The Data Access Manager uses a man-in-the-middle proxy to control numerous kinds of databases - e.g. Cassandra, Hive, IBM DB2, Microsoft SQL Server, MySQL, PostgreSQL, Oracle and Teradata, among others, from a central point. Requests to databases and queries prevented over proxy component that authorized by DAM for the seized SQLs before. The Data Access Manager functionalities ensure data security and protection within the data layer itself and ensure solid protection for database security.
The Data Access Manager functionalities enable data security protection within the data layer itself and ensure solid protection for database security.