按一下以檢視我們的無障礙政策
跳到內容
關於
服務
解決方案
定價
合作夥伴
資源
關閉搜尋
關閉
很抱歉。找不到符合您搜尋條件的項目。
以下操作有助您找到所需內容,建議您不妨一試:
檢查您關鍵字搜尋的拼字是否正確。
改用您所輸入關鍵字的同義詞,例如以「應用軟體」取代「軟體」。“”“”
開始新的搜尋。
清除搜尋
搜尋
功能表
功能表
聯絡我們
登入 Oracle Cloud
Oracle 台灣
安全性
資料庫安全性
Oracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall Features
Overview
Features
Features
Assess and discover
Audit and monitor
Report and alert
Prevent and protect
Simplified operational management
Database security posture management for Oracle Databases helps validate security posture and develop mitigation plans
Offers a fleet-wide, simplified view of database security assessments, along with the security findings and associated risks.
Discover what types of sensitive data you have and where they are located. Use this information to monitor activity and define policies.
Provide entitlement management to monitor individual user privileges and their drift.
Identify changes to stored procedures.
Track data access and modifications
Audit and monitor all types of activities: database, network-based SQL traffic, OS, active directory, REST, JSON, XML, CSV, and custom tables.
Detect data exfiltration attempts from databases.
Track before and after values for Oracle Databases and SQL Server.
Centrally manage Oracle unified auditing and STIG- and CIS-compliant Oracle audit policies.
Support forensic analysis and manage notifications
Receive out-of-the-box reports for security and compliance regulations.
See powerful, interactive reporting with multiple filters and generate PDF/Excel reports.
Get immediate insight into the top user activities across multiple databases.
Use the policy-based alert engine to get notified of suspicious activities.
Use read-only auditor and improved separation of duty.
Manage unauthorized data access
Multi-stage database firewall inspects SQL traffic to accurately detect and optionally block unauthorized SQL including SQL injection attacks.
Powerful policy engine that detects unauthorized access to sensitive tables.
Ability to easily profile an application’s behavior and block deviations.
Trusted path enforcement to the database based on specific OS users, client programs, client IP, and SQL categories.
Simplified operational management
Centralized management of AVDF deployment with embedded security.
Highly scalable architecture with high availability and disaster recovery.
Streamlined data retention with simplified lifecycle management.
SIEM/Syslog integration along with FIPS 140-2 mode support.
Automation through command-line interface.
Minimal or predictable downtime during hardware or software updates and upgrades.