Database Access Manager

Empower your data security with Kron PAM's stronger and simpler Database Access Manager solution.

Download Datasheet Request a Demo

How the Database Access Manager Works?

The Data Access Manager uses a man-in-the-middle proxy to control numerous kinds of databases - e.g. Cassandra, Hive, IBM DB2, Microsoft SQL Server, MySQL, PostgreSQL, Oracle and Teradata, among others, from a central point. User queries are sent to the database through SQL Proxy. The SQL Proxy captures user queries and applies policies. The Data Access Manager functionalities ensure data security and protection within the data layer itself and ensure solid protection for database security.

How the Database Access Manager Works?
Solid Protection for Database Security

Solid Protection for Database Security

The Data Access Manager functionalities enable data security protection within the data layer itself and ensure solid protection for database security.

  • Database activities monitored by the proxy to permit any action that needs to be done.
  • Data Access Manager separates out records and shows database query results in accordance with the authorized users and logs all data access sessions.