is an advanced SQL Server database encryption and decryption tool. It is an ideal tool for SQL Server administrators, developers, and security professionals who need to encrypt and decrypt sensitive data in their databases. ApexSQL Decrypt
allows them to quickly and easily decrypt information, such as stored procedures, views, user defined functions, and triggers, without having to manually write complex SQL queries or having to purchase expensive third-party encryption software.
AES-256 encryption and decryption of sensitive data in SQL Server databases.
• Quickly and easily decrypt SQL Server objects such as stored procedures, views, user defined functions, and triggers.
• Supports both symmetric and asymmetric encryption algorithms.
• Automatically detects and decrypts encrypted objects in any database.
• Generates T-SQL scripts for each encrypted object.
• Automatically creates a backup before any encryption or decryption.
• Ability to select multiple SQL Server objects for encryption or decryption.
• Supports SQL Server versions 2005 and higher.
• Supports both 32-bit and 64-bit versions of SQL Server.
• Command line support for automating the encryption and decryption process.
• Allows users to easily encrypt and decrypt strings, binary data, and scripts.
• Offers full support for SQL Server encryption certificates, including creating, managing, and deleting certificates.
• Includes an intuitive GUI for performing encryption and decryption tasks.
• Supports SQL Server encryption keys, including creating, managing and deleting keys.
• Ability to generate detailed reports in HTML and XML formats.
• Includes an interactive step-by-step wizard for performing encryption and decryption tasks.
• Ability to encrypt and decrypt objects on multiple SQL Server instances.
• Includes a detailed help system with examples and tutorials.
• Ability to import and export encrypted objects.
• Offers full support for SQL Server database roles and users.
• Includes a powerful scripting engine for automating encryption and decryption tasks.
• Ability to schedule encryption and decryption tasks to run at specific times.
• Includes an integrated logging system for tracking successful and failed operations.
• Supports both standard and custom encryption algorithms.
• Ability to quickly and easily decrypt all objects in a database.
• Includes an integrated SQL query editor for creating and running SQL queries.