They are an effective database security tool and one can easily get used to their interface. They are at their best when it comes to capturing the vulnerabilities, notifying them as alerts with detailed information. Applying configurations at the table and account level has been made easy. They provide a detailed report which will help to understand more about vulnerabilities,misconfigurations, missing patches. Review collected by and hosted on G2.com.
If you're a small to medium scale customers they are a perfect fit but not suitable for large scale organizations. They are not leaders at encryption or data masking; they are not fully there yet. Their prime focus is vulnerability scanning, that itself is a limitation. One would have to wait for more than usual response time for their support team to respond. Review collected by and hosted on G2.com.
Validated through a business email account
This reviewer was offered a nominal gift card as thank you for completing this review.
Invitation from G2. This reviewer was offered a nominal gift card as thank you for completing this review.


