Behavioral analysis based database security appliance
  • Turn-key security appliance - physical or virtual, your choice
  • Continuously monitors for rogue SQL activity on the database network
  • Detects advanced and highly obfuscated SQL injection attacks in real-time
  • Discovers databases — including those that are undocumented or non-compliant — that can potentially pose a security threat
  • Identifies SQL generation coding issues and traces them to their source where they can be effectively remediated
Rapid deployment with transparent operation
  • Passive deployment via network tap or mirrored switch port — won’t interfere with other security systems such as WAFs, IDSs, or DAMs
  • Compliant with Core IDS provisions specified in NIST 800-53, PCI DSS, COBIT DS5.5, HIPAA, & GLBA
  • Offers your staff unprecedented visibility into your database tier's attack surface
  • IDS-6300v virtual applicance is support under VMware ESXi 5.0 and 5.1
Complimentary database vulnerability analysis

DB Networks is offering a limited number of qualified organizations a complimentary 30-day SQL injection attack database vulnerability assessment. As part of this database vulnerability assessment an IDS-6300 will be installed on your database network. The IDS-6300 will utilize its behavioral analysis capabilities to identify and document rogue SQL statements attacking your databases. At the conclusion of the database vulnerability assessment you'll receive a custom report that you can act on to reduce your database threats.

Contact your DB Networks representative or click here to request more information regarding this offer.

DB Networks IDS-6300
Next Generation Core IDS


DB Networks IDS-6300 next generation core IDS immediately detects advanced SQL injection attacks. The IDS-6300 detects even the most obfuscated and advanced SQL injection attacks through our patent-pending SQL behavioral analysis technology.

The IDS-6300 works passively, in the core of the IT infrastructure, and is operationally transparent. It's deployed as either a physical or virtual (IDS-6300v) security appliance. Once operational, the IDS-6300 rapidly learns the unique environment in which it's operating. From that learning it creates a unique multi-dimensional behavioral model of how an application generates its dynamic SQL statements to access the database. Each SQL statement from the application is then subjected to a thorough lexical analysis and SQL semantic comparison analysis against the behavioral model. Any rogue SQL statements are immediately identified and an alarm procedure is invoked.

The IDS-6300 is easy to set up and can be deployed with no changes to existing applications, databases, or security systems.