- Identify existing vulnerabilities in your SQL Server environment
- Harden security policies across SQL Servers
- Rank security levels with the security report card
- Analyze and report on user permissions across SQL Server objects
- Comply with audits using customizable templates for PCI, HIPAA and more
Understand who has access to what and identify each user’s effective rights across all SQL Server objects. Drill down by user or group to shed light on areas where security vulnerabilities may exist or have a chance of developing. Use the report catalog to track vulnerabilities, security changes, and user entitlement over time.
Set Strong Security Policies
View a complete history of SQL Server security settings and designate a baseline to compare against future changes, providing a valuable audit trail for forensic analysis.
Prevent Security Violations
SQL secure provides an Idera defined Level 2 security check for balanced intrusion protection that leverages MSBPA and CIS guidelines, and more. The security report card identifies top security vulnerabilities on your servers. Each security check is categorized as High, Medium, or Low Risk. You can drill into each security check to get more detail.
Analyze User Permissions
Analyze membership to powerful server roles and groups such as administrators, systems administrators, and security administrators to ensure the level of access is warranted. From a group, see the list of group members and select a member for further analysis. From a user, see the group memberships and drill upwards to view inherited permissions.
We’ve taken the security standards most companies are held accountable to and developed customizable templates to extract the information needed to satisfy a security auditor’s requirements. Choose from templates for PCI, HIPAA, and FERPA which leverage guidelines from STIG and CIS.