HexaTier, a provider of a unified database security and compliance solution for cloud-hosted databases and Database-as-a-Service (DBaaS) platforms, recently announced the launch of HexaTier 4.0. This solution includes new features that focus on enterprise needs for DBaaS adoption, while maintaining organizational policies and addressing the challenges and risks with database security and compliance.
HexaTier 4.0 extends organizational authentication to the cloud by allowing organizations’ database administrators to apply Active Directory (AD) individual and group policies, enabling rapid user on-boarding for cloud computing and DBaaS platform adoption initiatives. HexaTier 4.0 also allows organizations to extract the current AD policies to DBaaS instances.
As another feature, HexaTier 4.0 supports enterprise-level database performance by enabling internal and external users with proper access credentials to access databases simultaneously. Organizations are also able to enforce Dynamic Data Masking with conditional definitions to control exposure of sensitive information in real -time to authorized IT personnel and non production applications (e.g. training, testings, staging, etc). Additionally, security improvements include enhanced SQL (structured query language) injection detection and prevention mechanism at the database layer.
HexaTier’s software-based approach utilizes a patented Database Reverse Proxy technology, overcoming the limitations of competing solutions through its architecture-agnosticism, advanced management, and faster performance for securing cloud-hosted and DBaaS database instances.
HexaTier’s unified solution features four key elements:
Database security: protects databases through a database firewall, database access control, segregation of duties and blocking of SQL injections, one of the most common techniques used by hackers to attack data-driven applications.
Discovery of sensitive data: locates and classifies sensitive data, based on regulations.
Dynamic data masking: allows database administrators and security teams to create policy-driven, real-time dynamic data masking based on user credentials, applications, and business rules.
Database activity monitoring: automates compliance through audits that identify all administrative activity and access to sensitive data, and creates reports for common compliance needs.