Show rating breakdown
Save to My Lists
Unclaimed
Unclaimed

SQL Secure Features

What are the features of SQL Secure?

Administration

  • Supported Databases
  • Data Management
  • Logging and Reporting

Governance

  • Compliance
  • Access Management

Top Rated SQL Secure Alternatives

SQL Secure Categories on G2

Filter for Features

Administration

Supported Databases

Based on 10 SQL Secure reviews. Supports different database platforms and data types. Typically integrates with a variety of existing databases.
78%
(Based on 10 reviews)

Data Management

Administrators can access and organize data related to incidents to produce reports or make data more navigable. This feature was mentioned in 10 SQL Secure reviews.
85%
(Based on 10 reviews)

Logging and Reporting

Based on 10 SQL Secure reviews. Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
80%
(Based on 10 reviews)

API / integrations

Application Programming Interface - Specification for how the application communicates with other software. API's typically enable integration of data, logic, objects, etc. with other software applications.

Not enough data

Governance

Compliance

Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards. 10 reviewers of SQL Secure have provided feedback on this feature.
78%
(Based on 10 reviews)

Access Management

Based on 10 SQL Secure reviews. Allows administrators to set user access privileges to permit approved parties to access sensitive data.
82%
(Based on 10 reviews)

Multi-Factor Authentication

Requires a second level of authentication, such as sms messaging or customized tokens, to access data.

Not enough data

Protection

Database Activity Monitoring

Documents the actions related to the database. Alerts users of incidents and abnormal activities and documents the access point.

Not enough data

Firewall

Protects database and sensitive information from a variety of attacks and malware threats.

Not enough data

Data Masking

Protects sensitive data by disguising or encrypting data, keeping it usable by the organization and approved parties.

Not enough data

Audits

Perform ad-hoc or ongoing IT audits at different levels of the company.

Not enough data