Protection Levels
Please read the following carefully - it may save you time!
Easiest: Only Encryption, Maximum Transparency
This mode is very similar to Microsoft's TDE. It is only data-at-rest encryption for database files (data, log, filestream) and backups.
In many cases there are only formal requirements for protecting data. The easiest in this case would be to encrypt database files, but apply no additional access restriction. In this case application can use the database immediately after encryption. Take a look at how to enable this mode.
Most secure: Encryption and Protecting Database Schema
This mode also provides data-at-rest encryption for database files (data, log, filestream) and backups, but DbDefence goes further.
The key feature of DbDefence, and what makes it unique among other encryption tools, is that it can protect schema and data from DBA. With this feature (enabled by default), the database becomes protected from all kinds of applications, no matter whether it is a web service, replication or server admin with SQL Server Management Studio. You must take additional steps to allow access to your database. These steps may include:
Unlocking modes
- Allowing certain SQL logins to access the database.
- Allowing certain applications to access the database.
- Adding unlocking SQL statements to your application.
Which unlocking mode is better?
Unlocking mode | Pros | Cons |
By Application |
|
|
By Login |
|
|
Programmatically (adding unlocking SQL statement to the application) |
|
|