Ready to Boost Your Startup? Click to Start Up Your Free Subscription!

Database Access Controller

QueryPie DAC is crafted for data protection in the cloud era, seamlessly connecting various cloud ecosystems.
It automatically identifies sensitive data and personal information, ensuring robust security for your assets.

Key Features of DAC

QueryPie DAC delivers dynamic access control with RBAC and ABAC, letting you manage permissions like a pro.
Enjoy seamless database interactions with our built-in SQL editor, while auditing keeps you updated on user activities across 20+ data sources!

  • RBAC/ABAC Access Control
    RBAC/ABAC Access Control

    Manage access effortlessly with controls based on user roles and attributes like time, day, IP address, SQL type, and more.

  • Built-in Web SQL Editor
    Built-in Web SQL Editor

    Enjoy a web SQL editor that connects you to databases, allowing you to run queries and import/export data directly from your browser—no separate client needed.

  • Data Audit & Alert
    Data Audit & Alert

    Stay informed by tracking user activities, including logins, database access, privilege changes, SQL commands, and query results to catch any unusual behavior.

  • Table/Column Level Access Control
    Table/Column Level Access Control

    Protect sensitive information by applying data masking policies and set access limits on important tables and columns with specific query rules.

  • Just-in-Time Access Requests
    Just-in-Time Access Requests

    Request access when you need it, and let admins approve and grant permissions on the spot, with seamless integrations like Slack.

How QueryPie DAC Works

QueryPie adapts to your enterprise's unique environment, offering flexible workspaces to enhance security.
Utilize the browser-based QueryPie web SQL editor to strengthen data leakage controls.
For 3rd-party tools, access the QueryPie Proxy Server via Agent or Agentless (URL Proxy) methods for seamless integration and protection.

How QueryPie DAC Works

QueryPie Universal Analyzer:
Speak Any Query Language

QueryPie bridges the gap between diverse data sources with its unique query analyzer. It interprets and simplifies complex queries from any platform, transforming them into a unified format. This allows you to apply generalized access control policies effortlessly, ensuring seamless and consistent data security across your entire environment. Unlock universal compatibility with QueryPie!

QueryPie Universal Analyzer

Easy Installation, Easy Use

QueryPie merges cloud-native technology with a web-based interface for effortless installation and operation across various operating systems.
Packaged with Docker, it enables easy deployment and a hybrid approach that blends on-premises security with SaaS-like update convenience.
This design supports compliance in finance, healthcare, and public sectors while allowing for immediate rollback if issues arise.
QueryPie offers the best of both worlds: the convenience of SaaS and the robust security of on-premises solutions, all focused on delivering customer value.

Easy Installation, Easy Use

User-friendly Web SQL Editor

Forget about needing a separate IDE! Our Web SQL Editor lets you easily run queries, import, export, and do various tasks right in your browser, no matter what operating system you use.

User-friendly Web SQL Editor
Secure Proxy Access for 3rd Party Tools

Secure Proxy Access for
3rd Party Tools

Connect to your databases safely with our Proxy Server for third-party tools! With both Agent and Agentless options, you get the same strong access control and policies as you do with QueryPie.

Control of Execution Statements Integrated with Database

Manage your execution statements with ease! Use standard SQL for DML, DCL, and DDL while overseeing access across RDBMS, Data Warehouses, and NoSQL. Redis users can manage over 200 commands, and MongoDB Shell supports standard SQL control too!

Control of Execution Statements Integrated with Database
Sensitive Data Masking Processing Protection

Sensitive Data Masking Processing Protection

Keep your data safe! Our masking features protect sensitive and personal information with preset patterns and custom rules, ensuring unauthorized users can’t access it.

Control of Ledger Tables

Manage your data easily with built-in workflows that approve changes to important tables. Track results before and after changes for smooth configuration management!

Control of Ledger Tables
Process Automation of Authorization & SQL Approval

Process Automation of Authorization & SQL Approval

Simplify your workflow with customizable templates that let admins set up approval processes! When users without permission request database access or changes, our automated workflow steps in to ensure everything runs smoothly.

  • Is QueryPie a SaaS service?

    Currently, QueryPie is provided as an installable solution for both cloud and on-premises environments, with plans to launch a SaaS-based service in the future. This will offer customers even greater deployment options, allowing seamless integration with existing infrastructures while supporting a transition to SaaS.

  • How does QueryPie handle user authentication?

    QueryPie supports SAML-based SSO, multi-factor authentication (MFA), and LDAP integration, enabling users to access systems securely. With centralized management, administrators can efficiently handle permissions across systems, strengthening security and enhancing control over user access.

  • What security standards does QueryPie comply with?

    QueryPie is designed to comply with global security standards like ISO 27001, SOC 2, GDPR, and CSA-STAR, ensuring adherence to data security and regulatory requirements. This allows organizations to strengthen access management while also meeting compliance needs and preparing for audits.

  • Is QueryPie compatible with existing security solutions?

    QueryPie is designed to seamlessly integrate with a variety of external security solutions via APIs. This ensures compatibility with existing infrastructure, enhances existing security frameworks, and enables efficient operations without requiring additional security solutions.

3 Minutes to Wow !

Let us show you how QueryPie can transform the way you govern and share your sensitive data.

Take a Virtual Tour