Take Full Control of SQL Server Permissions

SQL Secure

Effective Rights Analysis

Analysis of users’ effective rights shows you how and where each right is granted, making it easy to pinpoint exactly what changes need to be made in order to close security holes.

Database Roles Permissions

View SQL Server role members and sub-roles assigned and their effective permissions.

Server Object Settings

Browse and analyze all files, directories and registry settings associated with SQL Server and determine ownership as well as explicit and inherited security rights.

Weak Password Detection

Analyzes password health of SQL Server logins and reports on when passwords are weak or blank which would cause a susceptible to intrusion situation.

Surface Area And Protocols

Identify services, ports, protocols and APIs that may allow SQL Server to be attacked by a malicious user. Enables you to understand and standardize which services you really need started or activated in your environment in order to reduce risk.

OS Security Analysis

Assess the OS setup to identify issues that would compromise SQL Server security.

Powerful User Analysis

Analyze membership to powerful server roles and groups such as administrators, system administrators and security administrators so you can ensure this level of access is warranted.

Detection of Unresolved Windows Accounts

View all logins on the target server, as well as any unresolved Windows accounts or groups.

Server Security Properties

Show all security related properties for servers including: version and patch level, authentication mode, audit mode, proxy account, and cross database chaining.

Self-Auditing

SQL Secure can monitor all activity related to SQL Secure administration.

Pre-defined Policy Templates

Combines the most well-known industry standards into 3 distinct levels, (Basic-Balanced-Strong) that define realistic guidelines for protecting SQL Server from the most common intrusion attacks

Reporting Services

Shows details of services such as log-on and configuration.

Security Scorecard

Lists potential security concerns on your SQL Servers such as cross-database chaining and allows you to drilldown to view the full details of the diagrammed relationships.

History and Baselining

The SQL Secure repository keeps a complete history of SQL Server security settings, providing the ability to designate a baseline to compare against future snapshots to detect changes. This also provides a valuable audit trail for forensic analysis.

Powerful Reporting

Built-in standard reports provide detailed information for security auditing and compliance purposes. Produce custom reports detailing the specific information required for SLA’s or perform custom analysis via the data stored on the SQL Secure repository. Data can be extracted and imported to Excel.

Risk Assessment

Security audit rules provide visibility for database access checks, configuration checks and permission checks.

Cross-server Reporting

Shows security state from a global view (e.g. all instances with guest accounts enabled).

Central Console

Provides an easy-to-use single point of control to manage the creation of collection rules and policies, view risks and assessments, monitor collection history, analyze user access rights and much more.

Configurable Data Collection

Define exactly what SQL Server security information you want to gather and when. Gathers from SQL Server, OS, File System, Registry and Active Directory.

Central Repository

All security data collected by SQL Secure is stored in a central repository for easy reporting and forensic analysis.

Flexible Views

Use the flexible grid view to audit and analyze user permissions. Sort, group, or export all SQL Server logins in your enterprise. View all users' assigned and effective rights and permissions at the server, database and object level.

Automated Server Registration

CSV import process provides improved support for large SQL Server environments with significant gains in time to value.

Server Group Tagging

Enables DBA teams to assign servers to groups, then view and manage security policies according to group designations.

No credit card required! Fully functional for 14 days

Buy Now

Includes first year of maintenance.
Volume discounts available.

Add to Cart

Save up to 45% with license pack bundles.

Request a Quote

Live Product Demo

See SQL Secure in action with a seasoned pro.

Request a Demo