SuperbCrew sat down with Brett Helm, CEO at DB Networks to learn more about the company and its innovative technologies including the new Agentless Database Activity Monitor.
The holy grail of database protection may come in the form of DAM married to an agentless platform that employs Artificial Intelligence (AI). That solution can proactively deal with threats to databases, at least that is what DB Networks and CyberArk have come to believe, as evidenced by a recent partnership by the two IT security companies.
DB Networks announced its agentless database activity monitoring (DAM) solution which employs artificial intelligence (AI) so organizations can achieve both compliance monitoring and database security without giving up control of their data for the sake of compliance.
Database Activity Monitoring (DAM) should be a part of the security strategy for every organization using databases for critical information. However, in determining the level of need and the representative investment for the solution, decision makers should consider three key things when generating their requirements and estimating their investment.
The industry’s first agentless database activity monitoring (DAM) solution based on artificial intelligence has arrived. DB Networks is combining its DBN-6300 database monitoring and security technology with the CyberArk Privileged Account Security Solution to strengthen organizations’ overall security posture with a next-generation DAM solution.
DB Networks announces the industry’s first agentless database activity monitoring (DAM) solution based on artificial intelligence. DB Networks is combining its DBN-6300 database monitoring and security technology with the CyberArk Privileged Account Security Solution to strengthen organizations’ overall security posture with a next-generation DAM solution.
An often over looked yet simple security instrument is a database honeypot. Setting up a database honeypot results in an instrument any organization can employ to assist in identifying when a breach has occurred or is reoccurring.
Cybersecurity is big business today; enterprises work diligently to protect their data and operations from attacks. DB Networks provides database security solutions that detect threats using machine learning and behavioral analysis. Steve Hunt, president and COO of DB Networks, leads the development and operation of the company.
A breach in your database security can be disastrous, costing millions of dollars, breaches of privacy, and the loss of jobs. It can lose your company the trust of its customers, and ultimately, their patronage. However, despite its importance, according to a new report from Osterman Research and DB Networks, it is not receiving the attention it deserves.
The Information Security Company DB Networks DBN-6300 offers intelligence SQL injection protection to prevent intelligence security breaches.
Protecting databases takes more than just securing the perimeter, it also takes a deep understanding of how users and applications interact with databases, as well as knowing what databases are alive and breathing on the network. DB Networks aims to provide the intelligence, analytics and tools to bring insight into the database equation.
Deep protocol analysis of network activity enables advanced analysis techniques derived from artificial intelligence (AI) research to immediately identify unusual behavior. Such approaches can cleanly separate attacks from normal activity in real time.
DB Networks is an innovator of database security appliances. DB Networks works with customers in a variety of industries including financial services, healthcare, manufacturing, and government. Supercrew interviewed Brett Helm, CEO and Board Chairman at DB Networks to gain a deeper understanding of the comapany and their technology.
DB Networks will hold booth demonstrations of the DBN-6300, an artificial intelligence (AI)-based database security appliance that non-intrusively discovers databases, immediately alerts when databases are under attack and pinpoints credentials that have been compromised.
History has shown it’s not possible to ‘train up’ the cybersecurity talent pool rapidly enough to address escalating threats across the vast federal security landscape. With no relief in sight, new IT security approaches that leverage AI are a highly desirable solution. ‘Work smarter, not harder,’ is especially true when it comes to combatting cyberthreats.
The trend over the next several years the trend is for individual AI-based security systems to be integrated into organizations’ comprehensive autonomous cyber security architecture. Intelligent security sensors will be deployed throughout the network to not only immediately and accurately identify security events, but also to remediate them.
AI-based cyber security is truly a sea change in the security industry. AI enables us to quickly and accurately identify cyber attacks in progress. In future generations of product, DB Networks will use the output from AI to drive autonomous cyber security technologies that not only block attacks but also automatically heal the vulnerabilities.
DB Networks has constructed a solution that leverages machine learning to detect, alert, and ultimately triage anomalous behavioral patterns indicative of database insider threats.
AI-based security technologies offered in the DB Networks DBN-6300 and Layer 7 Database Sensor, is being deployed to intelligently combat modern cyber security database threats. This is leading to a trend over the next several years where intelligent security sensors will be deployed throughout the network to not only immediately and accurately identify security events, but also to remediate them.
DB Networks has combined the elements of machine learning with data flow analysis to create an insider threat detection platform. DB Networks' offering brings a new paradigm to insider threat detection by incorporating a methodology known as data flow analysis.
Databases pose a unique security challenge for banks and financial institutions of all sizes. The database infrastructure at financial services companies is usually quite extensive with many databases remaining unknown, unmonitored, or simply left completely unmanaged and worse, unsecured.
Machine learning and behavioral analysis can identify insider threats by building a model of normal operations of the data flows in the database infrastructure. Using behavioral analysis to compare new data flows against the model enables these appliances to identify and alert enterprises to the actions of an attacker who is using stolen credentials.
With breaches increasing at an alarming rate, it’s important for financial organizations to follow thorough data stewardship practices and continuously monitor all of their databases – from their initial deployment, throughout their lifecycle and into their retirement when the database is decommissioned.
It’s not uncommon for large enterprises to have hundreds or perhaps hundreds of thousands of databases — many out of date, many no longer used, and the vast majority not monitored or properly secured from possible attacks. Unauthorized databases access is increasingly a result of credential theft, and IT personnel are urgently trying to get their arms around the situation. However, through machine learning and monitoring data flow activity, abnormal activity, such as stolen credentials, is immediately identified.
An enterprise’s most important information resides in databases, IT managers are increasingly focused on protecting databases and their infrastructures with specifically designed security measures, rather than relying on porous perimeter security. The top five best practices presented will help enterprises identify and protect databases from bad actors attempting to use stolen database credentials to appear as legitimate insiders.
More than 209,000 cybersecurity jobs in the U.S. alone are presently unfilled. It’s just not possible to build the talent pool rapidly enough to fully address this critical skills shortage. Machine learning and behavioral analysis security technologies are now being applied to endpoint security, web application security, intrusion detection, and database security. Field experience has proven these technologies to be highly effective, without generating false positives, and, importantly, requiring minimal operation support.
The winds of change are blowing and many security vendors are coming to the realization that sharing security practices and the associated technology can benefit all, except for the cybercriminals. DB Networks is now turning their competitors into partners by licensing the company’s Layer 7 Database Sensor, so that other security vendors can include advanced machine learning into their own security products.
Insider threats are typically not simply “rogue” employees stealing financial records, but more often are actual attackers using stolen credentials to slip past information security systems appearing as a legitimate user. During this session, attendees will learn how security systems based on machine learning and behavioral analysis immediately identify credential abuse and attacks on financial systems databases.
Only 19 percent of organizations have what the organization considers to be “excellent” visibility into their data and database assets, according to Osterman Research and DB Networks. This level of visibility is necessary to rapidly identify a data breach.
Findings in the study suggested that the organizations, all of which have more than 300 employees, don't have the proper monitoring tools with 39 percent saying they lacked the necessary tools to identify a database breach resulting from compromised or abused credentials.
Like the crown jewels, many companies assign a nearly priceless value to their data. So why aren't they taking better care of the databases where they store much of their corporate data?
Despite the fact that databases still hold some of the most valuable data targeted by cyberthieves, the typical organization today lacks visibility into who is accessing their structured data stores and when.
Security really matters regarding all three pillars—Network, Compute and Storage—of today’s increasingly data center-centric world. With the daily headlines screaming about the latest and unfortunately ever more sophisticated cyber attacks, a lot of attention has been paid to the first two pillars, yet protecting storage is equally- if not more - important.
According to Osterman Research’s database security industry report, about 39% of organizations surveyed said that they lack the necessary tools to allow them to identify a database breach.
The risk of data leaks and security breaches are a growing threat in the enterprise, but many companies are doing nothing about it at all. According to a recently released report from Osterman Research and DB Networks, 47% of respondents said their organization had no one overseeing database security.
Osterman Research’s first-of-its-kind database security industry study found that only 19 percent of organizations have what the organization considers to be “excellent“ visibility into their data and database assets. This level of visibility is necessary to rapidly identify a data breach. Furthermore, 47 percent of those surveyed do not have an assigned team or even an individual to oversee the security of their databases.
Legacy databases that should have been decommissioned long ago are an open opportunity for attack. These databases may not be properly patched, credentials haven’t been updated and it’s likely no one is monitoring them. But what to do with rogue and zombie databases?
DB Networks has added a new capability to its database security solutions to address compromised credetials. The DBN-6300 enterprise appliance and OEM-focused Layer 7 Database Sensor both now have the ability to detect someone acting as an authorized insider through compromised or abused credentials. This is done at the database level, in real-time, which gives an organization the opportunity to stop the activity before real damage can be done.
In this podcast recorded at RSA Conference 2016, David Rosenberg, CTO/Products at DB Networks, talks about how DB Networks have added real-time compromised credential identification capabilities to their DBN-6300 and Layer 7 Database Sensor products.
DB Networks provides insights into your core network including database discovery, application mapping, pinpointing compromised credentials, and database intrusion detection.
Organizations face problems with credential abuse, which have resulted in costly data breaches. DB Networks, a database cybersecurity company, has launched a solution to non-intrusively identify compromised credentials of database communication with machine learning and behavioral analysis in real-time.
DB Networks honored as Grand Trophy Winner for Database Security in 12th Annual Info Security Product Group's Global Excellence Awards.
DB Networks announced at RSA Conference industry-first capabilities to non-intrusively identify compromised credentials in real-time by uniquely applying machine learning and behavioral analysis to every database communication. This powerful new feature is now available in its DBN-6300 and Layer 7 Database Sensor products.
DB Networks applies machine learning and behavioral analysis to immediately identify credential abuse.
DB Networks award-winning Layer 7 Database Sensor delivering database protection and deep visibility into database infrastructure will be featured at RSA Conference 2016.
Big news from DB Networks, a provider of database cybersecurity products. They partnered with Cyphort to offer customers full spectrum visibility from the desktop and network perimeter to deep in the database, and their Layer 7 Database Sensor has been chosen to power Security On-Demand’s Database Threat Protection service.
Company president and COO Steve Hunt to discuss how advanced user behavioral analytics immediately identify compromised credentials and attacks on EMR data stores.
Security On-Demand announces the availability of Database Threat Protection service, powered by the DB Networks Layer 7 database sensor. This service provides discovery of all databases in the network, including undocumented ones, and continuous monitoring of databases to identify malicious activity.
Cyphort and DB Networks will offer customers full spectrum visibility from the desktop and network perimeter to deep in the database.
DB Networks has released a first-of-its-kind database sensor that provides makers of security software with real-time, deep-protocol analysis of database traffic — inside or outside the firewall. By integrating this sensor into their products, security OEMs provide their customers with more usage detail and metrics from data-tier cyber threats.
DB Networks introduced a product that provides OEM partners with real-time deep protocol analysis of database traffic. By integrating this technology into their products, security OEMs can offer their customers visibility into data-tier cyber threats.
DB Networks Layer 7 Database Sensor is designed to integrate into an OEM partner’s products to provide deep visibility into the database tier. As an example, a breach detection system that includes our Layer 7 Database Sensor now has full-spectrum visibility. Previously the database tier was largely opaque and attackers could operate undetected in that part of the network over many months.
The evolution of cybersecurity as it relates to healthcare in the United States is by most standards in its infancy, but this situation is changing quickly. The industry is scrambling to shore up defenses as cyberattacks and breaches increase.
DB Networks has launched a new Layer 7 Database Sensor to provide original equipment manufacturers (OEMs) with advanced database security capabilities.
DB Networks Layer 7 Sensor provides OEMs with real-time deep protocol analysis of database traffic and immediate access to patented technology to enhance and differentiate their product offerings, helping enterprises protect their critical database infrastructure.
Inquiring and responsible minds really want and need to know what is going on in their database infrastructure. This is where DB Networks Layer 7 Sensor solution fills a critical function.
DB Networks Layer 7 Database Sensor enhances OEM solutions by including database protection and deep visibility into the database infrastructure for full-spectrum security.
DB Networks earns finalist honors in best security hardware product; database security, DLP, extrusion prevention; and security products for Federal, government, manufacturing and media and entertainment awards categories.
Act is based on erroneous assumptions, rendering it nearly completely useless at improving cybersecurity.
Latest patent covers machine learning and behavioral modeling of Layer 7 database traffic to identify threats in real-time.
Far more cybersecurity focus should be redirected inward if modern enterprises want to seriously address today's most nefarious threats. Specifically, enterprises need to understand the tremendous value of compromised credentials and that it's the stealing of those credentials that is the goal of most initial cyber attacks.
DB Networks complements DAMs by providing insights into the overall database infrastructure, including the number and type of databases that are operational, what clients are communicating with which databases, when database communications cross trust boundaries, and when databases are under attack from rouge SQL.
DB Networks announces the issuance of patent number 9,100,291 by the US Patent Office covering the extraction of application (layer 7) data from a communications link.
DB Networks offers advanced capabilities that make short work of identifying databases, analyzing database traffic and using that information to identify abnormal activity that signals database intrusions.
The combination of the long-term IT security labor shortages and an unprecedented number of security breaches are stretching IT security departments to the snapping point.
Targeting enterprise databases is a common attack tactic, as the Anthem breach showed, yet many companies neglect database security.
Signature based cybersecurity has proven unable to defend against zero-day attacks. Further, organizations are finding signature based systems are extremely labor intense as they constantly develop and implement new signatures.
Frank Ohlhorst interviews Michael Sabo of DB Networks on the SQL injection threat that has existed for over 15 years.
Info Security Products Guide named DB Networks winner of their Grand Global Excellence Trophy for "Best of the Best" in security technology at the RSA Conference.
Cyber Defense Magazine, the industry's leading electronic information security magazine and media partner of the RSA® Conference 2015, named the DB Networks DBN-6300 "Best Data Center Security Product" for 2015.
John (JP) Popolizio joined DB Networks board of advisors to provide insight and counsel as the company continues to expand its cybersecurity offerings in the financial services sector.
Behavior analysis, like that built in to the DBN-6300, is the key to unlocking a better, faster way of identifying true threats.
APTs have been the criminal’s weapon of choice in many high-profile database attacks including the 2013 Target Corporation breach and the recent Anthem breach.
The era of traditional techniques of identifying attacks through attack signatures is over. Today, understanding and creating a baseline of normal behavior is crucial to preventing future information security breaches such as the Advanced Persistent Threat (APT) witnessed at Anthem.
Free identity theft monitoring may help some folks sleep better. But security experts say they may come into play too late – and coverage certainly does not extend long enough — to mitigate exposure to the worst forms of identity fraud.
Info Security Products Guide has named the DBN-6300 a finalist for the 11th Annual Global Excellence Awards in six categories including for Database Security and Most Innovative Security Product of the Year.
There’s a universal truth regarding every cyber attack: attack behavior never appears normal. The future of IT security is technology that consistently and accurately identifies behaviors that aren’t normal.
DB Networks has been selected for inclusion into the Cybersecurity 500. The Cybersecurity 500 is the premier list of the top cybersecurity companies.
A new report by DB Networks reveals a major uptick in SQL injection vulnerabilities in publicly launched software packages in 2014, reaching their highest levels in three years.
Analysis by DB Networks discovered the rise in SQL injection attacks is directly attributed to todays software development methodology – an emphasis on deadlines and budgets that gives short shrift to the kind of security due diligence that's more important today than ever before.
DB Networks behavioral analysis based DBN-6300 has been recognized as a top product in the Reader Trust Award competition, which honors best-in-class security products and services as selected by a panel of readers who represent the readership of SC Magazine.
DB Networks new round of financing will fuel continued rapid growth into core-network intelligent continuous monitoring and database security.