Alternatives to Powertech Database Monitor for IBM i
Compare Powertech Database Monitor for IBM i alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Powertech Database Monitor for IBM i in 2026. Compare features, ratings, user reviews, pricing, and more from Powertech Database Monitor for IBM i competitors and alternatives in order to make an informed decision for your business.
-
1
Site24x7
ManageEngine
ManageEngine Site24x7 is a comprehensive observability and monitoring solution designed to help organizations effectively manage their IT environments. It offers monitoring for back-end IT infrastructure deployed on-premises, in the cloud, in containers, and on virtual machines. It ensures a superior digital experience for end users by tracking application performance and providing synthetic and real user insights. It also analyzes network performance, traffic flow, and configuration changes, troubleshoots application and server performance issues through log analysis, offers custom plugins for the entire tech stack, and evaluates real user usage. Whether you're an MSP or a business aiming to elevate performance, Site24x7 provides enhanced visibility, optimization of hybrid workloads, and proactive monitoring to preemptively identify workflow issues using AI-powered insights. Monitoring the end-user experience is done from more than 130 locations worldwide. -
2
AdRem NetCrunch
AdRem Software
NetCrunch is a powerful, scalable, all-in-one network monitoring system built for modern IT environments. It supports agentless monitoring of thousands of devices, covering SNMP, servers, virtualization (VMware, Hyper-V), cloud (AWS, Azure, GCP), traffic flows (NetFlow, sFlow), logs, and custom data via REST or scripts. With 670+ monitoring packs and dynamic views, it automates discovery, configuration, alerting, and automates self-healing actions for efficient remote remediation in response to alerts. Its node-based licensing eliminates sensor sprawl and complexity, providing a clear, cost-effective path to scale. Real-time dashboards, policy-driven setup, advanced alert tuning and 40+ alert actions including remote script execution, service restart, process kill or device reboot-make NetCrunch ideal for organizations replacing legacy tools like PRTG, SolarWinds, or WhatsUp Gold. Fast to deploy and future-proof. Can be installed on-prem, self-hosted in the cloud, or mixed. -
3
ManageEngine EventLog Analyzer
ManageEngine
ManageEngine EventLog Analyzer is an on-premise log management solution designed for businesses of all sizes across various industries such as information technology, health, retail, finance, education and more. The solution provides users with both agent based and agentless log collection, log parsing capabilities, a powerful log search engine and log archiving options. With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports. EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats. -
4
ADAudit Plus helps keep your Windows Server ecosystem secure and compliant by providing full visibility into all activities. ADAudit Plus provides a clear picture of all changes made to your AD resources including AD objects and their attributes, group policy, and more. AD auditing helps detect and respond to insider threat, privilege misuse, and other indicators of compromise, and in short, strengthens your organization's security posture. Gain granular visibility into everything that resides in AD, including objects such as users, computers, groups, OUs, GPOs, schema, and sites, along with their attributes. Audit user management actions including creation, deletion, password resets, and permission changes, along with details on who did what, when, and from where. Keep track of when users are added or removed from security and distribution groups to ensure that users have the bare minimum privileges.
-
5
Paessler PRTG
Paessler GmbH
Paessler PRTG is an all-inclusive monitoring software solution developed by Paessler. Equipped with an easy-to-use, intuitive interface with a cutting-edge monitoring engine, PRTG optimizes connections and workloads as well as reduces operational costs by avoiding outages while saving time and controlling service level agreements (SLAs). The solution is packed with specialized monitoring features that include flexible alerting, cluster failover solution, distributed monitoring, in-depth reporting, maps and dashboards, and more. PRTG monitors your entire IT infrastructure. All important technologies are supported: • SNMP: ready-to-use and custom options • WMI and Windows Performance Counters • SSH: for Linux/Unix and macOS systems • Traffic analysis using flow protocols or packet sniffing • HTTP requests • REST APIs returning XML or JSON • Ping, SQL, and many moreStarting Price: $2149 for PRTG 500 -
6
SolarWinds Database Performance Analyzer
SolarWinds
Quickly pinpoint performance issues with SolarWinds® Database Performance Analyzer (DPA) while providing expert advice with tuning advisors. Anomaly detection powered by machine learning allows DBAs to proactively optimize databases before small issues become big problems. Real-time analysis with 24/7 monitoring and automated alerts provides the time an error occurred instead of just knowing it was “sometime last week.” DPA helps ease the use of more than 20 cross-platform databases in hybrid, on-premises and cloud environments. -
7
Sematext Cloud
Sematext Group
Sematext Cloud is an innovative, unified platform with all-in-one solution for infrastructure monitoring, application performance monitoring, log management, real user monitoring, and synthetic monitoring to provide unified, real-time observability of your entire technology stack. It's used by organizations of all sizes and across a wide range of industries, with the goal of driving collaboration between engineering and business teams, reducing the time of root-cause analysis, understanding user behaviour and tracking key business metrics. The main capabilities range from log monitoring to APM, server monitoring, database monitoring, network monitoring, uptime monitoring, website monitoring or container monitoring Find complete details on our website. Or better: start a free demo, no email address required.Starting Price: $0 -
8
ScaleGrid
ScaleGrid
ScaleGrid is a fully managed Database-as-a-Service (DBaaS) platform that helps you automate your time-consuming database administration tasks both in the cloud and on-premises. Easily provision, monitor, backup and scale your open source databases with high availability, advanced security, full superuser and SSH access, query analysis, and troubleshooting support to improve the performance of your deployments. Supported databases include: - MySQL - PostgreSQL - Redis™ - MongoDB® database - Greenplum™ (coming soon) The ScaleGrid platform supports both public and private clouds, including AWS, Azure, Google Cloud Platform (GCP), DigitalOcean, Linode, Oracle Cloud Infrastructure (OCI), VMware and OpenStack. Used by thousands of developers, startups, and enterprise customers including Atlassian, Meteor, and Accenture, ScaleGrid handles all your database operations at any scale so you can focus on your application performance.Starting Price: $8 per month -
9
Compliance Builder
Xybion
Compliance Builder™ is a real-time monitoring solution designed to enable 21 CFR Part 11 compliance, providing data integrity across IT systems such as file systems, database systems, laboratory or manufacturing instruments. By generating an audit trail and enabling electronic signatures, Compliance Builder allows you to securely track changes across all IT subsystems including file systems, databases, laboratory or manufacturing process equipment. It can be configured to monitor any file-based system for changes, including additions, deletions, and file modifications.Starting Price: 25000.00 -
10
Datadog
Datadog
Datadog is the monitoring, security and analytics platform for developers, IT operations teams, security engineers and business users in the cloud age. Our SaaS platform integrates and automates infrastructure monitoring, application performance monitoring and log management to provide unified, real-time observability of our customers' entire technology stack. Datadog is used by organizations of all sizes and across a wide range of industries to enable digital transformation and cloud migration, drive collaboration among development, operations, security and business teams, accelerate time to market for applications, reduce time to problem resolution, secure applications and infrastructure, understand user behavior and track key business metrics.Starting Price: $15.00/host/month -
11
CimTrak Integrity Suite
Cimcor
Securing your enterprise against internal and external threats is key to meeting compliance standards and regulations. CimTrak’s change management, auditing, and reporting capabilities allow private and public companies to meet or exceed even the most rigorous compliance mandates. From PCI, SOX, HIPAA, CIS, NIST, and many more, CimTrak has you covered. File and System Integrity monitoring helps protect your critical files from changes, whether malicious or accidental, that can take down your critical IT infrastructure, threaten critical data, or cause non-compliance with regulations such as PCI. Change is inevitable in the IT environment. CimTrak delivers integrity monitoring, proactive incident response, change control, and auditing capabilities in one easy to use and cost-effective file integrity monitoring tool. -
12
CrowdStrike Falcon
CrowdStrike
CrowdStrike Falcon is a cloud-native cybersecurity platform that provides advanced protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. It leverages artificial intelligence (AI) and machine learning to detect and respond to threats in real time, offering endpoint protection, threat intelligence, and incident response capabilities. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, providing visibility and protection without significant impact on system performance. Falcon’s cloud-based architecture ensures fast updates, scalability, and rapid threat response across large, distributed environments. Its comprehensive security features help organizations prevent, detect, and mitigate potential cyber risks, making it a powerful tool for modern enterprise cybersecurity. -
13
Chainkit
Chainkit
Go beyond static File Integrity Monitoring (FIM). Automate integrity in motion and at rest—in real-time. With eXtended Integrity Monitoring (XIM) from Chainkit. Chainkit detects threats faster and in real-time, which in turn reduces the amount of time that undetected attacks linger in your data. Chainkit dramatically increases the visibility of attacks within your data. It detects anti-forensic tampering techniques that attackers use to evade detection. Chainkit seeks out malware hidden within your data and provides full transparency on tampered logs. Chainkit preserves the integrity of artifacts required by forensic investigators. Chainkit enhances attestation for ISO, NIST and related log or audit trail compliance requirements. Chainkit can help you reach and maintain compliance for all security compliance regulations. We provide customers with a more comprehensive audit-readiness posture.Starting Price: $50 per month -
14
SQL Compliance Manager
IDERA, an Idera, Inc. company
SQL Compliance Manager helps database administrators to monitor, audit, and alert on SQL Server user activity and data changes. Unlike its competition, it provides quick configuration of audit settings, a broad list of regulatory guideline templates for audit settings and reports, before and after data values for both regulatory compliance and forensic data investigations, differentiation of data access and between regular and privileged users and applications, easy specification of and reporting on sensitive data columns access and changes, and extensive customization of audit settings for databases and servers.Starting Price: $3,036.00 per instance -
15
Security Auditor
Core Security (Fortra)
Simplified security policy management and file integrity monitoring software. Security Auditor centralizes security administration across your cloud, on premise, or hybrid environment. Our agentless technology allows you to quickly enforce security policy adherence and mitigate the risks of security misconfiguration, a leading cause of data breaches. Security Auditor automatically protects new systems as they come online and continuously monitors those systems, identifying any configuration settings that don’t match your requirements. You'll be notified of any policy exceptions and can make changes yourself from an easy-to-use, web-based console, which simplifies tasks and compliance reporting requirements. Or if you prefer more automation, you can run the FixIt function and let Security Auditor do the work for you. Security Auditor simplifies the identification and security configuration for your elastic cloud infrastructure. -
16
dbWatch Control Center
dbWatch
dbWatch Control Center is a comprehensive database farm monitoring and management solution that enables fast and efficient monitoring and management of databases, streamlining workflows, automating actions, and creating custom reports within a single platform. It supports monitoring on-premises, cloud, or hybrid environments. Key features include customizable dashboards, multi-site and hybrid cloud support, scalability, and security. It offers modules for onboarding, architecture, dashboards, integrations, management, monitoring, reports, secure access, automated maintenance, security and compliance, and SQL performance. Users can monitor all database instances in a single pane of glass, manage databases across all platforms from a single interface, and automate routine monitoring and maintenance tasks.Starting Price: $120 per month -
17
Checkmk
Checkmk
Checkmk is a comprehensive IT monitoring system that enables system administrators, IT managers, and DevOps teams to identify issues across their entire IT infrastructure (servers, applications, networks, storage, databases, containers) and act quickly to resolve them More than 2,000 commercial customers and many more open source users worldwide use Checkmk daily. Key product features: • Service state monitoring with almost 2,000 checks 'out of the box' • Log and event-based monitoring • Metrics, dynamic graphing, and long-term storage • Comprehensive reporting incl. availability and SLAs • Flexible notifications and automated alert handling • Monitoring of business processes and complex systems • Hardware and software inventory • Graphical, rule-based configuration, and automated service discovery Top use cases: • Server Monitoring • Network Monitoring • Application Monitoring • Database Monitoring • Storage Monitoring • Cloud Monitoring • Container MonitoringStarting Price: $0/year -
18
IDERA Precise for Databases
IDERA, an Idera, Inc. company
Precise for Databases helps database administrators to find and fix database performance problems in physical, virtual, and cloud environments. Unlike its competition, it provides deep database optimization, isolation of problems and causes, scalable deployment, what-if analysis for changes, and history, trending, and planning. Precise for Databases ensures that databases perform at peak efficiency. It captures, measures, and correlates performance metrics from all critical components of the system. It then detects and corrects the root cause of database and transaction performance problems before they become noticeable for databases and their related applications. Monitor Microsoft SQL Server, Oracle Database, IBM Db2, and SAP Sybase ASE. For each of these database platforms, the interface of Precise looks and behaves the same to minimize the learning curve. Precise for Databases samples the monitored databases once per second or more frequently, has low overhead (typically 1%). -
19
Insight PISO Manager
Insight Technology
Insight PISO is a database audit product that enhances database security. Addressing threats such as unauthorized access from an audit perspective and protecting the company's critical information assets without affecting the database. Acquire and conserve the logs available as audit trails to support various legal regulations such as the SOX Act and strengthen internal controls. Direct memory access, is a proprietary technology that directly monitors memory space. Therefore, obtain and maintain access logs at low load. Does not degrade database performance. Supports major databases such as Oracle Database, Microsoft SQLServer, PostgreSQL, MySQL, Symfoware. Amazon All RDS DB engines can also manage audit information from the same Insight PISO Manager. Insight PISO implements the mining search function as a search and extraction function for access logs. You can search the recorded access logs under set conditions such as time of day, access users, and output them in various formats. -
20
Monitor your IBM i for critical security events and receive real-time notifications, so you can respond quickly—before important business information is deleted, corrupted or exposed. Send security-related events directly to your enterprise security monitor. Through integration with your security information and event management (SIEM) console, Powertech SIEM Agent simplifies and centralizes security and integrity monitoring. Monitor security-related events from the network, operating system, and any journal or message queue in real-time, including changes to user profiles and system values, invalid login attempts, intrusion detections, and changed or deleted objects. Maintain awareness of every security event on your system in real-time so you never miss a potential security breach. Powertech SIEM Agent for IBM i will provide alerts to ensure critical issues are escalated.
-
21
Netwrix Change Tracker
Netwrix
Netwrix Change Tracker provides critical and fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Netwrix Change Tracker will ensure that your IT systems remain in a known, secure and compliant state at all times. Netwrix Change Tracker includes context-based File Integrity Monitoring and File Whitelisting to assure all change activity is automatically analyzed and validated. Complete and certified CIS and DISA STIG configuration hardening ensures all systems remain securely configured at all times and, coupled with the most intelligent change control technology, provides unparalleled change noise reduction along with the ultimate reassurance that the changes occurring within your production environment are consistent, safe and as required. -
22
Symantec Data Center Security
Broadcom
Complete server protection, monitoring, and workload micro-segmentation for private cloud and physical on-premises data center environments. Security hardening and monitoring for private cloud and physical data centers with support for Docker containers. Agentless Docker container protection with full application control and integrated management. Block zero-day exploits with application whitelisting, granular intrusion prevention, and real-time file integrity monitoring (RT-FIM). Secure OpenStack deployments with full hardening of Keystone identity service module. Data center security: monitoring. Continuous security monitoring of private cloud and physical on-premises data center environments. Optimize security performance in VMware environments with agentless antimalware protection, network intrusion prevention, and file reputation services. -
23
SQL Workload Analysis
IDERA, an Idera, Inc. company
Monitor and diagnose detailed database wait states and application transactions. Problematic SQL queries can severely reduce the performance of SQL Server and the business-critical applications that it supports. With the SQL Workload Analysis add-on, continuously monitor and analyze server workload, leverage the simple user interface that focuses on wait states and application performance, and troubleshoot problematic SQL code from changes made to database applications. Perform real-time analysis with continuous SQL sampling intervals. Know instantly where databases are spending time. Quickly isolate slow SQL statements and drill down for actionable advice. Investigate historical query plan trends. Utilize automatic recommendations to improve query performance.Starting Price: $400 per instance -
24
ReadySet
ReadySet
ReadySet is a SQL caching engine that helps developers build performant, real-time applications without making code changes or switching databases. Set up ReadySet in a few minutes. Get sub-millisecond reads, regardless of query complexity or table sizes. ReadySet monitors data changes to your database to automatically update its internal state so you don't have to. Pass in ReadySet’s connection string to your application. Readyset is wire-compatible with MySQL and Postgres and can be adopted without code changes. Analyze the performance of your existing queries through the ReadySet dashboard. Decide on which ones to cache and reap the benefits. ReadySet is wire-compatible with MySQL and Postgres and interoperates with tools from their ecosystems. Integrating ReadySet into an application is as simple as swapping out a database connection string. Readyset incrementally maintains result sets of SQL queries based on writes to the primary database. -
25
SQL Inventory Manager
IDERA, an Idera, Inc. company
SQL Inventory Manager helps database administrators to manage SQL Server inventory and assets in physical, virtual, and cloud environments. Unlike its competition, it provides automatic discovery of SQL Server instances, databases, and analysis services in the network, protection against back level versions and missing security patches, confirmation that instance growth meets your license commitments, quick display of server details to determine license cost, monitor instance health, gathering of hardware, operating system, instance and database configuration details, pre-defined and customizable licensing, inventory, chargeback and health reports, and tags and filters to simplify organization of instances and databases.Starting Price: $2,556 for 10 instances -
26
SolarWinds Observability SaaS
SolarWinds
SaaS-delivered Observability built to extend visibility across cloud-native, on-prem, and hybrid technology stacks. SolarWinds Observability SaaS delivers unified and comprehensive visibility for cloud-native, on-premises, and hybrid custom and commercial applications to help ensure optimal service levels and user satisfaction with key business services. For internally written and commercial applications. Unified code-level troubleshooting with transaction tracing, code-profiling, and exception tracking combined with end user experience insights through synthetic and real user monitoring. Deep database performance monitoring. Increase system performance, team efficiency, and infrastructure cost savings by offering full visibility into open-source databases including MySQL®, PostgreSQL®, MongoDB®, Azure® SQL, Amazon Aurora®, and Redis®. -
27
Samhain
Samhain Design Labs
Samhain is an open-source, host-based intrusion detection system (HIDS) that provides file integrity checking and log file monitoring/analysis, as well as port monitoring, detection of rogue SUID executables, and hidden processes. Samhain been designed to monitor multiple hosts with potentially different operating systems, providing centralized logging and maintenance, although it can also be used as a standalone application on a single host. Beltane is a web-based central management console for the Samhain file integrity/intrusion detection system. It enables the administrator to browse client messages, acknowledge them, and update centrally stored file signature databases. -
28
Opsview
Opsview
Opsview monitors operating systems, networks, cloud, VMs, containers, databases, applications, and more. Business Service Monitoring, or BSM, allows you a much-enhanced view into your IT infrastructure – as opposed to looking at your infrastructure on a Host by Host basis. Your monitoring solution will understand resiliency, service / operational availability (SLA/OLA), and more. 200+ Opsview supported Opspacks and 4500+ plugins via the Nagios Exchange allow your business to quickly monitor IT infrastructure, public and private cloud services, VMs, containers, databases, and applications. If your business already has existing ticketing, notification, and analytics systems, the Opsview API allows for easy two-way communication and workflow. Monitoring software without top-notch customer support isn't worth it. The Opsview Customer Success Team strives to create increasing value for our customers with their monitoring expertise. -
29
Gain real-time, file-level control of risks for accurate monitoring and compliance with a single agent and central dashboard. Continuously monitor critical assets for changes across diverse cloud and on-premises environments of all sizes, including large global enterprises. Prioritize alerts and reduce noise with threat intelligence from Trusted Sources and File Reputation context. Includes File Access Management (FAM) to trigger alerts when critical host files, not intended for regular use, are accessed. Also, agentless network device support to alert on network configuration deviations. Pre-configured monitoring profiles to comply with PCI DSS 4.0, NERC CIP, FISMA, SOX, NIST, HIPAA 2023, CIS18, GDPR, and more.
-
30
Percona Monitoring and Management (PMM) is a free, best-of-breed, open source database monitoring and management solution. It helps enterprises reduce complexity and simplify management, while optimizing performance and improving the security of your business-critical database environments, no matter where they are located - on-premises or in the cloud. It provides thorough time-based analysis for MySQL, PostgreSQL and MongoDB servers to ensure that your data works as efficiently as possible. PMM allows you to identify the issues that impact your business, fast! Our single platform simplifies management and reduces complexity. It helps you optimize your database by allowing you to easily find, fix, and prevent issues with scaling, bottlenecks and potential outages. Our innovative tools improve data security and reduce your risk of data exposure. PMM is used by thousands of organizations around the globe to manage their complex database environments.Starting Price: $0
-
31
DBA xPress
SolarWinds
Managing large data estates is challenging. It’s hard to track the dependencies among your databases, particularly if your data estate is constantly changing through growth or acquisitions. Common problems include difficulties understanding the differences among databases, inadequate solutions for comparing data schema, and the inability to track dependencies and connections so that you can successfully manage data, users, and security. DBA xPress simplifies managing large data estates by providing solutions for comparing data schema and browsing through database content: compare databases and synchronize schema and data within them, analyze dependencies and connections among tables, users, functions, and security policies, browse content of SQL Server databases, access the scripts for each object, and export them into an XML file. Automating repetitive tasks can save you time, reduce the risk of human error, and streamline processes.Starting Price: $325 per year -
32
IBM Guardium Data Protection supports a zero trust approach to security. It discovers and classifies sensitive data from across the enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data. Guardium Data Protection is built on a scalable architecture, which provides full visibility into structured, semi-structured and unstructured data activity across all major data repositories—stored on-premises, in private and public cloud and in containers. Using a single interface, you can set access policies, monitor user access to protected data and discover, investigate and remediate vulnerabilities and threats as they occur in real time across your data environment.
-
33
Releem
Releem
Releem is an AI-powered MySQL performance monitoring tool that delivers consistent performance through continuous database profiling, configuration tuning, and SQL query optimization. Releem automates analysis, performance issues detection, configuration tuning, query optimization and schema control to save you time and improve MySQL performance. Here’s what makes us different from other database performance monitoring and management solutions: 📊 Quick and simple to use with all the metrics displayed on one page 🚀 Adaptive configuration tuning 🎯 Automatic SQL query optimization 🤘 Rapid identification of slow queries 🛡️ All databases data is safe, Releem Agent doesn’t use data from your databases 🔀 Releem supported all versions of MySQL, MariaDB, and Percona, whether installed on-premise or on AWS RDS 👐 Open-source Releem Agent with the code available on GitHub How does it work? It works like monitoring system with the active agent installed on the database server.Starting Price: Free -
34
EverSQL
EverSQL
EverSQL is the fastest way to optimize your PostgreSQL & MySQL databases automatically. It's used by over 100,000 engineers as a PostgreSQL & MySQL optimizer, to optimize SQL queries. Our customers report their queries are 25X faster on average, just minutes after getting started. Save your team 140 weekly hours on average by optimizing your SQL queries online for free. EverSQL is 100% non-intrusive, and doesn't access any of your databases' sensitive data. Choose your database type, the platform, and submit a query for optimization. Then, install the performance sensor for ongoing performance insights. Smart AI-based algorithms will optimize your PostgreSQL and MySQL queries by automatically re-writing and indexing them. EverSQL will tell you exactly what changed and how the magic works. EverSQL's non-intrusive sensor will monitor your PostgreSQL and MySQL databases performance on an ongoing basis, generate optimization insights that are quick and easy to understand and implement.Starting Price: $129 per month -
35
Happy Apps
HappyApps
Setup and monitor a wide variety of checks within seconds that include website, ping, socket, databases, messaging queues, application servers, to custom checks. Setup alerts (SMS & Email) with ease. Unique noise reduction technology dramatically cuts unnecessary alerts by consolidating related incidents, muting systems with known issues, and minimizing false positives. Get status and real-time visibility across your Apps and Business Services. Clearly displays open incidents and issues that require your attention. Group and monitor multiple Apps and IT systems that include Databases, web servers, App servers, and messaging queues as a single App. Happy Apps delivers an overall status for the App along with status for each individual member of the group. Users also get to view dependency maps between individual IT systems and how they impact other Apps.Starting Price: $9.95 per month -
36
Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.
-
37
Assuria ALM-FIM
Assuria
Monitor selected critical files, folders, and registry keys (especially those that should rarely change in normal operations) for any changes that could represent risk. Discover all of your installed packages and automatically monitor, report and alert on changes. Package monitoring is driven by policy templates allowing selective reporting and alerting of key changes. ALM FIM can store the old and new contents of changed text files and registry keys to identify and assess the exact changes that have occurred and reverse them if required. ALM-FIM collects and stores metadata about files, folders, and registry keys to provide monitoring services. Metadata collected includes details such as check-sum of the contents, size, permissions, change time, links, and other details. -
38
Varonis Data Security Platform
Varonis
The most powerful way to find, monitor, and protect sensitive data at scale. Rapidly reduce risk, detect abnormal behavior, and prove compliance with the all-in-one data security platform that won’t slow you down. A platform, a team, and a plan that give you every possible advantage. Classification, access governance and behavioral analytics combine to lock down data, stop threats, and take the pain out of compliance. We bring you a proven methodology to monitor, protect, and manage your data informed by thousands of successful rollouts. Hundreds of elite security pros build advanced threat models, update policies, and assist with incidents, freeing you to focus on other priorities. -
39
Foglight
Quest Software
Optimize performance across your databases and virtual infrastructure. Go beyond basic performance monitoring with Foglight® to quickly identify and resolve performance issues across your physical, virtual and cloud environments. Foglight products easily integrate with your existing tools, so you can monitor and analyze data from almost any source across your infrastructure and view it through a single interface. And with our fully customizable dashboards, you’re able to zero in on what matters most to your organization and view data in ways that are relevant to your business, giving you the database visibility you need while boosting overall productivity. With Foglight, you’re able to proactively detect, monitor, manage and resolve performance issues before they impact the business. -
40
FileVantage
CrowdStrike
Gain central visibility into all critical file changes with relevant, intuitive dashboards displaying valuable information on what changes, who changed it, and how the files and folders were changed. FileVantage provides IT staff additional context with added threat intelligence and detection data. Staff can quickly target file change data with any relevant adversary activity. Oversee all file changes with summary and detailed view dashboards - reduce alert fatigue by quickly targeting changes to critical files and systems. See unauthorized modifications to all relevant critical system, configuration and content files. Use pre-defined and custom policies to gain added efficiency and reduce alert volume. Create new policies based on all critical files, folders and registries, as well as users and processes. -
41
WZSysGuard
WZIS Software Pty Ltd
It's for Linux/AIX/Solaris/MacOS/FreeBSD, has the more reliable FIM function, and more effective Intrusion Detection, plus commands execution protection against software-based key-stealing attacks. WZSysGuard is a robust UNIX/Linux intrusion detection and file integrity verification software that offers advanced protection for your system. Unlike other tools, it reduces false alarms and ensures complete coverage of security-sensitive files. WZSysGuard uses a SHA 384-bit checksum algorithm to detect file changes, even those made through non-filesystem interfaces, such as during maintenance when the system is booted from a DVD or network. It not only detects critical file changes but also identifies new filesystem mounts, network services, and kernel module loads. With a web-based security trap detection interface, WZSysGuard provides a comprehensive security solution that works with minimal overhead and maximum accuracy. -
42
dbForge Monitor
Devart
dbForge Monitor is a free solution designed to provide comprehensive information about SQL Server performance in real time. It delivers detailed statistics on all essential parameters and specific information for quick identifying and resolving problems. Key Features: - Monitor SQL Server activity on the go - Know instantly the status of all your servers and databases - Diagnose and resolve issues faster - Have all the performance information at your fingertips - Uncover root causes quickly - Locate and optimize slow queries in seconds - Get the insight into your CPU and memory utilization metrics - Achieve extreme DBA productivity The goal of tool is to provide a comprehensive overview of all servers, databases, and queries, thereby saving many hours of manual work for database specialists.Starting Price: $0 -
43
TrueFort
TrueFort
Attackers will always find a way in. Insulate your environment against spreading compromise by enforcing a positive security model that curbs lateral movement. TrueFort gives security teams the scalable workload protection platform they need to secure hybrid environments. Next-gen firewalls and IP address-based controls are completely ineffective in modern infrastructure. Whether your workloads execute in the cloud, in virtual infrastructure, or on physical servers, TrueFort protects against advanced attacks with workload hardening, integrity monitoring, detection and response, and identity-based segmentation. Only TrueFort combines environment-wide security observability with real-time response, service account behavior analytics, file integrity monitoring, and CIS-certified hardening and file integrity monitoring that highlights differences between file and binary versions. -
44
FusionReactor
Intergral
FusionReactor allows you to quickly find bottlenecks in your app, server, and in your database; making your Java or ColdFusion application run faster and more efficiently. The integrated production safe debugger helps you to quickly find bugs & alleviate technical debt allowing you more time to write better code. FusionReactor continually monitors your app and your database so when an error fires automatic root cause analysis will trigger and you will be immediately sent details of where the error occurred in your stack. No more hunting for that needle - you can dive straight in and fix the issue. Free trial available see https://www.fusion-reactor.com/start-free-trial/ You will find all the APM features you expect; plus some unique features you didn’t. FusionReactor is breaking the mold of traditional APM tools and will enable you to keep your production systems online longer and with better resultsStarting Price: $19 per month -
45
Jet Profiler
Jet Profiler
Jet Profiler for MySQL 4 is a real-time query performance and diagnostics tool for the MySQL database server. Jet Profiler focuses on queries, tables and users. This gives you the information you need in order to quickly fix performance problems in your code, such as most frequent queries, most used tables or the busiest users. Data is collected, analyzed and displayed in real-time in diagrams, pie charts and tables. The graphical layout allows you to easily drill down and navigate your way through the vital data. Most of the profiling work is done in the Jet Profiler application, not in the database server. Therefore, the performance hit is normally negligible, around 1%. It supports all MySQL versions. No database server changes are necessary. No agents or separate services are needed. Jet Profiler is a desktop application which runs on your computer. You start it, connect to a server, hit the record button and you can review the results in minutes.Starting Price: $499 per license -
46
SQL Sentry
SolarWinds
Stop wasting time trying to fix SQL Server performance problems. Are you constantly fighting database performance fires, looking in vain for the root cause of SQL Server slowdowns? Without the right information, you could waste valuable time looking in the wrong places for the answers to your performance problems. You need accurate, actionable, detailed metrics to quickly identify and address database problems. With SQL Sentry, you can effectively monitor, diagnose, and optimize your entire database environment. SQL Sentry helps you get out of fire-fighting mode so you can keep your databases running continuously at peak performance. SQL Sentry gives you the level of detail you need to find and fix SQL Server performance problems. SQL Sentry is the flagship product in the SentryOne monitoring solutions set, and was built by SQL Server experts to help you save time and frustration in troubleshooting database performance problems.Starting Price: $1,628 -
47
Trustwave
Trustwave
Cloud-native platform that gives enterprises unprecedented visibility and control over how security resources are provisioned, monitored and managed across any environment. The Trustwave Fusion platform is a cloud-based cybersecurity platform that serves as the foundation for the Trustwave managed security services, products and other cybersecurity offerings. The Trustwave Fusion platform is purpose built to meet the enterprise where they are today in their operations and in the future as they embrace digital transformation and contend with a continuously evolving security landscape. Connects the digital footprints of enterprises and government agencies to a robust security cloud comprised of the Trustwave data lake, advanced analytics, actionable threat intelligence, a wide range of security services and products and Trustwave SpiderLabs, the company’s elite team of security specialists. -
48
Navicat Monitor
PremiumSoft CyberTech
Navicat Monitor is a safe, simple and agentless remote server monitoring tool that is packed with powerful features to make your monitoring effective as possible. Monitored servers include MySQL, MariaDB and SQL Server, and compatible with cloud databases like Amazon RDS, Amazon Aurora, Oracle Cloud, Google Cloud and Microsoft Azure. Navicat Monitor includes a rich set of real-time and historical graphs that allow you to drill down into server statistic details. It gives you a detailed view of each server load and performance regarding its availability, disk usage, network I/O, table locks and more, which allows you to easily track the deviations and traffic among servers, as well as examine possible solutions and adjust your server settings. Collect metrics of multiple instances on the same chart to compare and analyze data at incredible speed. You can also save your chart as a high-quality PDF document with one click.Starting Price: $12.99 per month -
49
Tripwire
Fortra
Cybersecurity for Enterprise and Industrial Organizations. Protect against cyberattacks with the industry’s best foundational security controls. Detect threats, identify vulnerabilities and harden configurations in real time with Tripwire. Thousands of organizations trust Tripwire Enterprise to serve as the core of their cybersecurity programs. Join them and regain complete control over your IT environment with sophisticated FIM and SCM. Shortens the time it takes to catch and limit damage from threats, anomalies, and suspicious changes. Gives you deep, unparalleled visibility into your security system state and know your security posture at all times. Closes the gap between IT and security by integrating with both teams' existing toolsets. Out-of-the-box platforms and policies enforce regulatory compliance standards. -
50
SQL Secure
IDERA, an Idera, Inc. company
SQL Secure helps database administrators to manage SQL Server security in physical, virtual, and cloud environments - including managed cloud databases. Unlike its competition, it provides configurable data collection, customizable templates to satisfy audits for multiple regulatory guidelines, extensive security checks and audit rules, automated server registration process, and server group tagging.Starting Price: $1,036 per instance