SQL Column Search 1.0.0.28771 freeware

Find potentially sensitive data. Search an entire instance or a particular table. Includes 45 pre-configured sensitive data search strings. Export results to CSV format for easy analysis and reporting. ...

Author IDERA, Inc.
Released 2015-11-17
Filesize 4.83 MB
Downloads 648
OS Win2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Installation Install and Uninstall
Keywords database management, database security, database compliance, Microsoft SQL Server, columns, search
Users' rating
(9 rating)
SQL Column SearchDatabases & ToolsWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
SQL Column Search - policies Freeware Download Notice

SQL Column Search Free Download - we do not host any SQL Column Search torrent files or links of SQL Column Search on rapidshare.com, depositfiles.com, megaupload.com etc. All SQL Column Search download links are direct SQL Column Search download from publisher site or their selected mirrors.

SQL Column Search freeware - The Latest User Reviews
SQL Column Search freeware - The Latest Versions History
1.0.0.28771 Nov 17, 2015 New Release This is a major product update

Most popular Databases & Tools freeware downloads

PostgreSQL

17.2 freeware download

... SSL support for encrypted connections, and row-level security policies. These features help protect sensitive data and meet stringent compliance requirements. **6. High Availability and ...

PowerShell Scripts for SQL Server

6.0 freeware download

... instance, manage databases, and publish scripts. Work with policies and SQL Server logs. Maintain security and backups. ... benchmarks: Surface area reduction, authentication and authorization, password policies, auditing and logging, application development, and start and ...

SQL Column Search

1.0.0.28771 freeware download

... identify where. Even with data security and audit policies in place, sensitive data can be located away from watchful eyes and be ripe for exploitation. ...