Audit integrity
The most advanced network data audit technology - stream technology is adopted to save the "context" related environment in the "stream life cycle", so as to realize the protocol analysis of mainstream databases and completely reproduce the session process of database operation.
Fine grained flexible strategy
It can provide perfect violation real-time policy alarm. The alarm information includes: database operation source IP address, database server IP / port, database type, database name, database login user name, database operation source program name, database operation source terminal name, database operation source terminal user name, SQL operation statement (DDL, DML, DCL) Stored procedure, advanced permission operation, database table group (table, field, value), database schema, operation execution time, operation return entry size.
It can provide database SQL statement execution time policy alarm, database DML, DDL and other operations affecting the number of rows policy alarm, and database select SQL operation statement returning the number of rows policy alarm.
According to the set database strategy, packet capture analysis can be carried out for the operation behavior of key resources to restore the real database interaction behavior.
Behavior monitoring and positioning
It can monitor the network traffic, data packets, burst links, number of concurrent connections, number of SQL statements and other indicators of the database in real time, and provide waveform display. There is no need to install the engine on the database server for real-time database monitoring, which has no impact on the database server.