The Data Access Manager uses a man-in-the-middle proxy to control numerous kinds of databases - e.g. Cassandra, Hive, IBM DB2, Microsoft SQL Server, MySQL, PostgreSQL, Oracle and Teradata, among others, from a central point. User queries are sent to the database through SQL Proxy. The SQL Proxy captures user queries and applies policies. The Data Access Manager functionalities ensure data security and protection within the data layer itself and ensure solid protection for database security.
The Data Access Manager functionalities enable data security protection within the data layer itself and ensure solid protection for database security.