IDS-6300 intelligent security appliance

IDS-6300 intelligent security appliance

IDS-6300 intelligent security appliance Product Image

 

SAN DIEGO – Oct. 23, 2013 -- DB Networks, an innovator of behavioral analysis in database security, today introduced the IDS-6300 intelligent security appliance, the industry’s first next-generation Core Intrusion Detection System (IDS).  The IDS-6300 leverages patented behavioral analysis technology for comprehensive SQL injection intrusion detection and defense – uniquely addressing SQL injection issues that have plagued the industry for more than 15 years.  DB Networks’ intelligent security appliance delivers advanced and Zero-Day SQL injection attack detection with the industry’s first Core IDS that combines behavioral analysis and advanced continuous database monitoring, addressing specific compliance requirements within regulations such as PCI DSS, HIPAA, GLBA, and NIST spec 800-53.

SQL injection attacks remain an unsolved threat to enterprise databases and their critical information stored at the core of the network.  The Open Web Application Security Project (OWASP) continues to rank SQL injection attacks at the top of its 10 most critical web application risks.  Current techniques using signatures and black listing require time-consuming and error-prone manual updating, and are not effective against database hackers who obfuscate their SQL injection using Advanced Evasion Techniques (AET) to conceal their attacks.  DB Networks is a pioneer in applying behavioral analysis to identify rogue SQL statements, and today’s launch marks the industry’s first IDS using behavioral analysis in the database tier.

“The way the DB Networks technology analyzes transactions is fundamentally different than a signature based technology so the capacity to identify an anomaly is significantly higher with greater accuracy against false positives,” said David Monahan, Research Director of Security and Risk Management, Enterprise Management Associates, Inc.

In addition to delivering the industry’s most accurate SQL injection attack detection, DB Networks’ new Core IDS solution’s continuous monitoring also adds the unique benefit of database discovery for organizations.  Also, its ability to parse and analyze SQL statements offers organizations unique insight into the SQL statements being created by their applications.  Coding issues are rapidly identified and traced to their source where they can be remediated.

The IDS-6300 works passively in the core of the IT infrastructure and is operationally transparent.  It creates multiple unique models of how an application creates the SQL statements that it sends to the database.  All SQL statements are evaluated against these models for proper behavior.  Any SQL statement that deviates from these unique models causes the system to alarm in real-time.  The behavioral learning and model creation is automated, making it much faster and more accurate than manually generated signatures or the tuning of signatures to suppress false alarms.  The IDS-6300 typically takes a day or two to establish all learning and models, while other solutions can take a month or more.

“DB Networks has responded to customer demand to deliver the IDS-6300, building off our pioneering innovations around behavioral analysis at the database tier,” said Brett Helm, CEO of DB Networks. “Today’s launch addresses an unmet need in the industry to identify obfuscated weaponized SQL injection attacks, and is a requirement for organizations to have real-time evaluation of the situation.”

The new solution is delivered in an easy-to-install intelligent security appliance, which is installed on the network connecting the application server to the database server.  Typical set up takes less than an hour, and the solution works non-obtrusively off a network tap and doesn’t interfere with existing security infrastructure.

Availability and Pricing
The DB Networks IDS-6300 intelligent security appliance is available today from DB Networks and from authorized resellers.  For more information, see www.dbnetworks.com/products/IDS-6300.htm.  Pricing starts at $25,000 and goes up depending on capacity needs, with volume discounts available.

About DB Networks
DB Networks is an innovating behavioral analysis technology provider in the field of database security.  Developed for organizations that need to protect their data from advanced attacks, including Zero-Day attacks, DB Networks offers effective countermeasures against SQL injection and database Denial of Service attacks.  Database attacks happen rapidly – in a matter of minutes – and bypass traditional perimeter security measures.  DB Networks’ unique approach uses behavioral analysis technology to automatically learn each application’s proper SQL statement behavior.  Any SQL statement dispatched from the application that deviates from the established behavioral model immediately raises an alarm as a possible attack.  DB Networks is a privately held company headquartered in San Diego, Calif.  For more information, see http://www.dbnetworks.com, or call (800) 598-0450.

Expand for more details on this Product

CyberVigil

Product From Senstar Inc.

CyberVigil is an industrial cyber security switch providing unique protection for physical security networks and Industrial Control Systems (ICS) against cyber-attacks. With autonomous  and embedded cyber security for all network layers (physical to application), CyberVigil is a unique combination of top-notch industrial switch (which is the core of every network) and a cyber security engine that monitors all the traffic in the network and isolates “infected” network areas. CyberVigil is easy to, configure and operate.  It provides ironclad security together with full featured networking capabilities, optimized for physical security networks, SCADA systems and utility control networks.

Get Info Now

KMICE0x adaptive module for Edge Security Suite

Product From Milton Security Group Inc.

FULLERTON, Calif., Feb. 6, 2014 /PRNewswire/ -- In the wake of the rampant spread of the Kaptoxa Malware, Milton Security Group is unveiling a breakthrough evolution of its Edge Security suite of products aimed at thwarting the threat known to have affected numerous retail giants such as Target Stores, Neiman Marcus, Michaels and countless other organizations.

Get Info Now

Raytheon's SureView Insider Threat and Privileged User Abuse Detection Software

Product From Raytheon

DULLES, Va., (April 25, 2014) — Raytheon Company today announced the latest developments found in their new SureView release, which include new policy support features that enhance product capability for continuous monitoring and network auditing against insider threat and privileged user abuse.

Get Info Now

LocJack keystone security jacks

Product From Quest Technology International Inc.

Quest Technology now offers a new patented technology for the securing of both data and voice using standard patch cables and our award winning LocJack keystone security jacks. This innovative technology is available in RJ12 and RJ45 versions and requires nothing more than a LocJack keystone security jack and its proprietary security key.

Get Info Now

Secure Global Solutions’ Network Navigator

Product From Secure Global Solutions

Secure Global Solutions announces the release of the Network Navigator, a plug-and-play solution for creating secure remote access and monitoring network performance and devices.

Less than 10% of the 15 trillion IP devices installed on networks are monitored. At a fraction of the cost of competing monitoring systems, the Network Navigator is an affordable solution to all network monitoring needs. The Network Navigator will monitor and send notifications of network anomalies before minor problems become disasters. A Navigator Controller head-end appliance or VMware solution acts as the connector for users and field Network Navigators.

Get Info Now

Emsisoft Emergency Kit 4.0 released

Product From Emsisoft

Salzburg, July 11th, 2013 –As of today, the fourth version of Emsisoft Emergency Kit is available. Popular amongst home users and security professionals alike, the Austrian security specialist‘s powerful software package is freely available to the general public and includes the multi-award winning scanning technology of Emsisoft Anti-Malware. The following features were improved in Emsisoft Emergency Kit 4.0:

Get Info Now

Prolexic releases DDoS protection planning tool

Product From Prolexic


HOLLYWOOD, FL – (June 4, 2013) – Prolexic, the global leader in Distributed Denial of Service (DDoS) protection services, announced today that it has released a role-based version of PLXplanner, the company’s free, online DDoS protection planning tool. PLXplanner is a strategic risk assessment and planning tool to help IT and security professionals build a better defense against increasingly powerful and sophisticated DDoS attacks. Based on answers entered in a role-based quiz, PLXplanner delivers strategic recommendations for improving business, technology or operational strategies to fight DDoS attacks.

Get Info Now

ISD-1000 series data line surge protectors

Product From Moxa

BREA, CA, JUNE 5, 2013 -- Moxa, a provider of hardened networking, communication and computing solutions, today announced the new ISD-1000 Series of data line surge protectors engineered to guard data and hardware from harmful transient energies resulting from the "switching" of nearby equipment.

Get Info Now

EventTracker Log Manager

Product From EventTracker

COLUMBIA, MD July 01, 2013
EventTracker, a leading provider of comprehensive SIEM solutions, announced today the general availability of EventTracker Log Manager, a robust log management solution designed to provide significant business value through proactive monitoring and real-time alerting for network and system administrators.

Get Info Now

Technology Lifecycle Management Assessment for security

Product From Dimension Data

NEW YORK – June 4, 2013 – Dimension Data, the $5.8 billion global ICT solutions and services provider, today announced the availability of its Technology Lifecycle Management Assessment for Security. The assessment helps organizations determine which devices on their corporate network require immediate attention over other devices, based on the network location and severity.

Get Info Now