Redis Cloud Features
Top Rated Redis Cloud Alternatives
(110)
4.6 out of 5
Visit Website
Sponsored
Redis Cloud Categories on G2
Filter for Features
Functionality
Monitoring | Monitors database functionality to verify baselines are maintained or exceeded. | Not enough data | |
Alerting | Sends alerts via email, text, phone, and more when an incident or issue occcurs. | Not enough data | |
Logging | Captures logs for all database functions to garner greater information around issues or failures. | Not enough data | |
Response Time | Monitors database query time for unusual execution times | Not enough data | |
Reporting | Manually and/or automatically generates reports covering database performance | Not enough data | |
Data Visualization | Follows database monitoring live information through graphical dashboards | Not enough data |
Data Management
Data Model | Stores data as key-value pairs where key is a unique identifier. | Not enough data | |
Data Types | Supports multiple data types like lists, sets, hashes (similar to map), sorted sets etc. | Not enough data | |
Data Model | Stores and queries data as JSON-like documents. | Not enough data | |
Data Types | Supports multiple data types like lists, sets, hashes (similar to map), sorted sets etc. | Not enough data | |
Built - In Search | Allows users to index at ingest and query endlessly across data. | Not enough data | |
Event Triggers | Notifies specific events like document inserts, updates, replaces, deletes etc and responds in real-time. | Not enough data | |
Data Model | Designed to store interconnected data consisting of nodes and edges. | Not enough data | |
Data Types | Supports multiple data types like lists, sets, hashes (similar to map), sorted sets etc. | Not enough data | |
Built - In Search | Allows users to index at ingest and query endlessly across data. | Not enough data | |
Event Triggers | Notifies specific events like document inserts, updates, replaces, deletes etc and responds in real-time. | Not enough data | |
Query Language | Powerful query language that allows users to access patterns like traversals, JOINs, search, geospatial etc. | Not enough data |
Availability
Auto Sharding | Implements auto horizontal data partitioning that allows storing data on more than one node to scale out. | Not enough data | |
Auto Recovery | Restores a database to a correct (consistent) state in the event of a failure. | Not enough data | |
Data Replication | Copy data across multiple servers through master-slave, peer-to-peer replication architecture etc. | Not enough data | |
Auto Sharding | Implements auto horizontal data partitioning that allows storing data on more than one node to scale out. | Not enough data | |
Auto Recovery | Restores a database to a correct(consistent) state in the event of a failure. | Not enough data | |
Data Replication | Copy data across multiple servers through master-slave, peer-to-peer replication architecture etc. | Not enough data | |
Auto Sharding | Implements auto horizontal data partitioning that allows storing data on more than one node to scale out. | Not enough data | |
Auto Recovery | Restores a database to a correct(consistent) state in the event of a failure. | Not enough data |
Performance
Integrated Cache | Stores frequently-used data in system memory quickly. | Not enough data |
Security
Encryption | Provides encryption capability for all the data at rest using encryption keys. | Not enough data | |
Role-Based Authorization | Provides predefined system roles, privileges, and user-defined roles to users. | Not enough data | |
Authentication | Allows integration with external security mechanisms like Kerberos, LDAP authentication etc. | Not enough data | |
Audit Logs | Provides an audit log to track access and operations performed on databases for regulatory compliance. | Not enough data | |
Encryption | Provides encryption capability for all the data at rest using encryption keys. | Not enough data | |
Role-Based Authorization | Provides predefined system roles, privileges, and user-defined roles to users. | Not enough data | |
Authentication | Allows integration with external security mechanisms like Kerberos, LDAP authentication etc. | Not enough data | |
Audit Logs | Provides an audit log to track access and operations performed on databases for regulatory compliance. | Not enough data | |
Encryption | Provides encryption capability for all the data at rest using encryption keys. | Not enough data |
Support
Multi-Model | Provides support to handle structured, semi-structured, and unstructured data with equal effect. | Not enough data | |
Operating Systems | Available on multiple operating systems like Linux, Windows, MacOS etc. | Not enough data | |
Multi-Model | Provides support to handle structured, semi-structured, and unstructured data with equal effect. | Not enough data | |
Operating Systems | Available on multiple operating systems like Linux, Windows, MacOS etc. | Not enough data | |
BI Connectors | Allows users to connect business intelligence tools to the database. | Not enough data | |
Multi-Model | Provides support to handle structured, semi-structured, and unstructured data with equal effect. | Not enough data | |
BI Connectors | Allows users to connect business intelligence tools to the database. | Not enough data | |
Operating Systems | Available on multiple operating systems like Linux, Windows, MacOS etc. | Not enough data |
Performance
Query Optimization | Helps interpret SQL queries and determine the fastest method of execution | Not enough data | |
Query Optimization | Helps interpret SQL queries and determine the fastest method of execution | Not enough data |