There are many different and complex ways to grant access to SQL Server. It is virtually impossible to manually analyze a security model across instances or determine rights of users on specific database objects. SQL Secure answers the important question, “Who can do what, where, and how on my SQL Server databases?” SQL Secure provides a comprehensive, automated solution for analyzing, monitoring and reporting on security access rights for SQL Servers including managed cloud databases.
Analyze the effective rights of users to show how and where each right is granted. This makes it easy to pinpoint exactly what to change to close security holes
View role members and sub-roles assigned and their effective permissions for SQL Server, Azure SQL Database, and Amazon RDS for SQL Server.
Browse and analyze all files, directories and registry settings associated with SQL Server and determine ownership and explicit and inherited security rights
Analyze password health of SQL Server logins and reports on passwords that are weak or blank which would cause a susceptible to intrusion situation.
Identify services, ports, protocols, and application performance interfaces (APIs) that allow malicious users to attack SQL Server, Azure SQL Database, and Amazon RDS for SQL Server.
Assess the setup of the operating system (OS) to identify issues that would compromise SQL Server security.
Analyze the membership to powerful server roles and groups such as database, system, and security administrators to ensure this level of access is warranted.
View all logins on the target server, and any unresolved Windows accounts or groups.
Show all security-related properties for servers including the version and patch level, authentication mode, audit mode, proxy account, and cross database chaining.
Monitor all activity related to SQL Secure administration.
Audit for standards via distinct levels (basic, balanced, strong) that define realistic guidelines for protecting SQL Server from common intrusion attacks
Show details of services such as log-on and configuration.
List potential security concerns such as cross-database chaining and drill down to view the full details of the diagrammed relationships.
The SQL Secure repository keeps a complete history of SQL Server security settings to designate a baseline to detect changes.
Access built-in standard reports and create custom reports to provide detailed information for security auditing and compliance.
Security audit rules provide visibility for database access checks, configuration checks, and permission checks.
Increase security audit coverage via additional checks for data protection, encryption, and firewall rules.
Show security state from a global view (for example, all instances with guest accounts enabled).
Manage the creation of collection rules and policies, view risks and assessments, monitor collection history, and analyze user access rights via a single point of control.
Define what security information to gather and when. Gather from physical, virtual, and cloud hosts, operating systems, file systems, Registry, and Active Directory.
SQL Secure stores all security data collected in a central repository for easy reporting and forensic analysis.
Use the flexible grid view to audit and analyze user permissions. Sort, group, or export all SQL Server logins in the enterprise.
Support for large SQL Server environments with significant gains in time to value via the comma-separated values (CSV) file import process.
Assign servers to groups, then view and manage security policies according to group designations.
Unify control by running SQL Secure on cloud virtual machines with Windows—such as Azure Virtual Machine (VM) and Amazon Elastic Compute Cloud (EC2).
Monitor SQL Server instances running on cloud virtual machines—such as Azure VM and Amazon EC2.
Save time by using the same performance-monitoring tool for SQL Server databases on physical and virtual machines on-premises; on virtual machines in the private, public, and government cloud; and as managed databases in the public and government cloud.
Map cloud storage as network drives or removable drives on Windows. For example, map storage to Amazon Simple Storage Service (S3) and Azure Blob Storage.
Extend cloud capabilities with monitoring the managed cloud databases Azure SQL Database and Amazon RDS for SQL Server.
Everything you need to know, all in one downloadable PDF
See how to comply with GDPR and improve database auditing and management
Learn about the key features of SQL Secure to help you improve your SQL SQL Server security
Learn about the benefits of Secure for you and your organization
Kevin Beaver shows how you can be more proactive with database security
Pinal Dave presents the basic fundamental blocks of SQL Server permissions and security