Requires a second level of authentication, such as sms messaging or customized tokens, to access data.
Allows administrators to set user access privileges to permit approved parties to access sensitive data.
Security and Compliance
Abilities to set standards for database security and risk management.
Identifies location of data that may be less protected and more vulnerable to threats.
Supports different database platforms and data types. Often integrates with existing databases.
Not enough data available
Sets protocols to alert administrators and back-up or encrypt data at rest or as incidents arise.
Administrators can access and organize data related to incidents to produce reports or make data more navigable.