Immediately Detect Core Network Intrusions with Adaptive Behavioral Analysis

Next-Gen Core IDS

Advanced Database Security

This short informational video provides an overview of DB Networks core IDS.


DB Networks Core IDS is an intelligent security appliance based on adaptive behavioral analysis that immediately identifies advanced database attacks.

  • Discovers all databases on the segment
  • Maps databases to applications
  • Immediately detects even advanced highly obfuscated SQL injection attacks
  • Minimal operations support - no signature files to maintain or false positives handle
  • Turn-key security appliance - physical or virtual, your choice

We protect the confidential data residing in your databases from falling into the hands of cybercriminals attacking you with advanced intrusion techniques.


        DB Networks IDS-6300

Protecting the Database Tier

Advanced SQL injection database attacks easily bypass signature-based perimeter defenses and exploit application vulnerabilities to breach your data. The IDS-6300 immediately detects the cyber attacks present in the core network before any data exfiltration occurs.

Behavioral Analysis

The process begins by automatically learning and modeling each application's proper SQL generation behavior. The Core IDS then uses a suite of procedures to independently test and evaluate each SQL statement against the adaptive behavioral model. Fuzzy logic is then applied to determine the overall threat of each SQL statement. This technique is field proven to be highly accurate.

White Papers

How Core IDS immediately identifies database attacks

This white paper examines how effective, real-time, protection of the database infrastructure requires a next generation Core IDS based on adaptive behavioral analysis.

How to Instrument for Advanced Web Application Penetration Testing

Learn how to identify your critical web application SQL statement generation vulnerabilities by instrumenting at the database tier.

SQL Injection Attacks: Detection in a Web Application Environment

Learn how adaptive behavioral analysis is being used to accurately detect advanced SQL injection attacks in real time.

SQL Injection threat

SQL injection attacks are responsible for over 90% of records stolen — don’t be the next victim!

In this video Penetration Tester Joe McCray speaks on his experience with DB Networks Core IDS products. Joe explains how the DB Networks technology was able to identify all of his advanced SQL Injection attacks in real-time after he had successfully bypassed the Web Application Firewall and was actually attacking the database.

Data Security News

Russian hackers prove need to avoid sloppy security practices

In what may be the largest compromise of IT security in history, Russian hackers have amassed more than 1.2 billion passwords and user names.

Three best practices for reducing the risk of SQL injection attacks

A recently unsealed indictment against a notorious group of hackers shows just how damaging SQL injection attacks can be.

Ponemon Study Reveals Continuous Monitoring of Database Networks is Key to Reducing Risk of Retailer Type Breaches

57% of Respondents Believed the National Retailer Attacks Involved SQL Injection as a Component of the Attacks

IDS-6300 honored with Grand Trophy at Info Security Products Guide Global Excellence Awards

Receives Prestigious "Grand Global Excellence" Trophy for the Best of the Best in Security Technology

DB Networks Brings Intelligence to SQL Injection Protection

You must identify an attack to prevent it. The DB Networks IDS-6300 aims to provide nearly plug-and-play SQL injection attack monitoring. Frank Ohlhorst conducts a hands-on review of the IDS-6300.