Requires a second level of authentication, such as sms messaging or customized tokens, to access data.
(Based on 6 reviews)
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Security and Compliance
Abilities to set standards for database security and risk management.
(Based on 10 reviews)
Identifies location of data that may be less protected and more vulnerable to threats.
(Based on 9 reviews)
Supports different database platforms and data types. Often integrates with existing databases.
Sets protocols to alert administrators and back-up or encrypt data at rest or as incidents arise.
Administrators can access and organize data related to incidents to produce reports or make data more navigable.