assets, supports dozens of retrieval conditions and multiplex drill-down and analysis, and helps you trace the source of risks.

Compliance with policies

Assists you in ensuring security compliance through a variety of means, and abiding by the security compliance requirements under relevant policies and regulations.

Features
Comprehensive audit of data assets Supports domestic and foreign mainstream databases, non-relational databases, and data warehouses. Obtains information on database sessions and operation behaviors by parsing communication protocols and analyzing SQL syntax, with records generated and saved.
Audit of database operation behaviors Through the parsing, identification, and restoration of bidirectional traffic packets, supports both the real-time audit of database operation requests and the audit of the responses from database systems, covering dozens of session and statement information such as client information, database information, object information, and SQL statement information.
Real-time awareness of database risks Configures rules for access operations, such as abnormal access or login, permission changes, high-risk operations, sensitive data access, batch data leakage, SQL injection, and database vulnerability attacks, laying a solid foundation for post-tracing and risk triggering.
Multi-dimensional statistics and analysis The system provides the multi-dimensional audit and record functions for global or single audit objects, and periodically collects statistics on the audited data such as sessions, statements, risks, and statement templates to help users conduct multi-dimensional analysis, perceive risks, and trace risk sources.
Database audit reports The system has rich built-in report templates, which meet the relevant requirements for database security audit, such as level protection. You can also customize the report content as appropriate.
System monitoring and alarm In addition to database monitoring and auditing, the system also monitors its own running status in real time. The metrics mainly include the hardware resources, database traffic, and health status of software modules.

Scenarios

< >
  • Response to Compliance Requirements
  • Audit of Self-managed Databases
Scenario
  • In response to the requirements of industry policies, Database Audit covers the security audit of database systems, with rich built-in reports to quickly and easily pass compliance reviews.
Advantages
  • Security information statistics
  • Periodic statistics of the entire network security information provide a powerful custom report function, which allows for free customization from the global overview to the specific information of each instance, meeting the personalized statistical requirements of different enterprises.
  • Report download
  • Provides multiple report templates, generates reports based on business requirements, and supports the setup of report execution tasks to facilitate periodic report generation.