Identify unauthorized
or suspicious activities by continuously tracking all database operations
without affecting performance and modifying the database, and block them in
time to avoid network attacks on the database; 
	
	
		Improve the
convenience of users' database security management, and improve users' risk
control and compliance; 
	
 
	
		Ensure the security
and integrity of enterprise business system data; 
	
 
	
		
	
	
		  
	
	
		Set up a defense line
around the database, so as to "resist the enemy outside the country"
and support the "umbrella" for enterprise business security.