Requires a second level of authentication, such as sms messaging or customized tokens, to access data.
(Based on 29 reviews)
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
(Based on 30 reviews)
Security and Compliance
Abilities to set standards for database security and risk management.
Identifies location of data that may be less protected and more vulnerable to threats.
Supports different database platforms and data types. Often integrates with existing databases.
(Based on 36 reviews)
Sets protocols to alert administrators and back-up or encrypt data at rest or as incidents arise.
(Based on 39 reviews)
Administrators can access and organize data related to incidents to produce reports or make data more navigable.