Main Idea
In most cases, software companies deliver to their customers their heavily acquired know-how in the form of a database application logic as well.
This know-how in the form of a database objects content written in the T-SQL language is either fully open to read (ideal for industrial espionage), or they are satisfied with an integrated security level provided by a mass-spread database server such as Microsoft SQL Server.
There are plenty of tutorials, that can be found on the internet by a potential attacker, dealing with how to break the built-in security with the T-SQL keyword "WITH ENCRYPTION".
In such cases, less widespread, highly specialised, and even more so unexplored software products, such as {3S} SQL Smart Security, become highly topical.