Data Security Delivery Lead at a tech vendor with 10,001+ employees
Real User
Top 20
Feb 23, 2026
I use DataSunrise Database Security for data masking purposes in my environment. I manage a lot of production systems for different applications, and whenever teams need to copy production databases including sensitive information such as PII, PHI, or PCI to non-production environments, I apply masking to those sensitive fields and protect the data from unauthorized users. I leverage DataSunrise Database Security for data discovery, which is another method I use to find sensitive data.
Cryptography and IM&G Engineer at a tech services company with 11-50 employees
Real User
Feb 23, 2024
Most of our users, including customers, use it primarily as a Database Activity Monitor. They utilize it to track who is logging into which database and monitor their activities. This includes tasks such as restricting certain SQL commands and understanding environmental limits related to database access.
Database Security is crucial for protecting sensitive data from unauthorized access. It involves measures to safeguard data integrity, confidentiality, and availability. Professionals prioritize security protocols and encryption techniques to manage threats effectively.Implementing solid Database Security solutions is essential for businesses to protect intellectual property and personal data. Leveraging real-time monitoring, when combined with robust authentication methods, enhances overall...
I use DataSunrise Database Security for data masking purposes in my environment. I manage a lot of production systems for different applications, and whenever teams need to copy production databases including sensitive information such as PII, PHI, or PCI to non-production environments, I apply masking to those sensitive fields and protect the data from unauthorized users. I leverage DataSunrise Database Security for data discovery, which is another method I use to find sensitive data.
Most of our users, including customers, use it primarily as a Database Activity Monitor. They utilize it to track who is logging into which database and monitor their activities. This includes tasks such as restricting certain SQL commands and understanding environmental limits related to database access.
We are using Dynamic Masking, which is masking on the go, firewalling, and auditing.