[go: up one dir, main page]

Best Database Security Software

Compare the Top Database Security Software as of October 2025

What is Database Security Software?

Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations. Compare and read user reviews of the best Database Security software currently available using the table below. This list is updated regularly.

  • 1
    Satori

    Satori

    Satori

    Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements.
  • 2
    Imunify360

    Imunify360

    CloudLinux, Inc.

    Imunify360 is a security solution for web-hosting servers. Imunify360 goes beyond antivirus and WAF and is a combination of an Intrusion Prevention and Detection system, a Application Specific Web Application Firewall, Real-time Antivirus protection, a Network Firewall, and Patch Management components in one security suite. Imunify360 is a fully-automated solution and it collects all statistics under an intuitive dashboard.
    Starting Price: $12
  • 3
    ScaleGrid

    ScaleGrid

    ScaleGrid

    ScaleGrid is a fully managed Database-as-a-Service (DBaaS) platform that helps you automate your time-consuming database administration tasks both in the cloud and on-premises. Easily provision, monitor, backup and scale your open source databases with high availability, advanced security, full superuser and SSH access, query analysis, and troubleshooting support to improve the performance of your deployments. Supported databases include: - MySQL - PostgreSQL - Redis™ - MongoDB® database - Greenplum™ (coming soon) The ScaleGrid platform supports both public and private clouds, including AWS, Azure, Google Cloud Platform (GCP), DigitalOcean, Linode, Oracle Cloud Infrastructure (OCI), VMware and OpenStack. Used by thousands of developers, startups, and enterprise customers including Atlassian, Meteor, and Accenture, ScaleGrid handles all your database operations at any scale so you can focus on your application performance.
    Starting Price: $8 per month
  • 4
    BitNinja

    BitNinja

    BitNinja.com

    BitNinja provides 3E Linux server protection for large hosting providers and small businesses equally. Effective because of our unique Defense Network that uses the power of the Ninja Community. Every BitNinja-protected server worldwide shares attack information with each other, resulting in a more intelligent and stronger protection shield by every single assault. Effortless because it is fast and easy to install, so your server protection is up and running in no time. It requires no maintenance, just keep running in the background and protecting your and your customer’s servers while you can concentrate on other aspects of your business with peace of mind. Enjoyable because you can take joy in the benefits of BitNinja, like the increased server capacity caused by the significant drop in the server load. Furthermore, you can easily manage all the modules and features on the unified dashboard and check how the the software catches malicious traffic in real-time.
    Starting Price: $10 per server
  • 5
    Omega DB Security Reporter
    Omega DB Security Reporter is a security auditing, software-only, and out-of-box solution for Oracle databases. It implements quick reporting, visualization and documentation of the security posture of the Oracle database and addresses the internal and external security compliance requirements. Omega DB Security Reporter provides detailed, integrated, categorized and evaluated assessment of the Oracle Database, enabling the security personnel to dispense with this complex task in a few minutes. Omega DB Security Reporter enables assessment, reporting, visualization and documentation of the security posture of your Oracle database on the following security areas of top importance: Privileges: for system, objects, and roles Audits: on system privileges, user statements, audited system actions, object privileges and operations audits Others: User password profile resources Initialization (security) parameters
    Starting Price: $899 USD
  • 6
    Omega Core Audit
    Your Oracle database is usually the company’s most valuable informational assets, containing data on customers, partners, transactions, financial and much more. With the advent of the information age, millions of such records are now owned by even medium and relatively small companies. Database security has become one of the top concerning priorities of the companies that need to comply with more internal and external regulatory compliance practices and standards, that require stronger information security controls. Omega Core Audit is an out-of-box, software-only security and compliance solution that addresses the above compliance issues by providing Access Control, Continuous Audit Monitoring and Real-Time Protection, thus enforcing duty separation, control of privileged accounts and meeting compliance requirements. With built-in support for Splunk SIEM and GrayLog SIEM.
    Starting Price: $1499 USD
  • 7
    Immuta

    Immuta

    Immuta

    Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA. Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
  • 8
    Acra

    Acra

    Cossack Labs

    Data leakage prevention in your app made simple. Acra encryption suite provides data protection in distributed applications, web and mobile apps with PostgreSQL, MySQL, KV backends through selective encryption. Encryption of sensitive and personal data is mandated by regulations (GDPR, HIPAA, CCPA, PCI DSS) and industry best practices. However, building cryptography into distributed application is often a tedious task, which has a limited security impact and plenty of architectural trade-offs. Acra is here to change it. Acra is one tool that covers 9 data security controls. Acra is built to mitigate data leakage risks while providing defense in depth across the whole data lifespan within the application. Acra is easy to integrate, doesn't require significant modifications in the existing code, provides reliable data security, reduces MTTD and MTTR. Acra provides an integration library that can encrypt any record with AcraServer’s key.
    Starting Price: $10000 per year
  • 9
    MyDiamo

    MyDiamo

    Penta Security Systems Inc.

    Developed by Penta Security Systems, an APAC leader in encryption technology and web application firewall, MyDiamo is a free open-source database encryption solution, available to all for non-commercial use. The commercial license is available for enterprises and organizations that desire extended features.
  • 10
    SecretHub

    SecretHub

    SecretHub

    Upgrade security throughout the stack with a unified secrets management platform that every engineer can use – from admin to intern. Putting passwords and API keys in source code creates a security risk. But handling them properly creates complexity that makes it extremely cumbersome to deploy. Git, Slack, and email are designed to share information, not to keep secrets. Copy-pasting values and waiting on that one admin who holds all the keys simply don't scale when you're deploying software multiple times a week. It's impossible to track who accessed what secrets at what time, making compliance audits a nightmare. Eliminate secrets in source code by replacing plaintext values with a reference to the secret. SecretHub then automatically loads secrets into your app the moment it starts. Use the CLI to encrypt and store secrets and then simply tell the code where to look for the secret. Your code is now free of secrets and can be shared with everyone on your team.
    Starting Price: $99 per month
  • 11
    JackDB

    JackDB

    JackDB

    Write and execute queries in a fully interactive SQL editor. JackDB has everything you'd want in a database client, including: syntax highlighting, code formatting, and intelligent autocompletion. Snippets allow your most useful SQL queries to be saved and shared. Simply write and save any query in JackDB, and share the snippet publicly with your team. Whenever anyone updates a snippet, everyone gets access to its latest version. Security is our highest priority at JackDB. Roles are a very convenient and secure way to restrict database access to authorized users and provision new users with access to data sources. Explore everything in your database, not just tables and views. View your indexes, schemas, and other important system details such as tablespaces and user sessions.
    Starting Price: $49 per user per month
  • 12
    Monyog

    Monyog

    Webyog

    Agentless MySQL performance monitoring that's fully customizable and allows you to optimize query performance in real-time. Trace all changes done to the MySQL Global variables using the configuration management. You can track and compare changes to the configuration file and identify the reason for performance issues. Monitor locked and long running queries in real-time. Get notifications on mail or SNMP traps, Syslog, Slack and Pagerduty for queries that take more than a specified amount of time to execute. You also have the option to configure Monyog to kill, notify or notify & kill such queries. Avoid learning new tools by using the same performance monitoring tool for MySQL on-premise on physical and virtual machines, in the private, public, and government cloud on virtual machines, and in the public and government cloud as managed databases.
    Starting Price: $199 one-time payment
  • 13
    DBHawk

    DBHawk

    Datasparc

    Using DBHawk, our customers were able to comply with GDPR, HIPAA, SOX, GLBA, and other regulations and were able to implement SOD. Self-Service BI & Ad-Hoc Reporting Tool with feature to define Data Access Policy, Connect to multiple Data sources, Build Powerful SQL Charts and data Dashboards. DBHawk SQL editor is an advanced editor that allows users to build, edit, and run database queries with a web-based interface. DBHawk Query Builder is supported with all major databases such as Oracle, Microsoft SQL Server, PostgreSQL, Greenplum, MySQL, DB2, Amazon Redshift, Hive, Amazon Athena. Database SQL tasks and batch job automation with a web-based centralized tool. Secure access to SQL, NoSQL and Cloud databases with our all-in-one data platform. Trusted by our customers to protect and access their data. Centralized Security, Auditing and insights about your user’s activities.
    Starting Price: $99.00/month/user
  • 14
    Scuba Database Vulnerability Scanner
    Scuba Database Vulnerability Scanner. Download Scuba, a free tool that uncovers hidden security risks. Scan enterprise databases for vulnerabilities and misconfiguration. Know the risks to your databases. Get recommendations on how to mitigate identified issues. Available for Windows, Mac, Linux (x32), and Linux (x64), Scuba offers over 2,300 assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Scuba is a free tool that scans leading enterprise databases for security vulnerabilities and configuration flaws, including patch levels, that allows you to uncover potential database security risks. It includes more than 2,300 assessment tests for Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2 and MySQL. It’s possible to run a Scuba scan from any Windows, Mac or Linux client. Depending on your database size, users, groups and network connection, an average Scuba scan normally takes 2-3 minutes. No pre-installation or other dependencies are required.
  • 15
    Trustwave DbProtect
    A highly scalable database security platform that enables organizations to secure their relational databases and big data stores, both on premises and in the cloud, with a distributed architecture and enterprise-level analytics. Databases contain sensitive and proprietary information, making them a prized target for cybercriminals who are constantly looking for ways to access valuable data for large financial payoffs. Trustwave DbProtect helps your business overcome resource limitations to uncover database configuration errors, access control issues, missing patches, and other weaknesses that could lead to data leakage and misuse and other serious repercussions. A real-time view of database assets, vulnerabilities, risk levels, user privileges, anomalies and incidents via a single intuitive dashboard. The ability to detect, alert and take corrective action against suspicious activities, intrusions and policy violations.
  • 16
    Oracle Data Masking and Subsetting
    The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.
    Starting Price: $230 one-time payment
  • 17
    IBM Guardium Data Encryption
    Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
  • 18
    DataSunrise Database Security
    Data-Centric high-performance database security software. Regulatory Compliance with SOX, HIPAA, GDPR, PCI DSS and other privacy laws and standards. Hybrid and Multi-Cloud Database Security Proxy on AWS, Azure, Google and On-Prem. Sensitive and PII data auditing, discovery and active protection. Data Auditing enables real-time tracking of user actions and changes made to data and databases to ensure compliance-ready environment, increased visibility. Database Firewall, role based & location aware Data Access Control & Protection. Secure corporate databases in cloud & on-prem against hostile, negligent actions. Secures sensitive data in development and testing environments; Encryption; completely eliminates the possibility to reverse engineer the masked data. Real-time role and location based data masking of production data. Prevents exposure of sensitive privacy data while production data is not changed physically.
  • 19
    Adabas & Natural

    Adabas & Natural

    Software AG

    In an age of ever-faster change, you need a forward-thinking partner with a vision. someone who can help you take your powerful Adabas & Natural applications to 2050 and beyond. You’ve relied on Adabas & Natural to get the job done—for decades. Look ahead to a future where you can continue to make the most of that investment and the unique business logic built into your core applications. We’re that partner, committed to helping you digitalize your legacy, fast and risk-free. Together, let’s manage the generational change of developers, modernize your applications to save costs, expand the reach of your core apps, and accelerate development in an ultra-modern environment. Count on leading-edge Adabas & Natural technologies to help you optimize your IT environment and modernize your applications, risk free and fast. Connect to new services with APIs. Run Adabas & Natural in the cloud. Attract new developer talent with DevOps. Save costs by offloading mainframe workload to zIIP.
  • 20
    OpenText Voltage SecureData
    Secure sensitive data wherever it flows—on premises, in the cloud, and in big data analytic platforms. Voltage encryption delivers data privacy protection, neutralizes data breach, and drives business value through secure data use. Data protection builds customer trust and enables compliance to global regulations, including GDPR, CCPA, and HIPAA. Privacy regulations recommend encryption, pseudonymization, and anonymization to protect personal data. Voltage SecureData enables enterprises to de-identify sensitive structured data and support the use of data in its protect state to safely drive business value. Ensure that applications operate on secure data flowing through the enterprise with no gaps, no decryption, and no performance overhead. SecureData supports the broadest range of platforms and encrypts data in any language. Structured Data Manager integrates SecureData so that businesses can easily and continuously protect data throughout the lifecycle, from discovery to encryption.
  • 21
    IBM Guardium Vulnerability Assessment
    IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities and suggest remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges. Full reports are provided as well as suggestions to address all vulnerabilities. Guardium Vulnerability Assessment detects behavioral vulnerabilities such as account sharing, excessive administrative logins and unusual after-hours activity. It identifies threats and security gaps in databases that could be exploited by hackers. Discover and classify sensitive data in heterogeneous environments. View detailed reporting on entitlements and risky configurations. Automate compliance audits and exception management.
  • 22
    iSecurity Safe-Update

    iSecurity Safe-Update

    Raz-Lee Security

    iSecurity Safe-Update protects IBM i business critical data against updates by unauthorized programs. Such programs are those who come from a library which is not used to store production programs, file editors, DFU and Start SQL (STRSQL). It ensures that updates are made by pre-confirmed programs or by programs that are not known as file editors. Government and industry regulations, including Sarbanes-Oxley (SOX), GDPR, PCI, and HIPAA, stipulate measures that companies must take to ensure proper data security and monitoring. ​They require that only specifically permitted programs can make updates to business-critical data in production environments. Safe-Update guards against unauthorized updates by dangerous programs – programs were not designed for the organization’s business rules and do not comply with them. If an unauthorized update is attempted, a window appears requesting the entry of a ticket.
  • 23
    iSecurity AP-Journal

    iSecurity AP-Journal

    Raz-Lee Security

    iSecurity AP-Journal protects business-critical information from insider threats and from external security breaches, and notifies managers of any changes to information assets and streamlines IBM i journaling procedures. iSecurity AP-Journal logs the who, what, when and which of activities. It logs database access (READ operations) directly into the journal receivers, which is not provided by IBM i journaling and is an important component of compliance. Monitors changes to objects, application files and members. Supports periodic file structure changes to application files. Enables monitoring application files across changes to file structures. Programmable field-specific exit routines. Real-time alerts indicating changes in business-critical data; these application alerts are activated by user-defined thresholds. Comprehensive reports displaying all application changes on a single timeline in various formats.
  • 24
    IBM Db2 Analytics Accelerator
    IBM Db2® Analytics Accelerator is a high-performance component tightly integrated with Db2 for z/OS®. It delivers high-speed processing for complex Db2 queries to support business-critical reporting and analytic workloads. The accelerator transforms the mainframe into a hybrid transaction and analytic processing (HTAP) environment. It drives out cost and complexity and enables analytics on transactional data as it is generated. Use your business-critical data where it originates to integrate real-time insight with real-time operational decisions. Quickly gain insight from your enterprise data to support time-sensitive decisions. Use analytics and business insight to quickly identify risk, improve customer experience, better anticipate the impact of global events on your business, and more. Simplify your infrastructure, reduce data movement off-platform and free up computer resources.
  • 25
    IBM Guardium Data Compliance
    Simplifies data regulation needs, enhances visibility and streamlines monitoring IBM® Guardium® Data Compliance helps organizations to move through regulatory compliance and audit requirements more quickly and easily, safeguarding regulated data wherever it resides. Available in IBM® Guardium® Data Security Center, IBM Guardium Data Compliance can reduce audit prep time for data compliance regulations, provide continuous visibility of data security controls, and solve data compliance and data activity monitoring challenges.
  • 26
    Delinea Database Access Controller
    Delinea’s Database Access Controller enables enterprises to adopt modern cloud databases from AWS, Google, Azure, Oracle, Redis, and others while still enforcing appropriate access levels, multi-factor authentication, complete reporting, and auditing workflows. Proxy connections through a centralized portal and restrict direct database access. Protect databases with layered authentication, authorization, and granular role-based access controls. Provides time-based access, auditable logs, and reports to generate alerts and notifications. Gain granular access control to databases, such as Oracle, MySQL, PostgreSQL, MariaDB, MongoDB, Redis, AWS RDS, and Google DB, whether on-premise or in the cloud. See who is accessing databases and govern their database access using capabilities such as multi-factor authentication (MFA) and logging activities for tighter database security. Secure database access to protect your most valuable information.
  • 27
    Trellix Database Security
    Trellix Database Security finds and protects sensitive information in databases from accidental leakage and intentional exposure while maintaining security, optimizing performance, and managing access. Discover sensitive and proprietary information in databases across the environment. Improve regulatory compliance by blocking unauthorized access to sensitive data. Address vulnerabilities quickly, with little to no downtime. Monitor, log, and control database access, in addition to identifying and blocking potential threats before they can damage the environment. Perform automated scans to find supported databases and the sensitive data they contain. Identify and prioritize known vulnerabilities, and receive detailed remediation advice. Protect databases from known and unknown vulnerabilities without downtime. Stop intrusions and other exploits before they impact your environment.
  • 28
    DB CyberTech

    DB CyberTech

    DB CyberTech

    Structured high-value data on databases, such as personal information, are highly concentrated assets in a centralized location. What happens when a hacker gains access to your network and your valuable structured data environment? Many past and recent breaches have shown that hackers had breached the network for months or years before high volume and high-value data are stolen. How can we detect and prevent structured data leak in real-time? Identification and alerting of a potential threat (prevent data loss before it happens). Monitoring any potential insider threat. Complements existing policy-based unstructured data solutions, adding continuous monitoring for structured data.
  • Previous
  • You're on page 1
  • Next