Show rating breakdown
Save to My Lists
Claimed
Claimed

DBHawk Features

Top Rated DBHawk Alternatives

Filter for Features

Administration

Supported Databases

Supports different database platforms and data types. Typically integrates with a variety of existing databases.

Not enough data

Data Management

Administrators can access and organize data related to incidents to produce reports or make data more navigable.

Not enough data

Logging and Reporting

Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.

Not enough data

API / integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Auditing

Documents access and alterations of the database for analytics and reporting.

Not enough data

Data Discovery

Unveils data connected to infrastructure and applications used to help manage and maintain compliance within complex IT systems.

Not enough data

Access Control

Supports LDAP Protocol to enable access control and governance.

Not enough data

Governance

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data

Access Management

Allows administrators to set user access privileges to permit approved parties to access sensitive data.

Not enough data

Multi-Factor Authentication

Requires a second level of authentication, such as sms messaging or customized tokens, to access data.

Not enough data

Protection

Database Activity Monitoring

Documents the actions related to the database. Alerts users of incidents and abnormal activities and documents the access point.

Not enough data

Firewall

Protects database and sensitive information from a variety of attacks and malware threats.

Not enough data

Data Masking

Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.

Not enough data

Audits

Perform ad-hoc or ongoing IT audits at different levels of the company.

Not enough data

Data Protection

Data Masking

Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.

Not enough data

Data Encryption/Security

Manages policies for user data access and data encryption.

Not enough data

Data loss Prevention

Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.

Not enough data

Anomoly Detection

Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.

Not enough data

Sensitive Data Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.

Not enough data

Analysis

Cloud Gap Analytics

Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.

Not enough data

Compliance Monitoring

Monitors data quality and send alerts based on violations or misuse.

Not enough data

User Analytics

Allows for reporting and documentation of individual user behavior and privileges.

Not enough data

Maintenance

Data Migration

Allows data movement from one database to another.

Not enough data

Backup and Recovery

Provides data backup and recovery functionality to protect and restore a database.

Not enough data

Multi-User Environment

Allows users to access and work on data concurrently, supporting several views of the data.

Not enough data

Management

Data dictionary

Stores the database metadata, that is the definitions of data elements, types, relationships etc.

Not enough data

Data Replication

Creates a copy of the database to maintain consistency and integrity.

Not enough data

Query Language

Allows users to create, update and retrieve data in a database.

Not enough data

Data ModelingView full feature definition

See feature definition
Defines the logical design of the data before building the schemas.

Not enough data

Performance Analysis

Monitors and analyzes critical database attributes like query performance, user sessions, dead lock detail, system errors etc and visualize them on a custom dashboard.

Not enough data

Security

Data Encryption

Encrypts and transforms data at the database from a readable state into a ciphertext of unreadable characters.

Not enough data

User Access Control

Allows restricted user acess to modify depending on the access level.

Not enough data