Intelligent continuous monitoring through machine learning & behavioral analysis
  • Discovers databases — including those that are undocumented or non-compliant — that can potentially pose a cybersecurity threat
  • Provides insights on data in motion -- including the interactions of applications (and other database clients) to their connected databases
  • Identifies violations of core network policies
  • Uses highly accurate behavioral analysis to detect advanced and highly obfuscated SQL injection attacks in real-time
  • Identifies SQL generation coding issues and traces them to their source where they can be effectively remediated
  • Turn-key cybersecurity appliance - physical or virtual, your choice
Rapid deployment with transparent operation
  • Non-intrusive deployment via network tap or mirrored switch port — won’t interfere with other cybersecurity systems such as WAFs, IDSs, or DAMs
  • Compliant with continuous monitoring requirements specified in NIST 800-53, PCI DSS, COBIT DS5.5, HIPAA, & GLBA
  • Offers your staff unprecedented insights into your database tier's attack surface
  • DBN-6300v virtual appliance is support under VMware ESXi 5.1, 5.5
Complimentary database vulnerability analysis

DB Networks is offering a limited number of qualified organizations a complimentary 30-day database infrastructure vulnerability assessment. As part of this vulnerability assessment a DBN-6300 will be installed on your database network. The DBN-6300 will utilize its deep protocol analysis and machine learning capabilities to identify and report issues found within your database infrastructure. At the conclusion of the database vulnerability assessment you'll receive a custom report that you can act on to reduce your database threats.

Contact your DB Networks representative or click here to request more information regarding this offer.

DB Networks DBN-6300
Insights into your Core Network

DB Networks DBN-6300 offers intelligent continuous monitoring to essentially “shine a light” on your core network. Through deep protocol analysis the DBN-6300 will provide you new insights along with a situational awareness of your core network’s IT infrastructure.

Armed with these new insights you are now able to establish a core network defensive layer to defend your databases. You can now confidently take the proper actions necessary to significantly reduce your core network attack surface and reduce the risk of a data breach.

Operating at the database tier, directly in front of the database servers, the DBN-6300 is in the proper location to effectively analyze database traffic. It will immediately identify any undocumented databases, identify traffic to/from restricted segments, and identify advanced SQL injection database attacks. When rogue SQL statements are present at the database tier it means your perimeter cybersecurity has been breached and your application has also been exploited. The DBN-6300 stands as the final defense in your database defense-in-depth strategy.

The DBN-6300 is easy to set up and can be deployed with no changes to existing applications, databases, or cybersecurity systems.