Database security reinforcement system

 

product description

Safety is more link layers of protection, together with the results. That can not rely on the security field only a certain part of the completion of all of the security measures for the database field is the same. Database security art generally comprise: identification and authentication, access control and customize the mandatory access control, secure transmission, the audit system, database storage encryption. Only by combining all aspects relating to safety and to ensure a highly secure system.

ANVIZ in database security reinforcement system is performing database auditing system firewall integrated with both real-time blocking and transparent database encryption. Key features include: comprehensive database auditing, multi-factor authentication access control, risk assessment, automatic modeling, encryption of sensitive data and comprehensive reporting. Value for customers:

Meet compliance requirements, by quick evaluation;

To simplify business management, core data encryption, improving data security management capabilities;

Improve the defense in depth system, improve the overall security capability;

Reduce the risk of violations of core data assets to ensure business continuity.

Product Features

ANVIZ in database security reinforcement system is specifically designed to meet these needs and risks, and to implement response plans are developed. Products from interconnected, and protection in ascending order of a series of functional modules. Core features include:

All product features on the same platform, integrated by tiling function menu.

 

Features Benefits

· Technical advantages

 

Completely independent technology system, high-tech barriers;

Forwarding the special data analysis techniques, to achieve efficient network communication content filtering;

BigTable and MapReduce based storage, to achieve efficient mass storage stand-alone environment;

Based inverted index search, efficient and flexible information for report filtering.

High-performance

SQL-leading continuous processing capabilities, such as VS-X-5000 models of the lowest per second processing 200,000, the maximum throughput of 10G, the maximum concurrent 240W;

Log retrieval speed ahead: Support fuzzy search;

Excellent encryption and decryption capabilities: such as VS-X-5000 models can achieve encryption and decryption 200,000 times / sec.

High Availability

Comprehensive database protocol support, including support mainstream database audit at home and abroad, such as Oracle / MySQL etc;

Flexible deployment, support the bypass, direct, mixed deployment;

Perfect statements, offers a variety of security audit and trend analysis;

It supports a variety of encryption algorithms, including national and international encryption algorithm standard algorithms;

Hardware BYPASS prevent a single point of failure.

High security

Detailed database audit data access at a glance;

Fine-grained access control, real-time block illegal operation;

The core data encryption, minimizing the risk of data theft.

 

Guess you like

Origin www.cnblogs.com/csbit/p/11115780.html