or suspicious activities by continuously tracking all database operations
without affecting performance and modifying the database, and block them in
time to avoid network attacks on the database;
convenience of users' database security management, and improve users' risk
control and compliance;
Ensure the security
and integrity of enterprise business system data;
Set up a defense line
around the database, so as to "resist the enemy outside the country"
and support the "umbrella" for enterprise business security.