MySQL is a relational database management system (RDBMS) designed to help businesses record, update, and manage data and deploy cloud-native applications. Features include data masking and de-identification, multi-document transaction support, intrusion detection, alerts & configuration management.
MySQL is a relational database management system (RDBMS) designed to help businesses record, update, and manage data and deploy cloud-native...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and encrypted site-to-site connectivity between distributed business networks. Deployment in minutes, Robust Support, and Affordable Pricing Plans!
UTunnel offers easy-to-deploy Cloud VPN, Zero Trust Access, and Mesh Networking solutions. Safeguard your business with secure remote access and...

Deployment

  • Cloud-based
  • On-premise

Support Options

  • Email/Help Desk
  • FAQs/Forum
  • Knowledge Base
  • Phone Support
  • 24/7 (Live rep)
  • Chat

Starting from

US$2,000.00/year

  • Free Version
  • Free Trial
  • Subscription

Starting from

US$6.00/month

  • Free Version
  • Free Trial
  • Subscription

Overall rating

4.6 /5
(2,084)

Ease of Use

4.4/ 5

Features

4.5/ 5

Customer Service

4.2/ 5

Value for Money

4.6/ 5

Overall rating

5.0 /5
(69)

Ease of Use

5.0/ 5

Features

5.0/ 5

Customer Service

5.0/ 5

Value for Money

5.0/ 5

Total features 145

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Active Directory Integration
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Ad Blocker
  • Ad hoc Query
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Anonymous Browsing
  • Application Encryption
  • Application Management
  • Application Security
  • Application-Level Analysis
  • Asset Tracking
  • Audit Management
  • Audit Planning
  • Audit Trail
  • Authentication
  • Automated Discovery
  • Automatic Backup
  • Backup and Recovery
  • Behavior Tracking
  • Built-In Database
  • Capacity Management
  • Capacity Planning
  • Change Management
  • Charting
  • Cloud Encryption
  • Collaboration Tools
  • Compliance Management
  • Configurable Workflow
  • Configuration Management
  • Content Filtering
  • Corrective and Preventive Actions (CAPA)
  • Credential Management
  • Customizable Fields
  • Customizable Reports
  • Customizable Templates
  • DDoS Protection Software
  • DNS Leak Protection
  • Dashboard
  • Dashboard Creation
  • Data Capture and Transfer
  • Data Connectors
  • Data Dictionary Management
  • Data Extraction
  • Data Import/Export
  • Data Management
  • Data Mapping
  • Data Migration
  • Data Profiling
  • Data Replication
  • Data Security
  • Data Storage Management
  • Data Synchronization
  • Data Verification
  • Data Virtualization
  • Data Visualization
  • Database Conversion
  • Database Support
  • Device Management
  • Diagnostic Tools
  • Disaster Recovery
  • Disk Encryption
  • Document Storage
  • Drag & Drop
  • Encryption
  • Event Logs
  • File Encryption
  • Filtering
  • Financial Data Protection
  • Firewalls
  • Full Text Search
  • Geo-spoofing
  • HIPAA Compliant
  • Hardware Integration
  • Historical Trend Analysis
  • IP Filtering
  • IP Masking
  • Incident Management
  • Intrusion Detection System
  • Intrusion Prevention System
  • Issue Management
  • Issue Tracking
  • Key Management
  • Kill Switch
  • Log Access
  • ML Algorithm Library
  • Metadata Management
  • Mobile Access
  • Mobile Alerts
  • Model Training
  • Monitoring
  • Multi-Device Support
  • Multi-Language
  • Multi-Location
  • Multi-Protocol
  • Multiple Authentication Methods
  • Multiple Data Sources
  • Multiple Programming Languages Supported
  • Multitenancy
  • NOSQL Database Management
  • Network Monitoring
  • Network Security Software
  • Next-Generation Firewall
  • No-log VPN
  • OLAP
  • P2P Encryption
  • PCI Compliance
  • Password Management
  • Patch Management
  • Performance Analysis
  • Performance Management
  • Performance Metrics
  • Performance Monitoring
  • Performance Testing Tools
  • Policy Creation
  • Policy Management
  • Predictive Analytics
  • Predictive Modeling
  • Prioritization
  • Profiling
  • Query Analysis
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Relational Database Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Resource Optimization
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Role-Based Permissions
  • Rules-Based Workflow
  • SSL Security
  • Search/Filter
  • Secure Browsing
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Status Tracking
  • Summary Reports
  • Tagging
  • Third-Party Integration
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Tokenization
  • Transaction Monitoring
  • Troubleshooting
  • Two-Factor Authentication
  • Uptime Reporting
  • User Management
  • VPN Software
  • VPN Tunneling
  • Version Control
  • Visual Analytics
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Workflow Management

Total features 59

  • AI/Machine Learning
  • API
  • Access Controls/Permissions
  • Access Management
  • Active Directory Integration
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Ad Blocker
  • Ad hoc Query
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly Detection
  • Anonymous Browsing
  • Application Encryption
  • Application Management
  • Application Security
  • Application-Level Analysis
  • Asset Tracking
  • Audit Management
  • Audit Planning
  • Audit Trail
  • Authentication
  • Automated Discovery
  • Automatic Backup
  • Backup and Recovery
  • Behavior Tracking
  • Built-In Database
  • Capacity Management
  • Capacity Planning
  • Change Management
  • Charting
  • Cloud Encryption
  • Collaboration Tools
  • Compliance Management
  • Configurable Workflow
  • Configuration Management
  • Content Filtering
  • Corrective and Preventive Actions (CAPA)
  • Credential Management
  • Customizable Fields
  • Customizable Reports
  • Customizable Templates
  • DDoS Protection Software
  • DNS Leak Protection
  • Dashboard
  • Dashboard Creation
  • Data Capture and Transfer
  • Data Connectors
  • Data Dictionary Management
  • Data Extraction
  • Data Import/Export
  • Data Management
  • Data Mapping
  • Data Migration
  • Data Profiling
  • Data Replication
  • Data Security
  • Data Storage Management
  • Data Synchronization
  • Data Verification
  • Data Virtualization
  • Data Visualization
  • Database Conversion
  • Database Support
  • Device Management
  • Diagnostic Tools
  • Disaster Recovery
  • Disk Encryption
  • Document Storage
  • Drag & Drop
  • Encryption
  • Event Logs
  • File Encryption
  • Filtering
  • Financial Data Protection
  • Firewalls
  • Full Text Search
  • Geo-spoofing
  • HIPAA Compliant
  • Hardware Integration
  • Historical Trend Analysis
  • IP Filtering
  • IP Masking
  • Incident Management
  • Intrusion Detection System
  • Intrusion Prevention System
  • Issue Management
  • Issue Tracking
  • Key Management
  • Kill Switch
  • Log Access
  • ML Algorithm Library
  • Metadata Management
  • Mobile Access
  • Mobile Alerts
  • Model Training
  • Monitoring
  • Multi-Device Support
  • Multi-Language
  • Multi-Location
  • Multi-Protocol
  • Multiple Authentication Methods
  • Multiple Data Sources
  • Multiple Programming Languages Supported
  • Multitenancy
  • NOSQL Database Management
  • Network Monitoring
  • Network Security Software
  • Next-Generation Firewall
  • No-log VPN
  • OLAP
  • P2P Encryption
  • PCI Compliance
  • Password Management
  • Patch Management
  • Performance Analysis
  • Performance Management
  • Performance Metrics
  • Performance Monitoring
  • Performance Testing Tools
  • Policy Creation
  • Policy Management
  • Predictive Analytics
  • Predictive Modeling
  • Prioritization
  • Profiling
  • Query Analysis
  • Real-Time Analytics
  • Real-Time Data
  • Real-Time Monitoring
  • Real-Time Notifications
  • Real-Time Reporting
  • Relational Database Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Resource Management
  • Resource Optimization
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Role-Based Permissions
  • Rules-Based Workflow
  • SSL Security
  • Search/Filter
  • Secure Browsing
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Server Monitoring
  • Single Sign On
  • Status Tracking
  • Summary Reports
  • Tagging
  • Third-Party Integration
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Tokenization
  • Transaction Monitoring
  • Troubleshooting
  • Two-Factor Authentication
  • Uptime Reporting
  • User Management
  • VPN Software
  • VPN Tunneling
  • Version Control
  • Visual Analytics
  • Vulnerability Scanning
  • Web Threat Management
  • Web Traffic Reporting
  • Workflow Management
Not provided by vendor
  • DigitalOcean
  • Exoscale
  • Kamatera
  • Linode
  • Okta
  • OneLogin
  • UpCloud
  • Vultr