Discovering and Mapping the Flow of Personal Data for GDPR Compliance
Providing support for the EU's GDPR requirements by identiying, documenting, and protecting personal information

1. Non-intrusively discovers all of the organizations databases and connected database applications to assist with the personal data inventory

2. Visually depicts the databases that store personal data along with a connection to all of the applications that process the personal data

3. Supports GDPR Article 30 requirement for the creation and maintenance of “records of processing activities“

4. Real-time database intrusion detection including pinpointing compromised credentials and detect advanced database attack through AI

Rapid deployment with transparent operation
Non- intrusive deployment via network TAP or SPAN port — won’t interfere with other cybersecurity systems such as WAFs, IDSs, or DAMs

Offers your staff unprecedented insights into your database network activity and the ability to rapidly identify personal data stores

DBN-6300v virtual appliance is supported under VMware ESXi 5.1, 5.5





























Home / Products / GDPR Services
DB Networks GDPR Services
Supporting GDPR Readiness Assessments for Structured Data

DB Networks assists companies in complying with the European Union’s General Data Protection Regulation (GDPR). The EU GDPR will come into effect on May 25, 2018. The new regulation requires that organizations respect and protect personal data – regardless of where the personal data is sent, processed or stored. Companies with employees, customers, or goods for sale in the EU must now begin to identify and map the processing all of the personal data they hold and process.

DB Networks supports organizations and GDPR consultants conducting Readiness Assessments in preparation of the new EU regulation. DB Networks AI-based DBN-6300 is able to “shine a light” on the organizations entire database infrastructure dramatically reduces the time and effort necessary to document each structured data store. Once all of the personal data has been discovered, an accurate Personal Data Inventory can be produced.

DB Networks DBN-6300 operates completely non-intrusive. This is vastly different and more evolved than common the intrusive IP/port active scanning discovery often found on legacy database activity monitors. Active scanning can’t identify individual database instances, only database servers operating on well-known ports. A significant concern is that active port scanning may also set off security alerts due to the fact that the traffic they produce appears like an attack.

Conversely, the AI-based DBN-6300 operates non-intrusively on a network TAP where it processes a copy of the database traffic. Deep protocol analysis is applied to the captured packets to discover all database instances, map the databases to their connected applications, and gather database user behavior analytics (UBA). Statistical analysis and machine learning are also used to identify insider threats and database attacks that were previously opaque to the security operations center (SOC). Security analysts now have visibility and improved operational intelligence from their database infrastructure, and will be notified when important database infrastructure events occur.

The DBN-6300 will immediately identify any undocumented databases that may contain personal data, map the flow of the traffic to automatically document where the personal data is being processed, identify advanced database attacks, and any use of compromised credentials. When rogue SQL statements are present at the database tier it means perimeter defenses have been breached and a database application has also been exploited. The DBN-6300 stands as the final defense in a database defense-in-depth strategy.

The DBN-6300 is easy to set up and can be deployed with no changes to existing applications, databases, or cybersecurity systems.