Web Application And Database Testing

Database breaches and the theft of sensitive data leave enterprises exposed to risk and can not only do irreparable harm to an organization’s reputation, but also result in significant costs of compliance.

Axxera’s Database Secure is a host-based, software-only, scalable database activity monitoring and intrusion prevention solution, providing full visibility into all database activity including local privileged access. By protecting the database in realtime with actionable alerts and prevention capabilities, Database Secure allows organizations to enforce security policy and comply with regulatory requirements, such as PCI DSS, Sarbanes-Oxley, SAS 70 and HIPAA.

Real-Time Activity Monitoring

Axxera Database Secure gives the IT security professional full visibility of user activity on all monitored databases. Database Secure either issues alerts about abnormal user activity or stops it in its tracks. Policy is enforced based on a variety of parameters, including:

  • Specific database objects
  • SQL Statements
  • User ID
  • Source IP address
  • Applications Used

Database Secure is the only solution that provides full database protection against all potential intruders regardless of location, intention or capabilities.

Uninterrupted Operations

Axxera Database Secure’s patent-pending host-based technology is uniquely capable of monitoring privileged user access without impacting performance, without relying on native DBMS auditing or logs, and with no need for DBMS downtime.

Easing the Burden of Regulatory Compliance

Axxera Database Secure simplifies and accelerates the process of complying with regulations, such as Sarbanes-Oxley (SOX), PCI DSS, SAS 70, HIPAA and privacy breach notification laws. Wizard driven processes and reports help meet key requirements, including: access to sensitive data, monitoring privileged user behavior, alerting on excessive valid activities and segregation of duties.

KEY FEATURES

  • Real-time alerts delivered to the DB Secure dashboard, email or to any SIEM or system management tool via SNMP, Syslog, or direct integration.
  • Protects sensitive data by terminating activity based on policy violations and quarantining users with suspicious activity.
  • Out-of-the-box protection against know vulnerabilities, including SQL injection, buffer overflow and privilege escalation attacks..
  • Detects and blocks intra-database threats utilizing sophisticated attacks based on the stored procedures, triggers and views. Monitors databases in virtualized environments, including data access from VM to VM running on the same physical machine.
  • Efficiently supports remote sensors over WAN connections, by minimizing and compressing traffic between the sensor and server.

Join Our Community