Database Cybersecurity Through Advanced Behavioral Analysis
Uncover the hidden attack surfaces in your database infrastructure and immediately identify database attacks.

1. Discovers databases — including those that are undocumented or non-compliant — that can potentially pose a cybersecurity threat

2. Provides insights on data in motion -- including the interactions of applications (and other database clients) to their connected databases

3. Pinpoints compromised credentials in real-time

4. Uses highly accurate machine learning and behavioral analysis to detect advanced database attacks in real-time

Rapid deployment with transparent operation
Non-intrusive deployment via network TAP or SPAN port — won’t interfere with other cybersecurity systems such as WAFs, IDSs, or DAMs

Compliant with continuous monitoring requirements specified in GDPR, NIST 800-53, PCI DSS, COBIT DS5.5, HIPAA, & GLBA

Offers your staff unprecedented insights into your database network activity

DBN-6300v virtual appliance is supported under VMware ESXi 5.1, 5.5

Home / Products / DBN-6300
DB Networks DBN-6300
Providing Insights and Securing Your Database Infrastructure

DB Networks DBN-6300 offers database cycbersecurity that will “shine a light” on your database infrastructure. Through deep protocol analysis the DBN-6300 will provide you new insights along and a situational awareness of your database infrastructure. You'll have a real-time assessment of your database infrastructure with the ability to immediately identify database attacks and compromised credentials.

Armed with these new insights you'll now be able to establish a defensive layer for your database infrastructure. You can confidently take the proper actions necessary to significantly reduce your attack surface and reduce the risk of a data breach.

Operating at the database tier, directly in front of the database servers, the DBN-6300 is in the perfect location to effectively analyze database traffic. It will immediately find where personal and proprietary information is flowing, identifies any undocumented databases, identifies traffic to/from restricted segments, identifies advanced database attacks, and the use of compromised credentials. When rogue SQL statements are present at the database tier it means your perimeter defenses have been breached and your application has also been exploited. The DBN-6300 stands as the final defense in your database defense-in-depth strategy.

The DBN-6300 is easy to set up and can be deployed with no changes to existing applications, databases, or cybersecurity systems.