Home / Data Sheets
Download: DBN-6300 Data Sheet

Providing Insights and Securing Your Database Infrastructure

DB Networks DBN-6300 offers database cycbersecurity that will “shine a light” on your database infrastructure. Through deep protocol analysis the DBN-6300 will provide you new insights along and a situational awareness of your database infrastructure. You'll have real-time database security to immediately identify database attacks and compromised credentials.

Armed with these new insights you are now able to establish a defensive layer for your database infrastructure. You can now confidently take the proper actions necessary to significantly reduce your attack surface and reduce the risk of a data breach.

Download: Agentless DAM Data Sheet

Industry’s First Artificial Intelligence-Based Agentless Database Activity Monitoring

DAM customers can achieve compliance monitoring and database security without operational impact — no agent software need to be installed or maintained on the database servers and monitoring is now done non-intrusively. Machine learning is utilized to automatically identify and alert on any suspicious, unusual, or abnormal access to sensitive data or critical systems.

DAMs support Sarbanes-Oxley (SOX) compliance to improve the accuracy of financial reports, Payment Card Industry’s Data Security Standard (PCI DSS) for monitoring access to credit card-related information, and the Health Insurance Portability and Accountability Act (HIPAA) requirements for monitoring access to sensitive healthcare records.

Download: Database Discovery Data Sheet

Asset Discovery and Tracking Features

DB Networks DBN-6300 non-intrusively and continuously discovers databases and maps the interactions of each database client. This process allows the DBN-6300 to build, and continuously update, an interactive topological map of the database environment monitored on the network. This visual map forms a foundation for security operations to visualize and analyze observed database interactions in multiple dimensions such as: from what network the traffic originates and in what network segment it terminates, to how many database services each client connects to; how many clients interact with each database service, etc.