Audience

Users and creators of SQL Server based applications and custom applications

About NetLib Encryptionizer

Transparent Data Encryption (TDE) for all Editions of SQL Server from Express to Enterprise. No programming required. Developer and OEM friendly: may be easily bundled with SQL Server based applications. Cost effective alternative to upgrading to SQL Server Enterprise. Assists with compliance with various regulations. Protects data and intellectual property.

Pricing

Free Trial:
Free Trial available.

Integrations

No integrations listed.

Ratings/Reviews

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Company Information

NetLib Security
Founded: 1997
United States
netlibsecurity.com

Videos and Screen Captures

Other Useful Business Software
Our Free Plans just got better! | Auth0 Icon
Our Free Plans just got better! | Auth0

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now

Product Details

Platforms Supported
Cloud
Windows
Training
Documentation
Live Online
Webinars
In Person
Support
Phone Support
24/7 Live Support
Online

NetLib Encryptionizer Frequently Asked Questions

Q: What kinds of users and organization types does NetLib Encryptionizer work with?
Q: What languages does NetLib Encryptionizer support in their product?
Q: What kind of support options does NetLib Encryptionizer offer?
Q: What type of training does NetLib Encryptionizer provide?
Q: Does NetLib Encryptionizer offer a free trial?

NetLib Encryptionizer Product Features

Compliance

HIPAA Compliance
Archiving & Retention
Artificial Intelligence (AI)
Audit Management
Compliance Tracking
Controls Testing
Environmental Compliance
FDA Compliance
ISO Compliance
Incident Management
OSHA Compliance
Risk Management
Sarbanes-Oxley Compliance
Surveys & Feedback
Version Control
Workflow / Process Automation

Computer Security

Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Security Event Log
Vulnerability Protection
Anti Spam
Antivirus
Audit Trail
Maintenance Scheduling
Real Time Monitoring
Virus Definition Update

Cybersecurity

IOC Verification
Behavioral Analytics
Whitelisting / Blacklisting
Tokenization
Incident Management
AI / Machine Learning
Endpoint Management
Vulnerability Scanning

Encryption

Endpoint Encryption
Email Encryption
Encryption Key Management
Full Disk Encryption
File Encryption
Tokenization / Data Masking
Public Key Cryptography
Drag & Drop UI
File Compression
Central Policy Enforcement

GDPR Compliance

Access Control
Consent Management
Data Mapping
Incident Management
PIA / DPIA
Policy Management
Risk Management
Sensitive Data Identification

HIPAA Compliance

Audit Management
Access Control / Permissions
For Healthcare
Compliance Reporting
Risk Management
Policy Training
Data Security
Remediation Management
Vendor Management
Documentation Management
Incident Management

NoSQL Database

Performance Management
Multi-Model
Dynamic Schemas
Automatic Database Replication
Security Management
Data Model Flexibility
Deployment Flexibility
Auto-sharding
Integrated Caching

PCI Compliance

Access Control
File Integrity Monitoring
Compliance Reporting
Exceptions Management
Intrusion Detection System
Log Management
PCI Assessment
Patch Management
Policy Management

SQL Server

CPU Monitoring
Credential Management
Supports Database Clones
Docker Compatible Containers
Event Logs
History Tracking
Patch Management
Scheduling
User Activity Monitoring
Virtual Machine Monitoring
Database Servers
Deployment Testing