Alternatives to iSecurity DB-Gate
Compare iSecurity DB-Gate alternatives for your business or organization using the curated list below. SourceForge ranks the best alternatives to iSecurity DB-Gate in 2026. Compare features, ratings, user reviews, pricing, and more from iSecurity DB-Gate competitors and alternatives in order to make an informed decision for your business.
-
1
ScaleGrid
ScaleGrid
ScaleGrid is a fully managed Database-as-a-Service (DBaaS) platform that helps you automate your time-consuming database administration tasks both in the cloud and on-premises. Easily provision, monitor, backup and scale your open source databases with high availability, advanced security, full superuser and SSH access, query analysis, and troubleshooting support to improve the performance of your deployments. Supported databases include: - MySQL - PostgreSQL - Redis™ - MongoDB® database - Greenplum™ (coming soon) The ScaleGrid platform supports both public and private clouds, including AWS, Azure, Google Cloud Platform (GCP), DigitalOcean, Linode, Oracle Cloud Infrastructure (OCI), VMware and OpenStack. Used by thousands of developers, startups, and enterprise customers including Atlassian, Meteor, and Accenture, ScaleGrid handles all your database operations at any scale so you can focus on your application performance.Starting Price: $8 per month -
2
DataGate
ASNA
Simple, secure, and performant database access is the key to creating successful enterprise applications. And that’s just what ASNA DataGate® provides. ASNA DataGate works directly with either the IBM i or MS SQL Server® databases. DateGate provides transparent record-level access to IBM i DB and Microsoft SQL Server databases with superb performance, performant, and security. DataGate decouples database access from the .NET application--this lets an ASNA Visual RPG application connect to either IBM i DB2 or Microsoft SQL Server without making any major changes to the database access logic. This ability to retarget your application to a different database without major effort is especially powerful in RPG-to.NET application migration scenarios. -
3
Delinea’s Database Access Controller enables enterprises to adopt modern cloud databases from AWS, Google, Azure, Oracle, Redis, and others while still enforcing appropriate access levels, multi-factor authentication, complete reporting, and auditing workflows. Proxy connections through a centralized portal and restrict direct database access. Protect databases with layered authentication, authorization, and granular role-based access controls. Provides time-based access, auditable logs, and reports to generate alerts and notifications. Gain granular access control to databases, such as Oracle, MySQL, PostgreSQL, MariaDB, MongoDB, Redis, AWS RDS, and Google DB, whether on-premise or in the cloud. See who is accessing databases and govern their database access using capabilities such as multi-factor authentication (MFA) and logging activities for tighter database security. Secure database access to protect your most valuable information.
-
4
Oracle Advanced Security
Oracle
Encrypt application tablespaces to prevent out-of-band access to sensitive data using Oracle Advanced Security. Redaction policies prevent the proliferation of sensitive data and aid in compliance with data protection regulations. Transparent Data Encryption (TDE) stops would-be attackers from bypassing the database and reading sensitive information directly from storage by enforcing data-at-rest encryption in the database layer. Encrypt individual data columns, entire tablespaces, database exports, and backups to control access to sensitive data. Data Redaction complements TDE by reducing the risk of unauthorized data exposure in applications, redacting sensitive data before it leaves the database. Partial or full redaction prevents large-scale extraction of sensitive data into reports and spreadsheets. Encryption is implemented at the database kernel level, eliminating the need for any changes to applications. -
5
The growing security threats and ever-expanding privacy regulations have made it necessary to limit exposure of sensitive data. Oracle Data Masking and Subsetting helps database customers improve security, accelerate compliance, and reduce IT costs by sanitizing copies of production data for testing, development, and other activities and by easily discarding unnecessary data. Oracle Data Masking and Subsetting enables entire copies or subsets of application data to be extracted from the database, obfuscated, and shared with partners inside and outside of the business. The integrity of the database is preserved assuring the continuity of the applications. Application Data Modeling automatically discovers columns from Oracle Database tables containing sensitive information based on built-in discovery patterns such as national identifiers, credit card numbers, and other personally identifiable information. It also automatically discovers parent-child relationships defined in the database.Starting Price: $230 one-time payment
-
6
Randtronics DPM Database Manager
Randtronics
Randtronics DPM Database Manager is designed to protect column level data in database. The software is able to do this without having to make any application level code changes - it is totally transparent to database users and applications. DPM Database Manager are able to protect data on Oracle, Microsoft SQL Server and IBM DB for iSeries databases. The software can mask the data in protected column, or tokenise the data when integrating with DPM Token Manager. Rules are designed to be extremely flexible, and it does not matter what level of access a user or application has - the software will even protect against database admins (DBAs) viewing sensitive data. All rules can be dynamically changed using the console, and applied immediately to the data. Masking of column level data in a transparent manner - no application level code changes needed. Tokenisation of column level data by integrating with DPM Token Manager. -
7
DBArtisan
IDERA
Proactively manage all major DBMSs (SQL Server, Azure SQL Database, Oracle Database, Sybase ASE and IQ, Db2 LUW and z/OS, Redshift, MySQL, PostgreSQL, and Greenplum) from a single common interface. Reduce training requirements and streamline collaboration among different teams across the organization. Manage multiple Oracle-specific schema object types and SQL Server advanced object properties such as temporal tables, in-memory tables, and natively compiled triggers, procedures and functions. Comprehensive tools help you manage space, data and performance to keep your databases optimized and available. Manage the performance of your databases with a built-in process monitor that helps you understand who is connected to your database along with each user's current activity and session-related data. Sophisticated diagnostics help you pinpoint performance inefficiencies that result in poor space management, tracking key database metadata and performance metrics over time. -
8
Omega Core Audit
DATAPLUS
Your Oracle database is usually the company’s most valuable informational assets, containing data on customers, partners, transactions, financial and much more. With the advent of the information age, millions of such records are now owned by even medium and relatively small companies. Database security has become one of the top concerning priorities of the companies that need to comply with more internal and external regulatory compliance practices and standards, that require stronger information security controls. Omega Core Audit is an out-of-box, software-only security and compliance solution that addresses the above compliance issues by providing Access Control, Continuous Audit Monitoring and Real-Time Protection, thus enforcing duty separation, control of privileged accounts and meeting compliance requirements. With built-in support for Splunk SIEM and GrayLog SIEM.Starting Price: $1499 USD -
9
Oracle Audit Vault and Database Firewall monitors Oracle and non-Oracle database traffic to detect and block threats, as well as improves compliance reporting by consolidating audit data from databases, operating systems, directories, and other sources. It can be deployed on-premises or in the Oracle Cloud. Oracle Audit Vault and Database Firewall (AVDF) is a complete Database Activity Monitoring (DAM) solution that combines native audit data with network-based SQL traffic capture. AVDF includes an enterprise quality audit data warehouse, host-based audit data collection agents, powerful reporting and analysis tools, alert framework, audit dashboard, and a multi-stage Database Firewall. Dozens of out-of-the-box compliance reports provide easy, schedulable, customized reporting for regulations such as GDPR, PCI, GLBA, HIPAA, IRS 1075, SOX, and UK DPA.
-
10
DBHawk
Datasparc
Using DBHawk, our customers were able to comply with GDPR, HIPAA, SOX, GLBA, and other regulations and were able to implement SOD. Self-Service BI & Ad-Hoc Reporting Tool with feature to define Data Access Policy, Connect to multiple Data sources, Build Powerful SQL Charts and data Dashboards. DBHawk SQL editor is an advanced editor that allows users to build, edit, and run database queries with a web-based interface. DBHawk Query Builder is supported with all major databases such as Oracle, Microsoft SQL Server, PostgreSQL, Greenplum, MySQL, DB2, Amazon Redshift, Hive, Amazon Athena. Database SQL tasks and batch job automation with a web-based centralized tool. Secure access to SQL, NoSQL and Cloud databases with our all-in-one data platform. Trusted by our customers to protect and access their data. Centralized Security, Auditing and insights about your user’s activities.Starting Price: $99.00/month/user -
11
Omega DB Security Reporter
DATAPLUS
Omega DB Security Reporter is a security auditing, software-only, and out-of-box solution for Oracle databases. It implements quick reporting, visualization and documentation of the security posture of the Oracle database and addresses the internal and external security compliance requirements. Omega DB Security Reporter provides detailed, integrated, categorized and evaluated assessment of the Oracle Database, enabling the security personnel to dispense with this complex task in a few minutes. Omega DB Security Reporter enables assessment, reporting, visualization and documentation of the security posture of your Oracle database on the following security areas of top importance: Privileges: for system, objects, and roles Audits: on system privileges, user statements, audited system actions, object privileges and operations audits Others: User password profile resources Initialization (security) parametersStarting Price: $899 USD -
12
Trellix Database Security
Trellix
Trellix Database Security finds and protects sensitive information in databases from accidental leakage and intentional exposure while maintaining security, optimizing performance, and managing access. Discover sensitive and proprietary information in databases across the environment. Improve regulatory compliance by blocking unauthorized access to sensitive data. Address vulnerabilities quickly, with little to no downtime. Monitor, log, and control database access, in addition to identifying and blocking potential threats before they can damage the environment. Perform automated scans to find supported databases and the sensitive data they contain. Identify and prioritize known vulnerabilities, and receive detailed remediation advice. Protect databases from known and unknown vulnerabilities without downtime. Stop intrusions and other exploits before they impact your environment. -
13
Oracle Data Safe
Oracle
Data Safe is a unified control center for your Oracle Databases which helps you understand the sensitivity of your data, evaluate risks to data, mask sensitive data, implement and monitor security controls, assess user security, monitor user activity, and address data security compliance requirements. Whether you’re using Oracle Autonomous Database. Oracle Database Cloud Service (exadata, virtual machine, or bare metal), or Oracle Databases on-premises in your own data center, Data Safe delivers essential data security capabilities that help you reduce risk and improve security. Assess user risk by highlighting critical users, roles and privileges. Configure audit policies and collect user activity to identify unusual behavior. Discover sensitive data and understand where it is located. Remove risk from non-production data sets by masking sensitive data. -
14
Scuba Database Vulnerability Scanner. Download Scuba, a free tool that uncovers hidden security risks. Scan enterprise databases for vulnerabilities and misconfiguration. Know the risks to your databases. Get recommendations on how to mitigate identified issues. Available for Windows, Mac, Linux (x32), and Linux (x64), Scuba offers over 2,300 assessment tests for Oracle, Microsoft SQL, SAP Sybase, IBM DB2 and MySQL. Scuba is a free tool that scans leading enterprise databases for security vulnerabilities and configuration flaws, including patch levels, that allows you to uncover potential database security risks. It includes more than 2,300 assessment tests for Oracle, Microsoft SQL Server, SAP Sybase, IBM DB2 and MySQL. It’s possible to run a Scuba scan from any Windows, Mac or Linux client. Depending on your database size, users, groups and network connection, an average Scuba scan normally takes 2-3 minutes. No pre-installation or other dependencies are required.
-
15
Protect your file and database data from misuse and help comply with industry and government regulations with this suite of integrated encryption products. IBM Guardium Data Encryption consists of an integrated suite of products built on a common infrastructure. These highly-scalable solutions provide encryption, tokenization, data masking and key management capabilities to help protect and control access to databases, files and containers across the hybrid multicloud—securing assets residing in cloud, virtual, big data and on-premise environments. Securely encrypting file and database data with such functionalities as tokenization, data masking and key rotation can help organizations address compliance with government and industry regulations, including GDPR, CCPA, PCI DSS and HIPAA. Guardium Data Encryption's capabilities—such as data access audit logging, tokenization, data masking and key management—help meet regulations such as HIPAA, CCPA or GDPR.
-
16
BladeLogic Database Automation
BMC Software
BladeLogic Database Automation is a multi-platform database automation solution that enables database administrators to deploy, patch, upgrade and maintain databases in 1/10th the normal provisioning time. Thus, administrators get more time to support the rollouts of new apps. In today’s digital economy, innovative applications depend on fast-performing databases. Skilled database administrators spend a majority of their time ensuring the existing environments are well maintained, compliant, and secure. Security threats seek vulnerabilities at the database level, which put more pressure on IT to keep current on patches and compliance policies. This gives IT little time to optimize database configurations and queries or push out new features for application releases. -
17
SAP SQL Anywhere
SAP
Run your business from anywhere with relational database management system (RDBMS) solutions from SAP SQL Anywhere. Enable secure, reliable data management for servers where no DBA is available and synchronization for tens of thousands of mobile devices, Internet of Things (IoT) systems, and remote environments. Deliver critical business data to remote offices and mobile devices for more accurate, real-time decision-making at the front lines of your business. Run mobile applications reliably and efficiently without on-site technical staff, giving mobile and remote workers an always on experience, even when they are offline. Streamline data maintenance tasks with built-in self-managing features that help users resolve issues quickly and efficiently. Protect and secure your data, even during data transmission and exchange, with powerful encryption features.Starting Price: $195 per license -
18
DataSunrise Database Security
DataSunrise
Data-Centric high-performance database security software. Regulatory Compliance with SOX, HIPAA, GDPR, PCI DSS and other privacy laws and standards. Hybrid and Multi-Cloud Database Security Proxy on AWS, Azure, Google and On-Prem. Sensitive and PII data auditing, discovery and active protection. Data Auditing enables real-time tracking of user actions and changes made to data and databases to ensure compliance-ready environment, increased visibility. Database Firewall, role based & location aware Data Access Control & Protection. Secure corporate databases in cloud & on-prem against hostile, negligent actions. Secures sensitive data in development and testing environments; Encryption; completely eliminates the possibility to reverse engineer the masked data. Real-time role and location based data masking of production data. Prevents exposure of sensitive privacy data while production data is not changed physically. -
19
iSecurity AP-Journal
Raz-Lee Security
iSecurity AP-Journal protects business-critical information from insider threats and from external security breaches, and notifies managers of any changes to information assets and streamlines IBM i journaling procedures. iSecurity AP-Journal logs the who, what, when and which of activities. It logs database access (READ operations) directly into the journal receivers, which is not provided by IBM i journaling and is an important component of compliance. Monitors changes to objects, application files and members. Supports periodic file structure changes to application files. Enables monitoring application files across changes to file structures. Programmable field-specific exit routines. Real-time alerts indicating changes in business-critical data; these application alerts are activated by user-defined thresholds. Comprehensive reports displaying all application changes on a single timeline in various formats. -
20
Trustwave DbProtect
Trustwave
A highly scalable database security platform that enables organizations to secure their relational databases and big data stores, both on premises and in the cloud, with a distributed architecture and enterprise-level analytics. Databases contain sensitive and proprietary information, making them a prized target for cybercriminals who are constantly looking for ways to access valuable data for large financial payoffs. Trustwave DbProtect helps your business overcome resource limitations to uncover database configuration errors, access control issues, missing patches, and other weaknesses that could lead to data leakage and misuse and other serious repercussions. A real-time view of database assets, vulnerabilities, risk levels, user privileges, anomalies and incidents via a single intuitive dashboard. The ability to detect, alert and take corrective action against suspicious activities, intrusions and policy violations. -
21
AppDetectivePRO
Trustwave
A database and big data scanner that identifies configuration mistakes, identification and access control issues, missing patches, and any toxic combination of settings that could lead to bad outcomes like data loss and DDoS attacks. Databases are critical repositories of customer information and intellectual property, making them enticing targets for cybercriminals. Trustwave AppDetectivePRO allows your business to discover, assess and report in minutes on the security, risk or compliance posture of any database or big data store within your environment – on premises or in the cloud. AppDetectivePRO is a database and big data scanner that identifies configuration mistakes, identification and access control issues, missing patches, and any toxic combination of settings that could lead to escalation of privilege attacks, data leakage, denial-of-service (DoS), or the unauthorized modification of data held within data stores. -
22
JackDB
JackDB
Write and execute queries in a fully interactive SQL editor. JackDB has everything you'd want in a database client, including: syntax highlighting, code formatting, and intelligent autocompletion. Snippets allow your most useful SQL queries to be saved and shared. Simply write and save any query in JackDB, and share the snippet publicly with your team. Whenever anyone updates a snippet, everyone gets access to its latest version. Security is our highest priority at JackDB. Roles are a very convenient and secure way to restrict database access to authorized users and provision new users with access to data sources. Explore everything in your database, not just tables and views. View your indexes, schemas, and other important system details such as tablespaces and user sessions.Starting Price: $49 per user per month -
23
Sysgem Logfile Concentrator
Sysgem
Sysgem's Logfile Concentrator is a comprehensive Windows-based tool designed to integrate streams of log file data from multiple sources into a single centralized location. It collects log data from remote multi-platform servers and end devices, storing them in a central database for analysis and regulatory-compliant archiving. Key features include automated archiving and reporting, customizable record displays, advanced querying, audit trail, and compliance management, as well as intelligent alarms and real-time alerts. The platform offers a user-customizable display for real-time record monitoring and provides a full web browser interface for remote access. Additionally, it supports common ODBC databases such as MS SQL, Oracle, and MS Access. As part of the Sysgem product family, Logfile Concentrator can function as a standalone solution or complement the Sysgem Enterprise Manager (SEM). -
24
Huawei Database Security Service (DBSS)
Huawei Cloud
Database Security Service (DBSS) uses machine learning and big data technologies to protect your databases on the cloud, intelligently auditing them and detecting risky behaviors like SQL injection. Purchase and get started with DBSS quickly without the need to manually install the service or adapt your database configurations. DBSS complies with the HIPAA, SOX, and PCI DSS, meeting your auditing requirements. Take advantage of algorithm models to detect SQL injection and abnormal behaviors, fast and accurate. DBSS works in bypass mode, having zero impact on your business. A wide range of policies are available to help you detect SQL injection and audit database behaviors. Monitor databases and detect anomalies in performance, data, and user actions. Audit reports are customized for different scenarios (pre-event and post-event) and roles (common users and administrators). Perform comprehensive database audit to comply with laws and regulation. -
25
Oracle GoldenGate
Oracle
Oracle GoldenGate is a comprehensive software package for real-time data integration and replication in heterogeneous IT environments. The product set enables high availability solutions, real-time data integration, transactional change data capture, data replication, transformations, and verification between operational and analytical enterprise systems. Oracle GoldenGate 19c brings extreme performance with simplified configuration and management, tighter integration with Oracle Database, support for cloud environments, expanded heterogeneity, and enhanced security. In addition to the Oracle GoldenGate core platform for real-time data movement, Oracle provides the Management Pack for Oracle GoldenGate—a visual management and monitoring solution for Oracle GoldenGate deployments—as well as Oracle GoldenGate Veridata, which allows high-speed, high-volume comparison between two in-use databases. -
26
Devart ODBC Drivers
Devart
Reliable and simple to use data connectors for ODBC data sources. Compatible with multiple third-party tools. Devart ODBC Drivers are high-performance connectivity solutions with enterprise-level features for accessing most popular database management systems and cloud services from ODBC-compliant reporting, analytics, BI, and ETL tools on 32-bit and 64-bit Windows, macOS, and Linux. Our ODBC drivers fully support standard ODBC API functions and data types to enable easy access to live data from anywhere. The drivers provide direct access to your databases and cloud accounts, which eliminates the need for the database client libraries, simplifies the deployment process, and extends your application capabilities. We offer you optimal data access by means of ODBC and native database client libraries. However, you can avoid using client libraries, since our ODBC drivers are able to connect via the native protocol directly without using client software at all.Starting Price: $99.95 one-time payment -
27
SQL Secure
IDERA, an Idera, Inc. company
SQL Secure helps database administrators to manage SQL Server security in physical, virtual, and cloud environments - including managed cloud databases. Unlike its competition, it provides configurable data collection, customizable templates to satisfy audits for multiple regulatory guidelines, extensive security checks and audit rules, automated server registration process, and server group tagging.Starting Price: $1,036 per instance -
28
Empress RDBMS
Empress Software
Empress Embedded Database engine is the heartbeat of EMPRESS RDBMS, a relational database management system specializing in embedded database technology – from car navigation systems to mission critical military command and control, from Internet routers to complex medical systems, EMPRESS beats steadily, 24/7 at the core of embedded systems applications everywhere. Empress kernel level mr API is a unique feature of Empress that gives users access to the Embedded Database kernel libraries. This Empress API provides the fastest means of accessing Empress databases. MR Routines give the developer maximum control over time and space in developing real-time embedded database applications. Empress ODBC and JDBC APIs applications to access Empress databases in both standalone and client/server mode. Empress ODBC and JDBC APIs enable many 3rd party ODBC and JDBC capable software packages to access a local Empress database or via Empress Connectivity Server. -
29
Privacy1
Privacy1
Privacy1 infrastructure brings transparency, safeguards GDPR | CCPA compliance, builds trust for your business. The solution shields your data centric organizations, lower data leak risks, ensures that no personal data is processed except with the right permission. The service has built in rich features you need to meet data compliance requirements and enforce your organizational data security to the highest level Lawfulness and data transparency: ✓ Consent management; ✓ Data privacy policy management; ✓ Data processing purpose management; ✓ Work flow for handling data subject access requests; ✓ Data processing activities recording | Data mapping; Data security protection: ✓ Data Pseudonymization in services with database; ✓ Data Pseudonymization in pipelines; ✓ Data permission governing; ✓ Data access control work flow (Tech | Legal | Actual data usage); ✓ Data usage separation in micro-services; ✓ Data risk analysis; ✓ Data protection impact assessmenStarting Price: $159 per month -
30
MyDiamo
Penta Security Systems Inc.
Developed by Penta Security Systems, an APAC leader in encryption technology and web application firewall, MyDiamo is a free open-source database encryption solution, available to all for non-commercial use. The commercial license is available for enterprises and organizations that desire extended features. -
31
Remote Gate Guard
Asiatact
Remote Gate Guard system replaces or improves residential gate guards with the Remote Gate Guard System, which offers enhancements to security while decreasing guard costs. The RGGS uses the latest technology, including high-resolution digital video cameras and recorders with secure Internet connections to offer high-quality access control to visitors. The system captures every visitor’s face and license plate. Using the latest technology, Remote Gate Guards manage visitor access and remotely grant or deny entry at gated entrances, which increases security for a fraction of the cost of a live guard. While RGG, the security officer standing outside the guardhouse to handle visitors, can be removed/redeployed. Instead of having 01 people handling an individual site, this same person can control 3-4 different locations which increase the security agency's productivity. -
32
DB CyberTech
DB CyberTech
Structured high-value data on databases, such as personal information, are highly concentrated assets in a centralized location. What happens when a hacker gains access to your network and your valuable structured data environment? Many past and recent breaches have shown that hackers had breached the network for months or years before high volume and high-value data are stolen. How can we detect and prevent structured data leak in real-time? Identification and alerting of a potential threat (prevent data loss before it happens). Monitoring any potential insider threat. Complements existing policy-based unstructured data solutions, adding continuous monitoring for structured data. -
33
SSuite MonoBase Database
SSuite Office Software
Create relational or flat file databases with unlimited tables, fields, and rows. Includes a custom report builder. Interface with ODBC compatible databases and create custom reports for them. Create your own personal and custom databases. Some Highlights: - Filter tables instantly - Ultra simple graphical-user-interface - One click table and data form creation - Open up to 5 databases simultaneously - Export your data to comma separated files - Create custom reports for all your databases - Full helpfile to assist in creating database reports - Print tables and queries directly from the data grid - Supports any SQL standard that your ODBC compatible database requires Please install and run this database application with full administrator rights for best performance and user experience. Requires: . 1024x768 Display Size . Windows 98 / XP / 7 / 8 / 10 - 32bit and 64bit No Java or DotNet required. Green Energy Software. Saving the planet one bit at a time...Starting Price: Free -
34
Oracle NoSQL Database
Oracle
Oracle NoSQL Database is designed to handle high-volume, high-velocity data applications requiring low-latency responses and flexible data models. It supports JSON, table, and key-value data types, and operates both on-premise and as a cloud service. The database scales elastically to meet dynamic workloads and provides distributed data storage across multiple shards, ensuring high availability and rapid failover. It includes Python, Node.js, Java, C, C#, and REST API drivers for easy application development. Additionally, it integrates with Oracle products such as IoT, Golden Gate, and Fusion Middleware. Oracle NoSQL Database Cloud Service is a fully managed service, freeing developers from backend infrastructure management. Oracle NoSQL Database Cloud Service is a fully managed database service for developers who want to focus on application development without dealing with the hassle of managing the back-end hardware and software infrastructure. -
35
IBM Guardium Vulnerability Assessment scans data infrastructures (databases, data warehouses and big data environments) to detect vulnerabilities and suggest remedial actions. The solution identifies exposures such as missing patches, weak passwords, unauthorized changes and misconfigured privileges. Full reports are provided as well as suggestions to address all vulnerabilities. Guardium Vulnerability Assessment detects behavioral vulnerabilities such as account sharing, excessive administrative logins and unusual after-hours activity. It identifies threats and security gaps in databases that could be exploited by hackers. Discover and classify sensitive data in heterogeneous environments. View detailed reporting on entitlements and risky configurations. Automate compliance audits and exception management.
-
36
Assure Security
Precisely
Assure Compliance Monitoring is a bundle of Assure Security features. Together, they can quickly identify security and compliance issues by producing alerts and reports on IBM i system activity, database changes and views of Db2 data. The bundle includes two features which are also available separately. Assure Monitoring and Reporting seamlessly extracts insights from IBM i journal data and delivers alerts and reports on security incidents and compliance deviations. System and database monitoring capabilities are available separately or together. Or, choose to send data directly to your enterprise SIEM solution allowing IBM i security to be monitored with all other enterprise platforms. Assure Db2 Data Monitor is a unique, innovative solution that monitors views of highly confidential Db2 data and optionally blocks records from view. Assure Security delivers market-leading IBM i security capabilities that help your organization successfully comply with cybersecurity regulations. -
37
GateWorks
Database Works
GateWorks is a Visitor Management and Assigned Parking Solution designed to easily manage all your security and Parking requirements. Track and manage all visitor passes and assigned parking with GameWorks. Schedule visitor passes or issue them on the fly. Grant staff and clients permission to create Visitor passes via the Web. NDAs can be signed at the gate or at home. Automated notifications for guest arrivals. Digital passes can be printed at home or shown via smartphone upon arrival. Issue vehicle citations to enforce traffic and parking regulations GateWorks Mobile. GateWorks Mobile allows you to access and manage your entire visitor pass and assigned parking database through approved mobile devices. This provides real-time information for your entire security staff in the palms of their hands. To learn more about Database Works and our custom software solutions, please request a demo. -
38
Dr. DeeBee
Syware
Need to connect your proprietary database to the world's most popular database tools, such as Access, Visual Basic, PowerBuilder, or Crystal Reports? It's easy with the Dr. DeeBee® ODBC Driver Kit! The Dr. DeeBee ODBC Driver Kit allows you to create ODBC database drivers quickly and easily. This ODBC tool allows you to ODBC enable your database, adding database connectivity to any proprietary database without needing to learn all the intricacies of ODBC. The Dr. DeeBee ODBC Driver Kit contains the complete source code for a fully functional ODBC driver that you can modify and distribute royalty-free. All you have to do is implement calls like OpenTable, NextRecord, GetData, and PutData, then recompile the driver. It's that simple! The Network Edition contains the complete source code for a fully functional "network enabled", full featured, Level 2 (most), ODBC 3.0 driver that you can modify and distribute royalty-free.Starting Price: $9000 -
39
WinSen Property Manager
Sentinel Systems
The WinSen Remote Site Control Module (RSCM) software program is specifically designed to manage distant, unattended facilities. It is used to control, normally via modem, one or more SSC standalone keypads. The SSC standalone keypad is self-contained, e.g., it has all the user codes, time zone assignments, and locked out statuses stored in its local database. WinSen RSCM is used to update the remote keypad database. The WinSen RSCM software runs under Windows 95, Windows 98, Windows NT, Windows 2000, and Windows XP operating systems. To update the remote system (which has a self-contained database of the users) you will select the “Start Automatic Communications” option from the WinSen RSCM File menu. RSCM will then dial the remote site(s) via modem and transmit the entire day’s activity to the remote keypads all at once. It will also transfer the keypad activity that has occurred today to the home office computer for reporting purposes.Starting Price: $1795.00/one-time -
40
Monyog
Webyog
Agentless MySQL performance monitoring that's fully customizable and allows you to optimize query performance in real-time. Trace all changes done to the MySQL Global variables using the configuration management. You can track and compare changes to the configuration file and identify the reason for performance issues. Monitor locked and long running queries in real-time. Get notifications on mail or SNMP traps, Syslog, Slack and Pagerduty for queries that take more than a specified amount of time to execute. You also have the option to configure Monyog to kill, notify or notify & kill such queries. Avoid learning new tools by using the same performance monitoring tool for MySQL on-premise on physical and virtual machines, in the private, public, and government cloud on virtual machines, and in the public and government cloud as managed databases.Starting Price: $199 one-time payment -
41
WinSQL
Synametrics Technologies
WinSQL is a powerful universal database management tool that is used by 90 percent of Fortune 500 companies and more than a million programmers and DBAs around the globe. WinSQL is a generic querying tool that connects to any relational database (RDBMS) for which an Open Database Connectivity (ODBC) driver is available, virtually all RDBMS on the market today. Connect to a variety of databases, including: heavy duty vendors Oracle, MS SQL Server, DB2, Sybase, Informix to lightweight backends like MS Access, DBase, and Text File. Generate royalty-free executables that can be used by your business users to run queries. These can be either static or dynamic queries that pull fresh data from the back-end. Export or simply open any query results into MS Excel with just a click of your mouse. You can even import an existing Excel spreadsheet to a database table by simply dragging an *.XSL file in the catalog tree.Starting Price: $99.00/year/user -
42
Gatehouse Solutions
Gatehouse Solutions
The GateHouse Solutions® security gate software is the leading technology in managing access to gated communities. It is designed to continue to operate even when network connectivity is lost so that residents and visitors are never inconvenienced with long lines and compromised security. The user-friendly gate attendant workstation helps streamline visitor tracking and resident gate access by accurately and efficiently processing requests and maintaining the operational effectiveness of gated community security personnel. The simple and organized design of the administrative workstation allows administrators to efficiently control the community's database. Your residents will have peace of mind that their information is secure and being utilized to proactively manage visitor access into their community. Other providers charge upgrade fees in addition to the support contract and/or subscription service fees. -
43
Rocket D3
Rocket Software
Easily create powerful applications for your business. Rocket® D3 and mvBase solutions are integrated database and application development environments designed for transactional and analytical database applications. They combine scalable, flexible, seamless interoperability with connectivity and low overhead for system management and administration. Companies world-wide use D3 to solve critical problems and boost their performance. High performance and scalability for transactional and business analytics applications, with low operating and system management costs. High performance database engine with flexible fields for data organization within a Windows environment. Take your MultiValue applications to the web. Access remote RDBMS tables anywhere through the industry-standard Open Database. -
44
in-STEP BLUE
microTOOL
Corporate processes and workflows or standards like the German V-Modell XT, PRINCE2 or Automotive SPICE can be managed with in-STEP BLUE. Simply tailor activities and artifacts to your individual needs. The software offers features for project, requirements, document, resource, test, change and risk management with full version control on a a centralized, multi-user capable Oracle database. Gantt-Charts, dashboards, resource and cost planning charts facilitate progress tracking. The webapp offers remote access to progress data, scheduling and more.Starting Price: from 1990 €/per licence -
45
KSign SecureDB
KSign
KsignSecureDB for database privacy protection. By reinforcing the management of customer information through the encryption of the customer's personal information held by the organization, the leakage of personal information can be prevented and damage in case of an accident can be minimized. It is a product with guaranteed safety, verified by successful construction and stable operation in a number of public, educational, and financial fields. By supporting various types of encryption from structured data to unstructured encryption, it is possible to apply an encryption method suitable for the internal environment of the customer. It is possible to establish the basis for compliance with various laws on personal information such as the Personal Information Protection Act, the Information and Communication Network Act, the Electronic Financial Transaction Act, and the Credit Information Act and secure compliance. -
46
IMatch
photools.com
IMatch Anywhere™ is an add-on for IMatch, which extends IMatch with server functionality. With IMatch Anywhere, you can now access IMatch contents from any device and any operating system with a modern web browser in your local or corporate network. Browse your files in a web browser on your tablet or smart phone. Access IMatch from Windows, Linux, macOS, Android, iOS, present your files on a Smart TV. Give friends and family access to your image collection (from within your local network or even over the Internet1). Set up an affordable and easy-to-maintain DAM for your company or institution. The core component of IMatch Anywhere is a server-ready standalone version of the IMatch WebServices (IMWS) also included in IMatch. IMWS implements a standard web service that can be used by software, apps, and other web services to access IMatch databases remotely. IMatch WebServices have been designed for excellent performance even for large databases.Starting Price: $109.99 one-time payment -
47
Scriptcase
Netmake
An efficient web development low-code platform. It helps you to create complete web systems and Business Intelligence solutions fast and easy! Scriptcase enables you to design, develop and elegant, responsive, database-driven applications using only your web browser. A powerful PHP generator for you to develop fast, simple, secure at a low cost. Connect with your database (MySQL, MariaDB, PostgreSQL, SQLite, Interbase, SQL Azure, Amazon Aurora, Firebird, Access, Oracle, MS SQLServer, DB2, SyBase, Informix or ODBC layer) and generate web applications based on your tables, simply and safely. Make the data access and maintenance an uncomplicated step! Scriptcase offers an XLS, CSV and ACCESS spreadsheet import and conversion features for the databases supported by Scriptcase. With this import tool you can easily transform your spreadsheets into system applications.Starting Price: $349 -
48
DbGate
Sprinx Systems
DbGate is a cross-platform SQL + NoSQL client that runs on Windows, macOS, Linux as desktop app, or in Docker - and then entirely in your browser. It has very powerful data browser, which allows you to quickly find or modify, what you need, even when using complicated relations. There are many filtering options allowing you in few clicks define quite complex conditions. You could of course use classical SQL editor with code completion or query designer. DbGate also has capability of design queries on NoSQL databases and event join results with SQL databases. Database compare tool is very fast, as it uses already cached DB models. You could browse and filter objects by type (table, view, procedure function) and by comparing status (equal, changed, added, removed). You could also deploy changes to database. Quite new feature is DbGate Cloud - online storage for connections and SQL scripts. You could also share folders with connections with others, with role-base permission access.Starting Price: Free -
49
iSecurity Firewall
Raz-Lee Security
iSecurity Firewall is a comprehensive, all-inclusive intrusion prevention system that secures every type of internal and external access to the IBM i server. It enables you to easily detect remote network accesses and, most importantly, implement real-time alerts. Firewall manages user profile status, secures entry via pre-defined entry points and IBM i file server exit points, and profiles activity by time. Its “top-down” functional design and intuitive logic creates a work environment that even iSeries novices can master in minutes. Protects all communication protocols (including SQL, ODBC, FTP, Telnet, SSH, and Pass-through). Intrusion Prevention System (IPS) with real-time detection of access attempts. Precisely controls what actions users may perform after access is granted – unlike standard firewall products. Protects both native and IFS objects – all of your databases are secured. -
50
Syniti Data Connectivity
Syniti
Optimize access to your IBM Db2 data with high-performance connectivity products for application access to data on IBM Db2 databases. Our standards-based ADO.NET, ODBC, ADO and JDBC connectors enable your applications to easily share data to and from IBM Db2 databases, providing fast and reliable access to Db2 servers running on IBM i/iSeries/AS400, zOS/OS390, VSE/VM, AIX, Solaris, HP/UX, Windows and Linux platforms. AAdd security to your application by encrypting data using one of our security solutions. Efficient use of native IBM operating systems. Built with 20+ years of IBM Db2 expertise. A solution to meet the needs of every environment, ODBC, .NET, JDBC, OLE DB. Setup and toolbox for easy installation and use. Performance .NET data providers for IBM® Db2® with reliable access to Db2 data for third-party commercial applications and custom applications.