DBHawk Features
Top Rated DBHawk Alternatives
(175)
4.5 out of 5
Visit Website
Sponsored
DBHawk Categories on G2
Filter for Features
Administration
Supported Databases | Supports different database platforms and data types. Typically integrates with a variety of existing databases. | Not enough data | |
Data Management | Administrators can access and organize data related to incidents to produce reports or make data more navigable. | Not enough data | |
Logging and Reporting | Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing. | Not enough data | |
API / integrations | Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications. | Not enough data | |
Auditing | Documents access and alterations of the database for analytics and reporting. | Not enough data | |
Data Discovery | Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems. | Not enough data | |
Access Control | Supports LDAP Protocol to enable access control and governance. | Not enough data |
Governance
Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data | |
Access Management | Allows administrators to set user access privileges to permit approved parties to access sensitive data. | Not enough data | |
Multi-Factor Authentication | Requires a second level of authentication, such as sms messaging or customized tokens, to access data. | Not enough data |
Protection
Database Activity Monitoring | Documents the actions related to the database. Alerts users of incidents and abnormal activities and documents the access point. | Not enough data | |
Firewall | Protects database and sensitive information from a variety of attacks and malware threats. | Not enough data | |
Data Masking | Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. | Not enough data | |
Audits | Perform ad-hoc or ongoing IT audits at different levels of the company. | Not enough data |
Data Protection
Data Masking | Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties. | Not enough data | |
Data Encryption/Security | Manages policies for user data access and data encryption. | Not enough data | |
Data loss Prevention | Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest. | Not enough data | |
Anomoly Detection | Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns. | Not enough data | |
Sensitive Data Compliance | Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. | Not enough data |
Analysis
Cloud Gap Analytics | Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols. | Not enough data | |
Compliance Monitoring | Monitors data quality and send alerts based on violations or misuse. | Not enough data | |
User Analytics | Allows for reporting and documentation of individual user behavior and privileges. | Not enough data |
Maintenance
Data Migration | Allows data movement from one database to another. | Not enough data | |
Backup and Recovery | Provides data backup and recovery functionality to protect and restore a database. | Not enough data | |
Multi-User Environment | Allows users to access and work on data concurrently, supporting several views of the data. | Not enough data |
Management
Data dictionary | Stores the database metadata, that is the definitions of data elements, types, relationships etc. | Not enough data | |
Data Replication | Creates a copy of the database to maintain consistency and integrity. | Not enough data | |
Query Language | Allows users to create, update and retrieve data in a database. | Not enough data | |
Data Modeling | See feature definition | Defines the logical design of the data before building the schemas. | Not enough data |
Performance Analysis | Monitors and analyzes critical database attributes like query performance, user sessions, dead lock detail, system errors etc and visualize them on a custom dashboard. | Not enough data |
Security
Data Encryption | Encrypts and transforms data at the database from a readable state into a ciphertext of unreadable characters. | Not enough data | |
User Access Control | Allows restricted user acess to modify depending on the access level. | Not enough data |