Buyer's Guide

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Database security products: A buyer's guide

This SearchSecurity Buyer's Guide on database security products explains why they're important for enterprises to deploy, as well as how to select and buy the right database security tools.


The database security features available from relational database management system (RDBMS) vendors are only a small part of the overall database security picture. While some critical security capabilities are bundled with relational database platforms, many critical services for securing enterprise data are not; hence the need for database security tools from third parties.

These database security products provide a level of database security far beyond what RDBMS vendors offer directly to customers in their products, particularly in the areas of database vulnerability assessment, encryption, database compliance and test data management, tokenization and data masking. As a result, there are a number of reasons for organizations to leverage these database security products. And, as there are databases available to support most every application and business function, there is an equally varied set of requirements to boost database security through these third-party tools.

In this buyer's guide, readers will learn exactly what database security tools are, as well as the use cases and ways database security tools are used to boost enterprise security. It also lays out what enterprises need to know before making an investment into database security products, and presents direct comparisons of database security products, offering overviews of some of the top tools on the market today.

1What is?-

The types of database security products

Learn what database security add-on products are and how they work, as well as their role in protecting data in the enterprise data center.


Introduction to enterprise database security products

Expert Adrian Lane explains why database security tools play a significant, if not the majority, role in protecting data in the enterprise data center. Continue Reading

2Do I need?-

The business case for database security products

Discover use cases and the ways database security products can boost enterprise security.


Four enterprise scenarios for deploying database security products

Expert Adrian Lane describes the use cases and ways database security tools are used to boost enterprise security. Continue Reading

3How to buy-

Database security tool procurement

Consider the following criteria and steps as part of any evaluation when looking to find the right database security products for your organization's needs.


Nine steps for purchasing database security software

Expert Adrian Lane lays out the criteria for procuring the right database security software for your enterprise. Continue Reading

4Which should I buy?-

The top database security products compared

What makes a particular database security product right for certain enterprises and data centers? Here we compare several leading database security products from top vendors and review the pros and cons of their products to help you decide which might be right for your organization.


Comparing the top database security products

Expert Ed Tittel examines the strengths and weaknesses of top-rated database security tools -- from database activity monitoring to transparent database encryption -- to help enterprises make the right purchasing decision. Continue Reading

5Top product overviews-

A who's who of the market-leading database security tool vendors

Database security add-ons are essential for securing network connections and communications. Here's a look at some of the top database security add-on products in the industry.


Fortinet FortiDB: Database security tool overview

Expert Ed Tittel examines Fortinet FortiDB, an add-on product for better securing databases through database activity monitoring and vulnerability assessment. Continue Reading


HP Security Voltage's SecureData Enterprise: Product overview

Expert Ed Tittel examines SecureData Enterprise, which is a part of the HP Security Voltage platform, a scalable database security product that encrypts both structured and unstructured data, tokenizing data to prevent viewing and more. Continue Reading


IBM Guardium: Database security tool overview

Expert Ed Tittel examines IBM Guardium, a security product that offers continuous, real-time, policy-based monitoring of database activities. Continue Reading


Imperva SecureSphere: Database security tool overview

Expert Ed Tittel examines Imperva SecureSphere Database Activity Monitoring and Database Assessment, products that are deployed as an inline bridge or as a lightweight agent to assess and monitor local database access. Continue Reading


McAfee Database Activity Monitoring: Database security tool overview

Expert Ed Tittel takes a look at McAfee Database Activity Monitoring and McAfee Vulnerability Manager for Databases to see how they protect enterprises' databases and corporate data. Continue Reading


Oracle Advanced Security: Database security tool overview

Expert Ed Tittel examines Oracle Advanced Security, a database security add-on product with transparent data encryption (TDE) and data redaction features. Continue Reading


Protegrity Database Protector: Database security tool overview

Expert Ed Tittel examines Protegrity Database Protector, a database security add-on product that provides column- and field-level protection of confidential and sensitive data stored in nearly any type of relational database. Continue Reading


Trustwave DbProtect: Database security tool overview

Expert Ed Tittel checks out Trustwave DbProtect, a centrally managed enterprise-level database activity monitor that includes vulnerability assessment functionality. Continue Reading


Vormetric Transparent Encryption: Product overview

Expert Ed Tittel takes a look at Vormetric Transparent Encryption, a component of Vormetric's Data Security Platform that encrypts data and does access control for that data. Continue Reading

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.