Show rating breakdown
Save to My Lists
Claimed
Claimed

Top Rated iSecurity DB-Gate Alternatives

iSecurity DB-Gate Reviews & Product Details

Lankit P.
LP
AWS DevOps Engineer | Full-stack Laravel Developer
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
(Original )Information
What do you like best about iSecurity DB-Gate?

Native SQL queries do the work. Traditionally, one has to write some API integration code. This code then requires a specific type of Query language. All this can be thrown out of the window along with the steep learning curve for each DB. DB-gate makes it seamless to integrate all this backend using ODBC drivers. i like the way i can just focus on code instead of managing DB. Review collected by and hosted on G2.com.

What do you dislike about iSecurity DB-Gate?

However good the solution is, it is not open source. It's developed and managed by IBM. as a profit-oriented company; it will impose some type of paywall. Other than that, It creates a vendor locking, due to which we're bound to IBM. Review collected by and hosted on G2.com.

What problems is iSecurity DB-Gate solving and how is that benefiting you?

It solves the problem of integration multiple database architectures into one. Usually, if one undertakes this operation, they must undergo a steep & separate learning curve for each option they're opting for. DB-Gate handles the heavyweight here. Review collected by and hosted on G2.com.

iSecurity DB-Gate Overview

What is iSecurity DB-Gate?

DB-Gate empowers IBM i customers with exciting data access capabilities, based on Open Database Connectivity (ODBC), employing standard IBM i facilities to enable fully database-transparent access to remote systems.

iSecurity DB-Gate Details
Show LessShow More
Product Description

DB-Gate empowers IBM i customers with exciting data access capabilities, based on Open Database Connectivity (ODBC), employing standard IBM i facilities to enable fully database-transparent access to remote systems.


Seller Details
Year Founded
1983
HQ Location
Nanuet, NY
Twitter
@razleesecurity
503 Twitter followers
LinkedIn® Page
www.linkedin.com
20 employees on LinkedIn®

AS
Overview Provided by:

Recent iSecurity DB-Gate Reviews

SD
Samar D.Enterprise (> 1000 emp.)
3.5 out of 5
"Average"
DB-gate simplifies the integration process between APIs and databases by eliminating the need for writing API integration code and the requirement ...
Lankit P.
LP
Lankit P.Small-Business (50 or fewer emp.)
3.5 out of 5
"old school SQL + bleeding edge databases = no learning curve & powerfull DB 🥳"
Native SQL queries do the work. Traditionally, one has to write some API integration code. This code then requires a specific type of Query languag...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

iSecurity DB-Gate Media

Answer a few questions to help the iSecurity DB-Gate community
Have you used iSecurity DB-Gate before?
Yes

1 out of 2 Total Reviews for iSecurity DB-Gate

3.5 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
G2 reviews are authentic and verified.
SD
Associate Engineer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about iSecurity DB-Gate?

DB-gate simplifies the integration process between APIs and databases by eliminating the need for writing API integration code and the requirement of learning different query languages for each database. Instead, native SQL queries can be used, and the focus can be on coding rather than managing databases, thanks to the use of ODBC drivers. Review collected by and hosted on G2.com.

What do you dislike about iSecurity DB-Gate?

Although the solution may be highly effective, it is not publicly accessible as it is developed and managed by IBM, a profit-driven organization. This means that access to the solution will likely require some sort of financial commitment in the form of a paywall. This presents a major issue, as it creates vendor lock-in, effectively limiting our options and tying us exclusively to IBM. This not only restricts our ability to explore alternative solutions but also limits our flexibility in choosing the best solution for our specific needs and budget. The lack of open-source access may also prevent other developers and organizations from contributing to the solution's ongoing development, which could limit its overall potential. Review collected by and hosted on G2.com.

What problems is iSecurity DB-Gate solving and how is that benefiting you?

DB-Gate is designed to address the challenge of integrating multiple database systems into a unified platform. Without it, individuals and organizations attempting to bring together different databases must navigate a complex and steep learning curve for each option they choose to integrate. DB-Gate takes on this heavy workload and provides a simple, streamlined solution that eliminates the need for extensive technical knowledge or extensive resources. With DB-Gate, the process of integrating multiple databases is simplified and made much more manageable. This allows organizations to focus on the benefits of having a unified database environment, such as increased efficiency and data consistency, rather than struggling with the complexities of bringing multiple systems together. Review collected by and hosted on G2.com.

There are not enough reviews of iSecurity DB-Gate for G2 to provide buying insight. Below are some alternatives with more reviews:

1
SAP SQL Anywhere Logo
SAP SQL Anywhere
4.1
(85)
SAP SQL Anywhere SQL database management software keeps data synchronized with thousands of mobile devices or remote offices, so that all business users can access vital data – anytime, anywhere.
2
Satori Data Security Platform Logo
Satori Data Security Platform
4.8
(74)
The Satori Data Security Platform is a highly-available and transparent proxy service that sits in front of your data stores (databases, data warehouses and data lakes).
3
Oracle Data Safe Logo
Oracle Data Safe
4.3
(63)
Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. Whether you’re using Oracle Autonomous Database or Oracle Database Cloud Service (Exadata, Virtual Machine, or Bare Metal), Data Safe delivers essential data security capabilities as a service on Oracle Cloud Infrastructure.
4
HashiCorp Vault Logo
HashiCorp Vault
4.3
(45)
HashiCorp Vault is a tool that secure user applications and infrastructure to limit the surface area and attack time in the event of a breach
5
McAfee Vulnerability Manager for Databases Logo
McAfee Vulnerability Manager for Databases
4.3
(41)
McAfee Vulnerability Manager for Databases automatically discovers databases on your network, determines if the latest patches have been applied, and tests for common weaknesses.
6
McAfee Data Center Security Suite for Databases Logo
McAfee Data Center Security Suite for Databases
4.3
(33)
Maximum data security, minimal impact on hardware resources
7
IBM Guardium Data Detection and Response Logo
IBM Guardium Data Detection and Response
4.4
(32)
Enhance your visibility and protection, understand risk, and uncover hidden threats by centralizing data security and audit data
8
DBHawk Logo
DBHawk
4.9
(25)
DBHawk provides seamless access to heterogeneous database platforms. Its central database security, access control, and auditing capabilities allow companies to comply with regulations. Its many flexible customization features make the total value of ownership much higher than any other SQL Data Analytics/Business Intelligence tools in the market.
9
Oracle Audit Vault and Database Firewall Logo
Oracle Audit Vault and Database Firewall
4.4
(25)
Oracle Audit Vault and Database Firewall monitors Oracle and non-Oracle database traffic to detect and block threats, as well as improves compliance reporting by consolidating audit data from databases, operating systems, directories, and other sources.
10
SQL Secure Logo
SQL Secure
4.2
(21)
SQL Secure does not install any components, DLLs, scripts, stored procedures or tables on the SQL Server instances being monitored.
Show More