banner背景图 21
Database Firewall
Product Advantage
Flexible Deployment Methods
Flexible Deployment Methods
Supports various deployment methods such as transparent network bridging, proxy mode, and cluster deployment, effectively meeting the deployment and usage needs of different network environments and business scenarios.
Audit and Protective Multi-Mode Operation
Audit and Protective Multi-Mode Operation
Supports online switching between global audit mode and firewall mode without the need to restart the device. Firewall mode can instantly block packets that violate rules; global audit mode quickly forwards packets while retaining comprehensive audit records.
High Reliability (Supports Cluster Deployment, Hardware Bypass)
High Reliability (Supports Cluster Deployment, Hardware Bypass)
Supports hardware-based Bypass functionality to prevent single points of failure; supports high availability cluster deployment based on HA to ensure high-performance requirements in high-traffic environments.
High Performance, High Concurrency Capacity
High Performance, High Concurrency Capacity
Utilizing high-performance hardware platforms and kernel optimization technologies to meet performance requirements in high-load environments. Multiple engines work in coordination to support high concurrency capacity, and advanced retrieval technology enables fast querying and searching of massive data sets.
Product Capabilities
Application Protocol Intelligent Recognition and Control
Application Protocol Intelligent Recognition and Control
Automatically identifies DBA protocols, operational protocols, hacker accesses, and application software, providing comprehensive monitoring of all interface access to the database and implementing effective access control.
Built-in AI for Automatic Risk Identification
Built-in AI for Automatic Risk Identification
Featuring an intelligent learning module, the system employs machine intelligence to learn automatically, model itself, and proactively generate a blocking rule library to defend against unknown security threats.
Virtual Patching
Virtual Patching
Protects databases without the need to patch the DBMS kernel, reducing the risks and business interruptions associated with database patching and upgrades, offering convenience and resource savings.
Sensitive Data Security Protection
Sensitive Data Security Protection
Rich built-in industry sensitive data rules automatically match and identify sensitive data within databases, classifying tables and fields accordingly. Targeted strategies and analysis are developed for accessing sensitive data, enhancing data security management and reducing the risk of sensitive data leakage.
Fine-Grained Permission Control, Permission Approval
Fine-Grained Permission Control, Permission Approval
Control specific IP or MAC addresses to access servers hosting databases using operational protocols such as Telnet/SSH, restricting unauthorized individuals from performing illegal local operations on the database. Permission approval supports normal access requirements under exceptional circumstances.
Attack Detection and Protection
Attack Detection and Protection
The system incorporates a wealth of built-in security rules and models, supporting the detection and defense against risky behaviors such as database dragging, library collision, data cleansing, compromised hosts, and unauthorized access. It can effectively prevent hackers from attacking databases using vulnerabilities, SQL injections, and other methods.
Experience security protection for free now
Service Channel