Database Intrusion Detection System
A centrally-managed enterprise solution for comprehensive database security, DbProtect combines discovery, vulnerability scanning, real-time activity monitoring, auditing, and optional encryption to help organisations reduce risk and enhance compliance.
This integrated suite is comprised of the AppSecInc’s solutions for database vulnerability assessment and real-time database activity monitoring which protect enterprise organisations around the world from all internal and external threats, whilst also ensuring that those organisations meet or exceed regulatory compliance requirements.
The first of the integrated suite is DbProtect’s network-based, vulnerability assessment scanner which discovers database applications within your infrastructure and assesses their security strength. Backed by a proven security methodology and extensive knowledge of application-level vulnerabilities, DbProtect locates, examines, reports, and fixes security holes and misconfigurations.
Secondly, DbProtect utilises a real-time database activity monitoring and security auditing solution, DbProtect delivers database-specific protection and alerting for best-in-class protection of enterprise organisations. Robust and simple to use, DbProtect allows organisations to tune their detection parameters and customise which audit and security events to monitor. This helps focus security efforts on information that is relevant while bypassing false positives and irrelevant events.
DbProtect’s ASAP Update mechanism ensures protection remains up-to-date as new vulnerabilities are identified and patches are released. Comprehensive policies and rules definitions informed by industry best practices enable security auditing and documentation specific to enterprise environments.
Integrated real-time intrusion detection and activity auditing
Hybrid architecture maximizes depth and breadth of monitoring
Minimal performance impact
Policy based model simplifies compliance and eliminates false positives
Real-time activity analysis maximizes protection and reduces overhead
Security and compliance templates simplify implementation
Automated reporting and alert integration via SNMP and SMTP