Call: +44 (0)1904 557620 Call

PFCLObfuscate - Protect Your PL/SQL

PFCLObfuscate allows you to protect the PL/SQL in your database without relying on Oracle's wrap.exe program. PFCLObfuscate is a very flexible and powerfull tool that can be used to protect the Intellectual Property (IPR) in the actual PL/SQL. Sometimes the value or secrets are the code itself and PFCLObfuscate can be used to protect this code. PFCLObfuscate allows you to remove the meaning from PL/SQL, yet it is still completely valid PL/SQL. This makes it much harder for someone gaining access to your database to read and understand your code.

PFCLObfuscate also allows you to add license type features to your PL/SQL. This means that you can enable a license file that specifies such things as start dates and end dates to control how long and where your customers or employees can run your PL/SQL code. This licensing is added automatically to your PL/SQL code.

PFCLObfuscate is a command line tool and runs on a Windows PC. Because it is command line it can easily be integrated into other existing build programs and processes. PFCLObfuscate is licensed per installation of PFCLObfuscate and there are no fees or royalties for the protected PL/SQL.

  • PFCLScan PFCLScan

    Simply connect PFCLScan to your Oracle database and it will automatically discover the security issues that could make your Oracle database vulnerable to attack and to the potential loss of your data.

  • PFCL Obfuscate PFCLObfuscate

    PFCLObfuscate is the only tool available that can automatically add license controls to your PL/SQL code. PFCLObfuscate protects your Intellectual Property invested in your PL/SQL database code.

  • PFCL Training PFCLTraining

    PFCLTraining is a set of expert training classes for you, aimed at teaching how to audit your own Oracle database, design audit trails, secure code in PL/SQL and secure and lock down your Oracle database.

  • PFCL Services PFCLServices

    Choose PFCLServices to add Ltd to your team for your Oracle Security needs. We are experts in performing detailed security audits, data security design work and policy creation