Data Access Manager uses a man-in-the-middle proxy to control numerous kinds of databases - e.g. Cassandra, Hive, IBM DB2, Microsoft SQL Server, MySQL, PostgreSQL, Oracle and Teradata, among the others from a central point. Requests to databases and queries prevented over proxy component that authorized by DAM for the seized SQLs before. The conjunction of Data Access Management achieves data security protection within the data layer itself and carries out solid protection for database security.
The conjunction of Data Access Management achieves data security protection within the data layer itself and carries out solid protection for database security.