Tiger Data Features
Database Features (7)
Storage
Availability
Based on 10 Tiger Data reviews.
Stability
As reported in 10 Tiger Data reviews.
Scalability
Security
Data Manipulation
Query Language
Development (5)
Application Deployment
Provides tools for building, deploying, or integrating source code into hosted application.
Development Tools
Provides tools for writing code, editing code, syntax, debugging, or utilizing frameworks.
Development Environment
Provides tools for sharing code, tracking progress, and shipping software.
Language Support
Supports programming languages such as Java, C, or Python. Support for front-end languages such as HTML, CSS, and JavaScript.
Testing
Tests the functionality of a software application. Detects and diagnoses issues in application.
Database (5)
Database Management
Lets developers manage database services. Provides support for different types of databases and integration methods.
Analytics
Lets users analyze deployment, user, storage, and business metrics.
Auto Scaling
Provides tools or bots that scale services and data automatically or on demand.
Backup / Recovery
Stores versions of application and data or incrementally backs up data.
Storage
Provides scalable cloud storage for different forms of data. Store analytics and records for reporting.
Infrastructure (3)
Networking
Allows users to provision networks, deliver content, balance loads, and manage traffic.
Virtual Machines
Provides virtual networks and operating systems.
Security
Secures applications, encrypt data, and manage identities.
Configuration (5)
Application Performance
As reported in 15 Tiger Data reviews. Functions when integrated with multiple forms of external applications.
Orchestration
Allows admisistrators to manage and organize storage, networks, and datacenters.
Database Monitoring
Monitors performance and statistics related to memory, caches and connections. This feature was mentioned in 15 Tiger Data reviews.
Anomaly Detection
Alerts users when unauthorized parties or malware is detected allowing administrators to remedy the issue.
Network Security
Secures data at rest and in transit from unauthorized access. 13 reviewers of Tiger Data have provided feedback on this feature.
Database Administration (3)
Provisioning
Based on 11 Tiger Data reviews. Allows administrators to organize components of the database to maintain instance efficiency.
Governance
Allows the creating and relinquishing of database access credentials.
Auditing
Documents access and alterations of the database for analytics and reporting. This feature was mentioned in 11 Tiger Data reviews.
Availability (7)
Scalability
Expands functionality while maintaining balanced loads. Serves growing demand without reducing functionality. This feature was mentioned in 11 Tiger Data reviews.
Backup
The abillity to restore files to its original loacation or alternative sources on-demand. 11 reviewers of Tiger Data have provided feedback on this feature.
Archiving
Stores historical records of information for reverting or reference.
Indexing
Helps users navigate databases by labeling and organizing datasets. This feature was mentioned in 12 Tiger Data reviews.
Auto Sharding
Implements auto horizontal data partitioning that allows storing data on more than one node to scale out.
Auto Recovery
Restores a database to a correct (consistent) state in the event of a failure.
Data Replication
Copy data across multiple servers through master-slave, peer-to-peer replication architecture etc.
Security (13)
Data Masking
Data masking provides an additional layer of access control that can be applied to tables and views.
Authentication And Single Sign-On
As reported in 11 Tiger Data reviews. Verifies identity of database users.
Data Anonymization
Allows users to gain statistically valid insights from their data while protecting the privacy of individuals.
Data Encryption
Encrypts and transforms data at the database from a readable state into a ciphertext of unreadable characters.
User Access Control
Allows restricted user acess to modify depending on the access level.
Database Locking
Prevents other users and applications from accessing data while it is being updated to avoid data loss or update.
Access Control
Allows permissions to be granted or revoked in the database, schema or table levels.
Encryption
Built-in native encryption with enterprise key management.
Authentication
Provides multi-factor authentication with certificates.
Role-Based Authorization
Provides predefined system roles, privileges, and user-defined roles to users.
Authentication
Allows integration with external security mechanisms like Kerberos, LDAP authentication etc.
Audit Logs
Provides an audit log to track access and operations performed on databases for regulatory compliance.
Encryption
Provides encryption capability for all the data at rest using encryption keys.
Data Management (2)
Data Replication
Helps in improving the availability of data.
Advanced Data Analytics
Uses machine learning algorithms to gain actionable insights.
Maintenance (3)
Data Migration
Allows data movement from one database to another.
Backup and Recovery
Provides data backup and recovery functionality to protect and restore a database.
Multi-User Environment
Allows users to access and work on data concurrently, supporting several views of the data.
Management (5)
Data dictionary
Stores the database metadata, that is the definitions of data elements, types, relationships etc.
Data Replication
Creates a copy of the database to maintain consistency and integrity.
Query Language
Allows users to create, update and retrieve data in a database.
Data Modeling
Defines the logical design of the data before building the schemas.
Performance Analysis
Monitors and analyzes critical database attributes like query performance, user sessions, dead lock detail, system errors etc and visualize them on a custom dashboard.
Support (4)
Text Search
Provides support for international character sets and full text search.
Data Types
Supports multiple data types like primitive, structured, document etc.
Languages
Supports multiple procedural programming languages like PL/PGSQL, Perl, Python etc.
Operating Systems
Available on multiple operating systems like Linux, Windows, MacOS etc.
Performance (5)
Disaster Recovery
Provides data recovery functionality to protect and restore data in a database.
Data Concurrency
Allows multi-version concurrency control.
Workload Management
Handles workloads, from single machines to data warehouses or web services with many concurrent users.
Advanced Indexing
Allows users to quickly retrieve data through various types of indexing like B-tree, hash table etc.
Query Optimizer
Helps interpret SQL queries and determine the fastest method of execution.
Management (4)
Data Schema
Data is organized as a set of tables with columns and rows like a table structure.
Query Language
Allows users to create, update and retrieve data in a database.
ACID - Complaint
Adheres to ACID (atomicity, consistency, isolation, durability), a set of database transaction properties.
Data Replication
Provides log-based or/and trigger-based replication.
Storage (2)
Data Model
Stores data tables as columns.
Data Types
Supports multiple data types like lists, sets, hashes (similar to map), sorted sets etc.
Performance (1)
Integrated Cache
Stores frequently-used data in system memory quickly.
Support (2)
Multi-Model
Provides support to store, index and query data in more than one format.
Operating Systems
Available on multiple operating systems like Linux, Windows, MacOS etc.
Data Indexing (2)
Semantic Search
Allows semantic search service by organizing data.
Indexing Data
Allows indexing of data for search and retrieval.
Filters (2)
Accurate Search
The feature aids in filtering queries by metadata thus achieving accurate search.
Single Stage Filtering - Vector Database
This feature integrates vectors and metadata indexes into a single index.
Query latency (2)
Lower query latency
Aids in faster processing of query to obtain results.
Continuous queries
Enables faster queries and search engine-like workloads.
Data latency (2)
Lower data latency
Enables the user to track the time taken for data to be generated and available for processing
Data pipeline performance
Aids in monitoring and reporting data pipeline performance.
Connectors (2)
Faster ingestion
Manages in building pipelines between two protocols.
Built-in connectors
Allows continuous data ingestion directly from the data source.
Scale (2)
Linearly scalable database
Aids the database in scaling horizontally and vertically in petabytes.
Storage management
Helps store the data in fixed size segments called vectors for better management.
Architecture (2)
Data security
Enables ingesting data efficiently and securely.
Lockless architecture
Allows concurrent access to data without the use of any table locks.
Technology Glossary Features
View definitions of the features and discover new technology terms.
Data manipulation is changing data to a readable format. This G2 guide provides in-depth information about data manipulation, its types, benefits, and best practices.
Data modeling is the process of creating visual representations of information systems to better communicate the connections between data points and structures. Learn more about data modeling in this G2 guide.





