Data Access Manager uses a man-in-the-middle proxy to control numerous kinds of databases - e.g. Cassandra, Hive, IBM DB2, Microsoft SQL Server, MySQL, Oracle and Teradata, among the others from a central point. Requests to databases and queries prevented over proxy component that authorized by Dynamic Data Masking product for the seized SQLs before. The conjunction of Data Access Management and Dynamic Data Masking achieves data security protection within the data layer itself and carries out solid protection for database security.
The conjunction of Data Access Management and Dynamic Data Masking achieves data security protection within the data layer itself and carries out solid protection for database security.