Data Leakage Protection
Search databases (such as SQL Server, Oracle, etc.) and find occurrences of sensitive information.
Configure what to find and how deep to search to determine compliance with data leakage laws and
Produce Web Page Reports to easily review your findings and fulfill audit requirements or export
Text Reports as spreadsheets for detailed analysis. Report to the centralized Management Console for
enterprise-wide reporting and management.