Discover SQL Server instances that exist throughout your network environment by server or IP segment. Helps in preventing database sprawl.
Obtain bi-directional visibility into database permissions to understand who has access to a specific resource or what a specific user has access to.
Direct Permission Reports
Identify where direct permissions are applied which may be indicative of high-risk or otherwise toxic conditions (e.g. High-Risk Permissions, Empty Group Permissions, SQL Users, Stale User Permissions, Domain User Permissions).
Sensitive Data Discovery
Discover sensitive within table and column names, row values, and more. Additionally, tune sensitive data searches with modifiable controls that adjust confidence intervals and the criteria being searched for.
User and Role Assignments
Dissect database users and role assignments to understand administrative access rights, domain user access, server principals, and more.
Verify configuration settings adhere to desired standards to ensure security, compliance, and operational integrity.
Activity Auditing and Reporting
Monitor every event within every database and instance, with specific views on events in databases containing sensitive information.
Automatically identify “vulnerable” conditions like Public permissions, SQL authentication and xp_cmdshell enablement, and reused passwords.
Summarize all the finding into High, Medium, No Finding categories for easier visualization of different conditions based on severity across all the SQL Instances in the enterprise.