Alternatives to Randtronics DPM Database Manager
Compare Randtronics DPM Database Manager alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to Randtronics DPM Database Manager in 2026. Compare features, ratings, user reviews, pricing, and more from Randtronics DPM Database Manager competitors and alternatives in order to make an informed decision for your business.
-
1
InterBase
Embarcadero
Ultrafast, scalable, embeddable SQL database with commercial-grade data security, disaster recovery, and change synchronization. Cross-platform, zero-install, embedded database as a direct-access library. Cross-platform, zero-install, embedded database with database-level and column-level AES and DES encryption. Concurrent applications/client access to the database on Windows with database-level and column-level AES and DES encryption. Ultrafast, scalable, SQL server database for Windows and Linux with commercial-grade data security, disaster recovery and change synchronization. Attacks on databases and loss of data can be costly and lead to loss of customers’ trust (and business), regulatory action, and heavy fines. InterBase provides over-the-wire and at-rest encryption, separate security login, and role-based user security. InterBase maintains full on-disk encryption while adding negligible overhead to database speed and performance. -
2
ScaleGrid
ScaleGrid
ScaleGrid is a fully managed Database-as-a-Service (DBaaS) platform that helps you automate your time-consuming database administration tasks both in the cloud and on-premises. Easily provision, monitor, backup and scale your open source databases with high availability, advanced security, full superuser and SSH access, query analysis, and troubleshooting support to improve the performance of your deployments. Supported databases include: - MySQL - PostgreSQL - Redis™ - MongoDB® database - Greenplum™ (coming soon) The ScaleGrid platform supports both public and private clouds, including AWS, Azure, Google Cloud Platform (GCP), DigitalOcean, Linode, Oracle Cloud Infrastructure (OCI), VMware and OpenStack. Used by thousands of developers, startups, and enterprise customers including Atlassian, Meteor, and Accenture, ScaleGrid handles all your database operations at any scale so you can focus on your application performance.Starting Price: $8 per month -
3
Oracle Advanced Security
Oracle
Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer. Encrypt individual data columns, entire tablespaces, database exports, and backups to control access to sensitive data. Data Redaction complements TDE by reducing the risk of unauthorized data exposure in applications, redacting sensitive data before it leaves the database. Partial or full redaction prevents large-scale extraction of sensitive data into reports and spreadsheets. Encryption is implemented at the database kernel level, eliminating the need for any changes to applications. -
4
The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.Starting Price: $230 one-time payment
-
5
DataSunrise Database Security
DataSunrise
Data-Centric high-performance database security software. Regulatory Compliance with SOX, HIPAA, GDPR, PCI DSS and other privacy laws and standards. Hybrid and Multi-Cloud Database Security Proxy on AWS, Azure, Google and On-Prem. Sensitive and PII data auditing, discovery and active protection. Data Auditing enables real-time tracking of user actions and changes made to data and databases to ensure compliance-ready environment, increased visibility. Database Firewall, role based & location aware Data Access Control & Protection. Secure corporate databases in cloud & on-prem against hostile, negligent actions. Secures sensitive data in development and testing environments; Encryption; completely eliminates the possibility to reverse engineer the masked data. Real-time role and location based data masking of production data. Prevents exposure of sensitive privacy data while production data is not changed physically. -
6
Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
-
7
Oracle Data Safe
Oracle
Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. Whether you’re using Oracle Autonomous Database. Oracle Database Cloud Service (exadata, virtual machine, or bare metal), or Oracle Databases on-premises in your own data center, Data Safe delivers essential data security capabilities that help you reduce risk and improve security. Assess user risk by highlighting critical users, roles and privileges. Configure audit policies and collect user activity to identify unusual behavior. Discover sensitive data and understand where it is located. Remove risk from non-production data sets by masking sensitive data. -
8
Trustwave DbProtect
Trustwave
A highly scalable database security platform that enables organizations to secure their relational databases and big data stores, both on premises and in the cloud, with a distributed architecture and enterprise-level analytics. Databases contain sensitive and proprietary information, making them a prized target for cybercriminals who are constantly looking for ways to access valuable data for large financial payoffs. Trustwave DbProtect helps your business overcome resource limitations to uncover database configuration errors, access control issues, missing patches, and other weaknesses that could lead to data leakage and misuse and other serious repercussions. A real-time view of database assets, vulnerabilities, risk levels, user privileges, anomalies and incidents via a single intuitive dashboard. The ability to detect, alert and take corrective action against suspicious activities, intrusions and policy violations. -
9
DataGate
ASNA
Simple, secure, and performant database access is the key to creating successful enterprise applications. And that’s just what ASNA DataGate® provides. ASNA DataGate works directly with either the IBM i or MS SQL Server® databases. DateGate provides transparent record-level access to IBM i DB and Microsoft SQL Server databases with superb performance, performant, and security. DataGate decouples database access from the .NET application--this lets an ASNA Visual RPG application connect to either IBM i DB2 or Microsoft SQL Server without making any major changes to the database access logic. This ability to retarget your application to a different database without major effort is especially powerful in RPG-to.NET application migration scenarios. -
10
Randtronics DPM easyData
Randtronics
DPM easyData is a high-performance data spoofing or de-identification engine. Data spoofing examples include masking, tokenization, anonymization, pseudonymization and encryption. DPM data spoofing processes replace whole or parts of sensitive data with a non-sensitive equivalent (creates fake data) and is a very powerful data protection tool. DPM easyData is a software data security solution that allows web and app server applications and databases to tokenize and anonymize data and apply masking policies for unauthorized users when retrieving sensitive data. The software allows a high level of granularity, defining which authorized users have access to which protection policies, and what operations they may perform with those protection policies. DPM easyData is extremely customizable and is able to protect and tokenize many different types of data. The software has been designed to be flexible and users are free to define any format of input data and token format. -
11
Create federated source data names to enable users to access multiple data sources via the same connection. Use the web-based administrative console for simplified maintenance of user access, privileges and authorizations. Apply data quality functions such as match-code generation, parsing and other tasks inside the view. Improved performance with in-memory data caches & scheduling. Secured information with data masking & encryption. Lets you keep application queries current and available to users, and reduce loads on operational systems. Enables you to define access permissions for a user or group at the catalog, schema, table, column and row levels. Advanced data masking and encryption capabilities let you determine not only who’s authorized to view your data, but also what they see on an extremely granular level. It all helps ensure sensitive data doesn’t fall into the wrong hands.
-
12
Delinea’s Database Access Controller enables enterprises to adopt modern cloud databases from AWS, Google, Azure, Oracle, Redis, and others while still enforcing appropriate access levels, multi-factor authentication, complete reporting, and auditing workflows. Proxy connections through a centralized portal and restrict direct database access. Protect databases with layered authentication, authorization, and granular role-based access controls. Provides time-based access, auditable logs, and reports to generate alerts and notifications. Gain granular access control to databases, such as Oracle, MySQL, PostgreSQL, MariaDB, MongoDB, Redis, AWS RDS, and Google DB, whether on-premise or in the cloud. See who is accessing databases and govern their database access using capabilities such as multi-factor authentication (MFA) and logging activities for tighter database security. Secure database access to protect your most valuable information.
-
13
IRI CellShield
IRI
IRI CellShield® protects the sensitive information in your Microsoft Excel® spreadsheets, allowing you to comply with data privacy laws. Point-and-click to protect your columns with reversible and non-reversible masking functions. CellShield keeps your data secure, whether it's in one sheet or a million. Use multiple search methods to find and report on PII across the LAN, and protect it all at once. Classify and mask it in intuitive graphical dialogs. CellShield's core technology is built on the award-winning IRI FieldShield data masking product for databases and flat files. Data masked in one platform can be revealed in another. CellShield EE is the only full-featured, professional data discovery, masking, and auditing package for Excel 2010, 2013, 2016, and 2019 (plus Office 365) workbooks in your LAN. CellShield EE exceeds the security and scope of a single password by combining and automating all these extra capabilities.Starting Price: $35 one-time payment -
14
Privacy1
Privacy1
Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmenStarting Price: $159 per month -
15
Trellix Database Security
Trellix
Trellix Database Security finds and protects sensitive information in databases from accidental leakage and intentional exposure while maintaining security, optimizing performance, and managing access. Discover sensitive and proprietary information in databases across the environment. Improve regulatory compliance by blocking unauthorized access to sensitive data. Address vulnerabilities quickly, with little to no downtime. Monitor, log, and control database access, in addition to identifying and blocking potential threats before they can damage the environment. Perform automated scans to find supported databases and the sensitive data they contain. Identify and prioritize known vulnerabilities, and receive detailed remediation advice. Protect databases from known and unknown vulnerabilities without downtime. Stop intrusions and other exploits before they impact your environment. -
16
MemberProtect
InetSolution
MemberProtect is designed for professional programmers to easily integrate into secure online systems, such as ACH, Online Banking, and wire transfer applications. MemberProtect is the most trusted user authentication, data encryption, and user management framework in the banking and credit union industries today. Based on roles & privileges model. Supports millions of users and organizations. Extremely granular application security. Powerful encryption that secures databases at the column level. Encrypt email messages and flat files stored anywhere on your network. Thorough logging, even failed attempts, of all data access. Protect member data from hackers & unauthorized staff, even beyond the limitations of firewalls, SSL, and operating systems. Leverage MemberProtect to develop secure connections with third-party APIs. Access to any web-based system, including support for LDAP. -
17
KS DB Merge Tools
KS DB Merge Tools
KS DB Merge Tools is an easy to use diff & merge tool for MySQL, MariaDB, Oracle Database, SQL Server, PostgreSQL, SQLite, MS Access and Cross-DBMS databases allowing to compare and sync both schema and data. Starting with a schema changes summary, results can be narrowed down to object lists of particular object type (table definitions, views, etc.), and then down to definition of particular object. Data changes can be retrieved as a high-level list of changes totals across all tables in the database, each total row count can be observed as a side-by-side list of rows for the given table, each changed row can be analyzed for changes in each column. Various diff results provide quick filters to show only new/changed/new+changed items (schema objects or table data rows), ability to select required changed items and generate scripts to apply these changes to the other side database. This script can be executed immediately or saved for future use.Starting Price: $65 -
18
IRI Data Protector Suite
IRI, The CoSort Company
The IRI Data Protector suite contains multiple data masking products which can be licensed standalone or in a discounted bundle to profile, classify, search, mask, and audit PII and other sensitive information in structured, semi-structured, and unstructured data sources. Apply their many masking functions consistently for referential integrity: IRI FieldShield® Structured Data Masking FieldShield classifies, finds, de-identifies, risk-scores, and audits PII in databases, flat files, JSON, etc. IRI DarkShield® Semi & Unstructured Data Masking DarkShield classifies, finds, and deletes PII in text, pdf, Parquet, C/BLOBs, MS documents, logs, NoSQL DBs, images, and faces. IRI CellShield® Excel® Data Masking CellShield finds, reports on, masks, and audits changes to PII in Excel columns and values LAN-wide or in the cloud. IRI Data Masking as a Service IRI DMaaS engineers in the US and abroad do the work of classifying, finding, masking, and risk-scoring PII for you. -
19
Foundational
Foundational
Identify code and optimization issues in real-time, prevent data incidents pre-deploy, and govern data-impacting code changes end to end—from the operational database to the user-facing dashboard. Automated, column-level data lineage, from the operational database all the way to the reporting layer, ensures every dependency is analyzed. Foundational automates data contract enforcement by analyzing every repository from upstream to downstream, directly from source code. Use Foundational to proactively identify code and data issues, find and prevent issues, and create controls and guardrails. Foundational can be set up in minutes with no code changes required. -
20
iSecurity DB-Gate
Raz-Lee Security
DB-Gate empowers IBM i customers with exciting data access capabilities, based on Open Database Connectivity (ODBC), employing standard IBM i facilities to enable fully database-transparent access to remote systems. Using native SQL on the IBM i, users can now access specific files on DB2 and non-DB2 remote databases without any special hardware appliance or software on the remote database. From interactive STRSQL and from any standard program in RPG, Cobol, C, or other languages, access is now easier and more natural than ever. DB-Gate has been proven to be a full, successful replacement for OAM, the Oracle Access Manager, which has not been supported since IBM i release 7.3. As your enterprise applications expand in database requirements and complexity, so does the need to access multiple databases from your main application server. Current methods of accessing specific files on a remote database from within the IBM i require considerable time and resources. -
21
SQL Compliance Manager
IDERA, an Idera, Inc. company
SQL Compliance Manager helps database administrators to monitor, audit, and alert on SQL Server user activity and data changes. Unlike its competition, it provides quick configuration of audit settings, a broad list of regulatory guideline templates for audit settings and reports, before and after data values for both regulatory compliance and forensic data investigations, differentiation of data access and between regular and privileged users and applications, easy specification of and reporting on sensitive data columns access and changes, and extensive customization of audit settings for databases and servers.Starting Price: $3,036.00 per instance -
22
BladeLogic Database Automation
BMC Software
BladeLogic Database Automation is a multi-platform database automation solution that enables database administrators to deploy, patch, upgrade and maintain databases in 1/10th the normal provisioning time. Thus, administrators get more time to support the rollouts of new apps. In today’s digital economy, innovative applications depend on fast-performing databases. Skilled database administrators spend a majority of their time ensuring the existing environments are well maintained, compliant, and secure. Security threats seek vulnerabilities at the database level, which put more pressure on IT to keep current on patches and compliance policies. This gives IT little time to optimize database configurations and queries or push out new features for application releases. -
23
iSecurity AP-Journal
Raz-Lee Security
iSecurity AP-Journal protects business-critical information from insider threats and from external security breaches, and notifies managers of any changes to information assets and streamlines IBM i journaling procedures. iSecurity AP-Journal logs the who, what, when and which of activities. It logs database access (READ operations) directly into the journal receivers, which is not provided by IBM i journaling and is an important component of compliance. Monitors changes to objects, application files and members. Supports periodic file structure changes to application files. Enables monitoring application files across changes to file structures. Programmable field-specific exit routines. Real-time alerts indicating changes in business-critical data; these application alerts are activated by user-defined thresholds. Comprehensive reports displaying all application changes on a single timeline in various formats. -
24
DBHawk
Datasparc
Using DBHawk, our customers were able to comply with GDPR, HIPAA, SOX, GLBA, and other regulations and were able to implement SOD. Self-Service BI & Ad-Hoc Reporting Tool with feature to define Data Access Policy, Connect to multiple Data sources, Build Powerful SQL Charts and data Dashboards. DBHawk SQL editor is an advanced editor that allows users to build, edit, and run database queries with a web-based interface. DBHawk Query Builder is supported with all major databases such as Oracle, Microsoft SQL Server, PostgreSQL, Greenplum, MySQL, DB2, Amazon Redshift, Hive, Amazon Athena. Database SQL tasks and batch job automation with a web-based centralized tool. Secure access to SQL, NoSQL and Cloud databases with our all-in-one data platform. Trusted by our customers to protect and access their data. Centralized Security, Auditing and insights about your user’s activities.Starting Price: $99.00/month/user -
25
DataHawk
We-Bridge
Visualize data lineage by automatically extracting data flow from data source to target. A data lineage management solution that automatically collects and analyzes data lineage of mission-critical data, visualizing data flow and derivation rule from data source to target. Data Lineage is the flow of data from the source to the target. Tracking Data Lineage means understanding what flow and derivation rules the data processed, transformed and used. Multi-tier column level data lineage graph and list from source to target. Drill down data lineage – business system, table and column level. Provide parsers for various environment analysis and support analysis of Big Data technologies. Path sensitive dynamic string analysis and data flow analysis inside programs with our patented technology. -
26
Oracle Audit Vault and Database Firewall monitors Oracle and non-Oracle database traffic to detect and block threats, as well as improves compliance reporting by consolidating audit data from databases, operating systems, directories, and other sources. It can be deployed on-premises or in the Oracle Cloud. Oracle Audit Vault and Database Firewall (AVDF) is a complete Database Activity Monitoring (DAM) solution that combines native audit data with network-based SQL traffic capture. AVDF includes an enterprise quality audit data warehouse, host-based audit data collection agents, powerful reporting and analysis tools, alert framework, audit dashboard, and a multi-stage Database Firewall. Dozens of out-of-the-box compliance reports provide easy, schedulable, customized reporting for regulations such as GDPR, PCI, GLBA, HIPAA, IRS 1075, SOX, and UK DPA.
-
27
Scuba Database Vulnerability Scanner. Download Scuba, a free tool that uncovers hidden security risks. Scan enterprise databases for vulnerabilities and misconfiguration. Know the risks to your databases. Get recommendations on how to mitigate identified issues. Available for Windows, Mac, Linux (x32), and Linux (x64), Scuba offers over 2,300 assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Scuba is a free tool that scans leading enterprise databases for security vulnerabilities and configuration flaws, including patch levels, that allows you to uncover potential database security risks. It includes more than 2,300 assessment tests for Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2 and MySQL. It’s possible to run a Scuba scan from any Windows, Mac or Linux client. Depending on your database size, users, groups and network connection, an average Scuba scan normally takes 2-3 minutes. No pre-installation or other dependencies are required.
-
28
BlazeSQL
BlazeSQL
Blaze learns about your database, writes your SQL code, runs the query, and even creates graphs and dashboards, for ultimate AI data analytics. Tell Blaze what you need and skip 85% of the data work. BlazeSQL for desktop allows you to run queries and visualize your data, completely local and private, Blaze AI remembers what your columns mean, by letting you add that information to its memory (like database documentation). Add your database info in seconds, connect, or just paste column names. The AI can understand your database without seeing your actual data, just run the provided query to extract table names, column names, etc. Paste the result, and the AI will remember it. Blaze is the perfect tool for working with SQL databases. Simply write what data you want in English, and Blaze gives you the SQL code. Blaze can generate pretty complex queries using the technology behind ChatGPT, and improve over time. -
29
SQL Data Analysis
Yohz Software
Import data sets from your databases using SQL queries. Analyze your data sets using analysis tables and pivot tables. Discover new patterns and trends from your analysis. Share your discoveries using PDF reports, or export to Excel, HTML, and XML files. Get actionable insights from your SQL data sets in a fast and easy way. Sort, filter, group, and summarize your SQL data sets in whichever way you need. You can group columns in whichever order you require. This allows you to summarize your data in many possible ways, potentially uncovering new information or patterns. Create summaries for any columns, or even multiple summaries for the same column using different functions. View summaries in group headers, group footers, and column footers. Highlight exceptional values using flexible rules and formulas. Sort one or more columns in ascending or descending orders, in the sequence you require. Each column can be filtered to display only the data you want to see.Starting Price: $45 one-time payment -
30
IRI DarkShield
IRI, The CoSort Company
IRI DarkShield is a powerful data masking tool that can (simultaneously) find and anonymize Personally Identifiable Information (PII) "hidden" in semi-structured and unstructured files and database columns / collections. DarkShield jobs are configured, logged, and run from IRI Workbench or a restful RPC (web services) API to encrypt, redact, blur, etc., the PII it finds in: * NoSQL & RDBs * PDFs * Parquet * JSON, XML & CSV * Excel & Word * BMP, DICOM, GIF, JPG & TIFF DarkShield is one of 3 data masking products in the IRI Data Protector Suite, and comes with IRI Voracity data management platform subscriptions. DarkShield bridges the gap between structured and unstructured data masking, allowing users to secure data in a consistent manner across disparate silos and formats by using the same masking functions as FieldShield and CellShield EE. DarkShield also handles data in RDBs and flat-files, too, but there are more capabilities that FieldShield offers for those sources.Starting Price: $5000 -
31
InstaDB
Atinea
It has been extensively tested on real-life business projects. It is stable and robust, easily extendable and efficient. It can be used in a vast range of applications. Every column added to a table is automatically accessible in the table filters. Moreover, in the case of references, you may filter using any parameter of referee tables. You may use any column (including columns of referee tables) for sorting your records. You may compose several filters to get a hierarchical order. Export to xls or csv is simple. You just copy-paste or download a csv file. Importing from spreadsheets is supported. InstaDB checks whether the formats are correct and referenced records exist in the database. Before any update, a preview of changes is displayed in order to avoid unwanted changes. It is easy to show, hide and change the order of columns. The Reset View button always restores the default column composition.Starting Price: $20 per month -
32
Oracle Big Data SQL Cloud Service enables organizations to immediately analyze data across Apache Hadoop, NoSQL and Oracle Database leveraging their existing SQL skills, security policies and applications with extreme performance. From simplifying data science efforts to unlocking data lakes, Big Data SQL makes the benefits of Big Data available to the largest group of end users possible. Big Data SQL gives users a single location to catalog and secure data in Hadoop and NoSQL systems, Oracle Database. Seamless metadata integration and queries which join data from Oracle Database with data from Hadoop and NoSQL databases. Utilities and conversion routines support automatic mappings from metadata stored in HCatalog (or the Hive Metastore) to Oracle Tables. Enhanced access parameters give administrators the flexibility to control column mapping and data access behavior. Multiple cluster support enables one Oracle Database to query multiple Hadoop clusters and/or NoSQL systems.
-
33
HashiCorp Vault
HashiCorp
Secure, store and tightly control access to tokens, passwords, certificates, encryption keys for protecting secrets and other sensitive data using a UI, CLI, or HTTP API. Secure applications and systems with machine identity and automate credential issuance, rotation, and more. Enable attestation of application and workload identity, using Vault as the trusted authority. Many organizations have credentials hard coded in source code, littered throughout configuration files and configuration management tools, and stored in plaintext in version control, wikis, and shared volumes. Safeguarding and ensuring that a credentials isn’t leaked, or in the likelihood it is, that the organization can quickly revoke access and remediate, is a complex problem to solve. -
34
Powertech Encryption for IBM i protects sensitive data using strong encryption, tokenization, integrated key management and auditing. Powertech Encryption allows organizations to encrypt database fields, backups and IFS files quickly and effectively with its intuitive screens and proven technology. Our database encryption software allows organizations to encrypt database fields, backups, and IFS files quickly and effectively with its intuitive screens and proven technology. Organizations around the world depend on Powertech Encryption to help secure confidential data on IBM i (iSeries, AS/400), as well as data from distributed systems, from both external hackers and unauthorized internal users.
-
35
SQLFlow
Gudu Software
SQLFlow provides a visual representation of the overall flow of data. Automated SQL data lineage analysis across databases, ETL, business intelligence, cloud and Hadoop environments by parsing SQL Script and stored procedure. Depict all the data movement graphically. Support more than 20 major databases and still growing. Provide automation in building the lineage no matter where the SQL resides: databases, file system, Github, Bitbucket and etc. Shows data flows in a way that is user-friendly, clear, and understandable. Get full visibility into your BI environment. Discovering Root-Cause of Reporting Errors, creates invaluable business confidence. Simplify regulatory compliance. The visualization of data lineage provide greater transparency and audit ability. Enable impact analysis at a granular level, drill down into table, column, and query-level lineage. Add the powerful data lineage analysis capability to your product instantly.Starting Price: $49.99 per month -
36
DBArtisan
IDERA
Proactively manage all major DBMSs (SQL Server, Azure SQL Database, Oracle Database, Sybase ASE and IQ, Db2 LUW and z/OS, Redshift, MySQL, PostgreSQL, and Greenplum) from a single common interface. Reduce training requirements and streamline collaboration among different teams across the organization. Manage multiple Oracle-specific schema object types and SQL Server advanced object properties such as temporal tables, in-memory tables, and natively compiled triggers, procedures and functions. Comprehensive tools help you manage space, data and performance to keep your databases optimized and available. Manage the performance of your databases with a built-in process monitor that helps you understand who is connected to your database along with each user's current activity and session-related data. Sophisticated diagnostics help you pinpoint performance inefficiencies that result in poor space management, tracking key database metadata and performance metrics over time. -
37
Impler
Impler
Impler is an open source data import infrastructure designed to help engineering teams build rich data import experiences without constantly reinventing the wheel. It offers a guided data importer that navigates users through smooth data import steps, smart auto mappings that automatically align user file headings with specified columns to reduce errors, and robust validations to ensure each cell meets the defined schema and custom rules. The platform also provides validation hooks, allowing developers to write custom JavaScript code to validate data against databases, and an Excel template generator that creates tailored templates based on defined columns. Impler supports importing data with images, enabling users to upload images alongside data records, and offers an auto-import feature to fetch and import data automatically on a scheduled basis.Starting Price: $35 per month -
38
Omega Core Audit
DATAPLUS
Your Oracle database is usually the company’s most valuable informational assets, containing data on customers, partners, transactions, financial and much more. With the advent of the information age, millions of such records are now owned by even medium and relatively small companies. Database security has become one of the top concerning priorities of the companies that need to comply with more internal and external regulatory compliance practices and standards, that require stronger information security controls. Omega Core Audit is an out-of-box, software-only security and compliance solution that addresses the above compliance issues by providing Access Control, Continuous Audit Monitoring and Real-Time Protection, thus enforcing duty separation, control of privileged accounts and meeting compliance requirements. With built-in support for Splunk SIEM and GrayLog SIEM.Starting Price: $1499 USD -
39
IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities and suggest remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges. Full reports are provided as well as suggestions to address all vulnerabilities. Guardium Vulnerability Assessment detects behavioral vulnerabilities such as account sharing, excessive administrative logins and unusual after-hours activity. It identifies threats and security gaps in databases that could be exploited by hackers. Discover and classify sensitive data in heterogeneous environments. View detailed reporting on entitlements and risky configurations. Automate compliance audits and exception management.
-
40
Apache Kudu
The Apache Software Foundation
A Kudu cluster stores tables that look just like tables you're used to from relational (SQL) databases. A table can be as simple as a binary key and value, or as complex as a few hundred different strongly-typed attributes. Just like SQL, every table has a primary key made up of one or more columns. This might be a single column like a unique user identifier, or a compound key such as a (host, metric, timestamp) tuple for a machine time-series database. Rows can be efficiently read, updated, or deleted by their primary key. Kudu's simple data model makes it a breeze to port legacy applications or build new ones, no need to worry about how to encode your data into binary blobs or make sense of a huge database full of hard-to-interpret JSON. Tables are self-describing, so you can use standard tools like SQL engines or Spark to analyze your data. Kudu's APIs are designed to be easy to use. -
41
Huawei Database Security Service (DBSS)
Huawei Cloud
Database Security Service (DBSS) uses machine learning and big data technologies to protect your databases on the cloud, intelligently auditing them and detecting risky behaviors like SQL injection. Purchase and get started with DBSS quickly without the need to manually install the service or adapt your database configurations. DBSS complies with the HIPAA, SOX, and PCI DSS, meeting your auditing requirements. Take advantage of algorithm models to detect SQL injection and abnormal behaviors, fast and accurate. DBSS works in bypass mode, having zero impact on your business. A wide range of policies are available to help you detect SQL injection and audit database behaviors. Monitor databases and detect anomalies in performance, data, and user actions. Audit reports are customized for different scenarios (pre-event and post-event) and roles (common users and administrators). Perform comprehensive database audit to comply with laws and regulation. -
42
SQL Secure
IDERA, an Idera, Inc. company
SQL Secure helps database administrators to manage SQL Server security in physical, virtual, and cloud environments - including managed cloud databases. Unlike its competition, it provides configurable data collection, customizable templates to satisfy audits for multiple regulatory guidelines, extensive security checks and audit rules, automated server registration process, and server group tagging.Starting Price: $1,036 per instance -
43
IndexedDB
Mozilla
IndexedDB is a low-level API for client-side storage of significant amounts of structured data, including files/blobs. This API uses indexes to enable high-performance searches of this data. While web storage is useful for storing smaller amounts of data, it is less useful for storing larger amounts of structured data. IndexedDB provides a solution. IndexedDB is a transactional database system, like an SQL-based Relational Database Management System (RDBMS). However, unlike SQL-based RDBMSes, which use fixed-column tables, IndexedDB is a JavaScript-based object-oriented database. IndexedDB lets you store and retrieve objects that are indexed with a key; any objects supported by the structured clone algorithm can be stored. You need to specify the database schema, open a connection to your database, and then retrieve and update data within a series of transactions. Like most web storage solutions, IndexedDB follows the same-origin policy.Starting Price: Free -
44
Data Loader
Interface Computers
Data Loader is a simple, yet powerful tool capable of Synchronizing, exporting and importing data between many common database formats. If you wish to convert MS SQL Server, CSV or MS Access to MySQL, this is the best tool to satisfy your specific needs effectively. The latest Data Loader Version supports MySQL, Oracle, MS Access, Excel, FoxPro, DBF, MS SQL Server, CSV and Delimited or Flat Files. You can now easily convert Oracle to MySQL or MS SQL Server using this tool equipped with several unique and advanced features. For example, while transferring, you can filter columns and specify WHERE conditions. Similarly, Data Loader supports full mapping of source columns to target table columns. Other notable features include bulk inserts, built-in scheduler, UPSERT and INSERT, folder polling, command-line interface, etc.Starting Price: $99 one-time payment -
45
Tokern
Tokern
Open source data governance suite for databases and data lakes. Tokern is a simple to use toolkit to collect, organize and analyze data lake's metadata. Run as a command-line app for quick tasks. Run as a service for continuous collection of metadata. Analyze lineage, access control and PII datasets using reporting dashboards or programmatically in Jupyter notebooks. Tokern is an open source data governance suite for databases and data lakes. Improve ROI of your data, comply with regulations like HIPAA, CCPA and GDPR and protect critical data from insider threats with confidence. Centralized metadata management of users, datasets and jobs. Powers other data governance features. Track Column Level Data Lineage for Snowflake, AWS Redshift and BigQuery. Build lineage from query history or ETL scripts. Explore lineage using interactive graphs or programmatically using APIs or SDKs. -
46
DuckDB
DuckDB
Processing and storing tabular datasets, e.g. from CSV or Parquet files. Large result set transfer to client. Large client/server installations for centralized enterprise data warehousing. Writing to a single database from multiple concurrent processes. DuckDB is a relational database management system (RDBMS). That means it is a system for managing data stored in relations. A relation is essentially a mathematical term for a table. Each table is a named collection of rows. Each row of a given table has the same set of named columns, and each column is of a specific data type. Tables themselves are stored inside schemas, and a collection of schemas constitutes the entire database that you can access. -
47
StrainControl Laboratory Manager
DNA Globe
Store strains, cell-lines, proteins, plasmids, oligos, chemicals, inventories etc in StrainControl. You can customize all field titles to fit your lab needs. It has never been easier to manage lab items. Try our free version today and get a feeling how StrainControl can help you and the other members in the lab. No need to ask for the same thing twice. Your lab will be running smoother than ever. Share your StrainControl database with other lab members over your computer network. With user management you can create various accounts to protect your database. StrainControl is maximized with features that will help you manage everything in the lab. Manage strains, cell-lines, proteins, plasmids, oligos, chemicals, inventories etc. Share your database on a network. Rename modules, column and text fields. Hide columns that are not used. Create user accounts (read/write/admin etc). Import or export using user-friendly guides. Link files (protocols, images etc) to database.Starting Price: $299 one-time payment -
48
NocoDB
NocoDB
NocoDB is an open-source platform that turns any database into a smart spreadsheet. Create unlimited grid view, gallery view, form view from your own data. Search, sort, filter columns and rows with ultra ease. Share views publicly and also with password protection. Turn software consumers into software producers within each organization. -
49
BizDataX
Ekobit
BizDataX is a data masking that provides test data of production-level quality. It enables compliance with GDPR and other regulations by masking customers' identity while preparing data for testers and developers. By using masked/anonymized data instead of production data, the risk is significantly reduced. Focus on policy management, business requirements, sensitive data governance and other regulations. Track inventory of databases, data sources, tables and want to know where sensitive data is located. Manage large customer databases and exchange data with online partner shops and parcel delivery companies. Management of medical records is heavily regulated and regulatory compliance can be achieved with data anonymization. -
50
Coalesce
Coalesce.io
Building and managing a fully documented data project takes a lot of time and manual coding. Not anymore. When we say we can help you transform data more efficiently, we can prove it. Column-aware architecture enables reusable data patterns and change management at scale. Bring visibility to change management and impact analysis for safer and more predictable data ops. Coalesce provides curated packages with best-practice templates to automatically generate native-SQL for Snowflake™. Have a unique need? No worries, templates are fully customizable. Navigating your data pipeline is easy in Coalesce. Each screen and button is designed to provide access to everything you need. Your data team has more control over every project, from comparing code side-by-side to instantly seeing project and audit history. Table-level and column-level lineage is automatically provided and always up-to-date.