Best Database Security Software in South America

Compare the Top Database Security Software in South America as of December 2024

What is Database Security Software in South America?

Database security software tools enable organizations to secure their databases, and ensure security compliance with database operations. Compare and read user reviews of the best Database Security software in South America currently available using the table below. This list is updated regularly.

  • 1
    Satori

    Satori

    Satori

    Satori is a Data Security Platform (DSP) that enables self-service data and analytics. Unlike the traditional manual data access process, with Satori, users have a personal data portal where they can see all available datasets and gain immediate access to them. Satori’s DSP dynamically applies the appropriate security and access policies, and the users get secure data access in seconds instead of weeks. Satori’s comprehensive DSP manages access, permissions, security, and compliance policies - all from a single console. Satori continuously discovers sensitive data across data stores and dynamically tracks data usage while applying relevant security policies. Satori enables data teams to scale effective data usage across the organization while meeting all data security and compliance requirements.
    View Software
    Visit Website
  • 2
    Imunify360

    Imunify360

    CloudLinux, Inc.

    Imunify360 is a security solution for web-hosting servers. Imunify360 goes beyond antivirus and WAF and is a combination of an Intrusion Prevention and Detection system, a Application Specific Web Application Firewall, Real-time Antivirus protection, a Network Firewall, and Patch Management components in one security suite. Imunify360 is a fully-automated solution and it collects all statistics under an intuitive dashboard.
    Starting Price: $12
  • 3
    ScaleGrid

    ScaleGrid

    ScaleGrid

    ScaleGrid is a fully managed Database-as-a-Service (DBaaS) platform that helps you automate your time-consuming database administration tasks both in the cloud and on-premises. Easily provision, monitor, backup and scale your open source databases with high availability, advanced security, full superuser and SSH access, query analysis, and troubleshooting support to improve the performance of your deployments. Supported databases include: - MySQL - PostgreSQL - Redis™ - MongoDB® database - Greenplum™ (coming soon) The ScaleGrid platform supports both public and private clouds, including AWS, Azure, Google Cloud Platform (GCP), DigitalOcean, Linode, Oracle Cloud Infrastructure (OCI), VMware and OpenStack. Used by thousands of developers, startups, and enterprise customers including Atlassian, Meteor, and Accenture, ScaleGrid handles all your database operations at any scale so you can focus on your application performance.
    Starting Price: $8 per month
  • 4
    Imperva Database Security
    Imperva delivers analytics, protection and response across all your data assets, on-premise and in the cloud - giving you the risk visibility to prevent data breaches and avoid compliance incidents. Pre-configured and extensible templates, policies, reports and more come “out-of-the-box” for quick, continuous compliance and risk management – with no manual/DIY work required. Single pane of glass across distributed environments on-premise, in-cloud and multi-cloud to find ungoverned database instances, classify data, assess vulnerabilities, and investigate user activity. Detect both outsider and insider threats and automate response procedures. Consolidate reporting operations and get cost effective multi-year retention of audit and forensic records. Imperva Database Security unifies governance across on-premise and hybrid cloud environments and presents it all in a single view.
  • 5
    BitNinja

    BitNinja

    BitNinja.com

    BitNinja provides 3E Linux server protection for large hosting providers and small businesses equally. Effective because of our unique Defense Network that uses the power of the Ninja Community. Every BitNinja-protected server worldwide shares attack information with each other, resulting in a more intelligent and stronger protection shield by every single assault. Effortless because it is fast and easy to install, so your server protection is up and running in no time. It requires no maintenance, just keep running in the background and protecting your and your customer’s servers while you can concentrate on other aspects of your business with peace of mind. Enjoyable because you can take joy in the benefits of BitNinja, like the increased server capacity caused by the significant drop in the server load. Furthermore, you can easily manage all the modules and features on the unified dashboard and check how the the software catches malicious traffic in real-time.
    Starting Price: $10 per server
  • 6
    Omega DB Security Reporter
    Omega DB Security Reporter is a security auditing, software-only, and out-of-box solution for Oracle databases. It implements quick reporting, visualization and documentation of the security posture of the Oracle database and addresses the internal and external security compliance requirements. Omega DB Security Reporter provides detailed, integrated, categorized and evaluated assessment of the Oracle Database, enabling the security personnel to dispense with this complex task in a few minutes. Omega DB Security Reporter enables assessment, reporting, visualization and documentation of the security posture of your Oracle database on the following security areas of top importance: Privileges: for system, objects, and roles Audits: on system privileges, user statements, audited system actions, object privileges and operations audits Others: User password profile resources Initialization (security) parameters
    Starting Price: $899 USD
  • 7
    Omega Core Audit
    Your Oracle database is usually the company’s most valuable informational assets, containing data on customers, partners, transactions, financial and much more. With the advent of the information age, millions of such records are now owned by even medium and relatively small companies. Database security has become one of the top concerning priorities of the companies that need to comply with more internal and external regulatory compliance practices and standards, that require stronger information security controls. Omega Core Audit is an out-of-box, software-only security and compliance solution that addresses the above compliance issues by providing Access Control, Continuous Audit Monitoring and Real-Time Protection, thus enforcing duty separation, control of privileged accounts and meeting compliance requirements. With built-in support for Splunk SIEM and GrayLog SIEM.
    Starting Price: $1499 USD
  • 8
    Immuta

    Immuta

    Immuta

    Immuta is the market leader in secure Data Access, providing data teams one universal platform to control access to analytical data sets in the cloud. Only Immuta can automate access to data by discovering, securing, and monitoring data. Data-driven organizations around the world trust Immuta to speed time to data, safely share more data with more users, and mitigate the risk of data leaks and breaches. Founded in 2015, Immuta is headquartered in Boston, MA. Immuta is the fastest way for algorithm-driven enterprises to accelerate the development and control of machine learning and advanced analytics. The company's hyperscale data management platform provides data scientists with rapid, personalized data access to dramatically improve the creation, deployment and auditability of machine learning and AI.
  • 9
    MyDiamo

    MyDiamo

    Penta Security Systems Inc.

    Developed by Penta Security Systems, an APAC leader in encryption technology and web application firewall, MyDiamo is a free open-source database encryption solution, available to all for non-commercial use. The commercial license is available for enterprises and organizations that desire extended features.
  • 10
    SQL Secure

    SQL Secure

    IDERA, an Idera, Inc. company

    SQL Secure helps database administrators to manage SQL Server security in physical, virtual, and cloud environments - including managed cloud databases. Unlike its competition, it provides configurable data collection, customizable templates to satisfy audits for multiple regulatory guidelines, extensive security checks and audit rules, automated server registration process, and server group tagging.
    Starting Price: $1,036 per instance
  • 11
    Privacy1

    Privacy1

    Privacy1

    Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmen
    Starting Price: $159 per month
  • 12
    Monyog

    Monyog

    Webyog

    Agentless MySQL performance monitoring that's fully customizable and allows you to optimize query performance in real-time. Trace all changes done to the MySQL Global variables using the configuration management. You can track and compare changes to the configuration file and identify the reason for performance issues. Monitor locked and long running queries in real-time. Get notifications on mail or SNMP traps, Syslog, Slack and Pagerduty for queries that take more than a specified amount of time to execute. You also have the option to configure Monyog to kill, notify or notify & kill such queries. Avoid learning new tools by using the same performance monitoring tool for MySQL on-premise on physical and virtual machines, in the private, public, and government cloud on virtual machines, and in the public and government cloud as managed databases.
    Starting Price: $199 one-time payment
  • 13
    DBHawk

    DBHawk

    Datasparc

    Using DBHawk, our customers were able to comply with GDPR, HIPAA, SOX, GLBA, and other regulations and were able to implement SOD. Self-Service BI & Ad-Hoc Reporting Tool with feature to define Data Access Policy, Connect to multiple Data sources, Build Powerful SQL Charts and data Dashboards. DBHawk SQL editor is an advanced editor that allows users to build, edit, and run database queries with a web-based interface. DBHawk Query Builder is supported with all major databases such as Oracle, Microsoft SQL Server, PostgreSQL, Greenplum, MySQL, DB2, Amazon Redshift, Hive, Amazon Athena. Database SQL tasks and batch job automation with a web-based centralized tool. Secure access to SQL, NoSQL and Cloud databases with our all-in-one data platform. Trusted by our customers to protect and access their data. Centralized Security, Auditing and insights about your user’s activities.
    Starting Price: $99.00/month/user
  • 14
    Acra

    Acra

    Cossack Labs

    Data leakage prevention in your app made simple. Acra encryption suite provides data protection in distributed applications, web and mobile apps with PostgreSQL, MySQL, KV backends through selective encryption. Encryption of sensitive and personal data is mandated by regulations (GDPR, HIPAA, CCPA, PCI DSS) and industry best practices. However, building cryptography into distributed application is often a tedious task, which has a limited security impact and plenty of architectural trade-offs. Acra is here to change it. Acra is one tool that covers 9 data security controls. Acra is built to mitigate data leakage risks while providing defense in depth across the whole data lifespan within the application. Acra is easy to integrate, doesn't require significant modifications in the existing code, provides reliable data security, reduces MTTD and MTTR. Acra provides an integration library that can encrypt any record with AcraServer’s key.
    Starting Price: $10000 per year
  • 15
    SecretHub

    SecretHub

    SecretHub

    Upgrade security throughout the stack with a unified secrets management platform that every engineer can use – from admin to intern. Putting passwords and API keys in source code creates a security risk. But handling them properly creates complexity that makes it extremely cumbersome to deploy. Git, Slack, and email are designed to share information, not to keep secrets. Copy-pasting values and waiting on that one admin who holds all the keys simply don't scale when you're deploying software multiple times a week. It's impossible to track who accessed what secrets at what time, making compliance audits a nightmare. Eliminate secrets in source code by replacing plaintext values with a reference to the secret. SecretHub then automatically loads secrets into your app the moment it starts. Use the CLI to encrypt and store secrets and then simply tell the code where to look for the secret. Your code is now free of secrets and can be shared with everyone on your team.
    Starting Price: $99 per month
  • 16
    JackDB

    JackDB

    JackDB

    Write and execute queries in a fully interactive SQL editor. JackDB has everything you'd want in a database client, including: syntax highlighting, code formatting, and intelligent autocompletion. Snippets allow your most useful SQL queries to be saved and shared. Simply write and save any query in JackDB, and share the snippet publicly with your team. Whenever anyone updates a snippet, everyone gets access to its latest version. Security is our highest priority at JackDB. Roles are a very convenient and secure way to restrict database access to authorized users and provision new users with access to data sources. Explore everything in your database, not just tables and views. View your indexes, schemas, and other important system details such as tablespaces and user sessions.
    Starting Price: $49 per user per month
  • 17
    SAP SQL Anywhere
    Run your business from anywhere with relational database management system (RDBMS) solutions from SAP SQL Anywhere. Enable secure, reliable data management for servers where no DBA is available and synchronization for tens of thousands of mobile devices, Internet of Things (IoT) systems, and remote environments. Deliver critical business data to remote offices and mobile devices for more accurate, real-time decision-making at the front lines of your business. Run mobile applications reliably and efficiently without on-site technical staff, giving mobile and remote workers an always on experience, even when they are offline. Streamline data maintenance tasks with built-in self-managing features that help users resolve issues quickly and efficiently. Protect and secure your data, even during data transmission and exchange, with powerful encryption features.
    Starting Price: $195 per license
  • 18
    DataSunrise Database Security
    Data-Centric high-performance database security software. Regulatory Compliance with SOX, HIPAA, GDPR, PCI DSS and other privacy laws and standards. Hybrid and Multi-Cloud Database Security Proxy on AWS, Azure, Google and On-Prem. Sensitive and PII data auditing, discovery and active protection. Data Auditing enables real-time tracking of user actions and changes made to data and databases to ensure compliance-ready environment, increased visibility. Database Firewall, role based & location aware Data Access Control & Protection. Secure corporate databases in cloud & on-prem against hostile, negligent actions. Secures sensitive data in development and testing environments; Encryption; completely eliminates the possibility to reverse engineer the masked data. Real-time role and location based data masking of production data. Prevents exposure of sensitive privacy data while production data is not changed physically.
  • 19
    HashiCorp Vault
    Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve.
  • 20
    Scuba Database Vulnerability Scanner
    Scuba Database Vulnerability Scanner. Download Scuba, a free tool that uncovers hidden security risks. Scan enterprise databases for vulnerabilities and misconfiguration. Know the risks to your databases. Get recommendations on how to mitigate identified issues. Available for Windows, Mac, Linux (x32), and Linux (x64), Scuba offers over 2,300 assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Scuba is a free tool that scans leading enterprise databases for security vulnerabilities and configuration flaws, including patch levels, that allows you to uncover potential database security risks. It includes more than 2,300 assessment tests for Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2 and MySQL. It’s possible to run a Scuba scan from any Windows, Mac or Linux client. Depending on your database size, users, groups and network connection, an average Scuba scan normally takes 2-3 minutes. No pre-installation or other dependencies are required.
  • 21
    Trustwave DbProtect
    A highly scalable database security platform that enables organizations to secure their relational databases and big data stores, both on premises and in the cloud, with a distributed architecture and enterprise-level analytics. Databases contain sensitive and proprietary information, making them a prized target for cybercriminals who are constantly looking for ways to access valuable data for large financial payoffs. Trustwave DbProtect helps your business overcome resource limitations to uncover database configuration errors, access control issues, missing patches, and other weaknesses that could lead to data leakage and misuse and other serious repercussions. A real-time view of database assets, vulnerabilities, risk levels, user privileges, anomalies and incidents via a single intuitive dashboard. The ability to detect, alert and take corrective action against suspicious activities, intrusions and policy violations.
  • 22
    AppDetectivePRO
    A database and big data scanner that identifies configuration mistakes, identification and access control issues, missing patches, and any toxic combination of settings that could lead to bad outcomes like data loss and DDoS attacks. Databases are critical repositories of customer information and intellectual property, making them enticing targets for cybercriminals. Trustwave AppDetectivePRO allows your business to discover, assess and report in minutes on the security, risk or compliance posture of any database or big data store within your environment – on premises or in the cloud. AppDetectivePRO is a database and big data scanner that identifies configuration mistakes, identification and access control issues, missing patches, and any toxic combination of settings that could lead to escalation of privilege attacks, data leakage, denial-of-service (DoS), or the unauthorized modification of data held within data stores.
  • 23
    Oracle Data Masking and Subsetting
    The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.
    Starting Price: $230 one-time payment
  • 24
    IBM Guardium Data Encryption
    Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
  • 25
    Oracle Advanced Security
    Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer. Encrypt individual data columns, entire tablespaces, database exports, and backups to control access to sensitive data. Data Redaction complements TDE by reducing the risk of unauthorized data exposure in applications, redacting sensitive data before it leaves the database. Partial or full redaction prevents large-scale extraction of sensitive data into reports and spreadsheets. Encryption is implemented at the database kernel level, eliminating the need for any changes to applications.
  • 26
    BladeLogic Database Automation
    BladeLogic Database Automation is a multi-platform database automation solution that enables database administrators to deploy, patch, upgrade and maintain databases in 1/10th the normal provisioning time. Thus, administrators get more time to support the rollouts of new apps. In today’s digital economy, innovative applications depend on fast-performing databases. Skilled database administrators spend a majority of their time ensuring the existing environments are well maintained, compliant, and secure. Security threats seek vulnerabilities at the database level, which put more pressure on IT to keep current on patches and compliance policies. This gives IT little time to optimize database configurations and queries or push out new features for application releases.
  • 27
    Huawei Database Security Service (DBSS)
    Database Security Service (DBSS) uses machine learning and big data technologies to protect your databases on the cloud, intelligently auditing them and detecting risky behaviors like SQL injection. Purchase and get started with DBSS quickly without the need to manually install the service or adapt your database configurations. DBSS complies with the HIPAA, SOX, and PCI DSS, meeting your auditing requirements. Take advantage of algorithm models to detect SQL injection and abnormal behaviors, fast and accurate. DBSS works in bypass mode, having zero impact on your business. A wide range of policies are available to help you detect SQL injection and audit database behaviors. Monitor databases and detect anomalies in performance, data, and user actions. Audit reports are customized for different scenarios (pre-event and post-event) and roles (common users and administrators). Perform comprehensive database audit to comply with laws and regulation.
  • 28
    IBM Guardium Data Compliance
    Simplifies data regulation needs, enhances visibility and streamlines monitoring IBM® Guardium® Data Compliance helps organizations to move through regulatory compliance and audit requirements more quickly and easily, safeguarding regulated data wherever it resides. Available in IBM® Guardium® Data Security Center, IBM Guardium Data Compliance can reduce audit prep time for data compliance regulations, provide continuous visibility of data security controls, and solve data compliance and data activity monitoring challenges.
  • 29
    Adabas & Natural

    Adabas & Natural

    Software AG

    In an age of ever-faster change, you need a forward-thinking partner with a vision. someone who can help you take your powerful Adabas & Natural applications to 2050 and beyond. You’ve relied on Adabas & Natural to get the job done—for decades. Look ahead to a future where you can continue to make the most of that investment and the unique business logic built into your core applications. We’re that partner, committed to helping you digitalize your legacy, fast and risk-free. Together, let’s manage the generational change of developers, modernize your applications to save costs, expand the reach of your core apps, and accelerate development in an ultra-modern environment. Count on leading-edge Adabas & Natural technologies to help you optimize your IT environment and modernize your applications, risk free and fast. Connect to new services with APIs. Run Adabas & Natural in the cloud. Attract new developer talent with DevOps. Save costs by offloading mainframe workload to zIIP.
  • 30
    Assure Security
    Assure Compliance Monitoring is a bundle of Assure Security features. Together, they can quickly identify security and compliance issues by producing alerts and reports on IBM i system activity, database changes and views of Db2 data. The bundle includes two features which are also available separately. Assure Monitoring and Reporting seamlessly extracts insights from IBM i journal data and delivers alerts and reports on security incidents and compliance deviations. System and database monitoring capabilities are available separately or together. Or, choose to send data directly to your enterprise SIEM solution allowing IBM i security to be monitored with all other enterprise platforms. Assure Db2 Data Monitor is a unique, innovative solution that monitors views of highly confidential Db2 data and optionally blocks records from view. Assure Security delivers market-leading IBM i security capabilities that help your organization successfully comply with cybersecurity regulations.
  • Previous
  • You're on page 1
  • 2
  • Next