0% found this document useful (0 votes)
48 views5 pages

Comprehensive Database Security Solutions

The document outlines various database security solutions from McAfee, FortiDB, Oracle, and Imperva, highlighting their capabilities in protecting databases from threats, ensuring compliance, and providing real-time monitoring. Key features include automated policy generation, comprehensive threat protection, detailed audit trails, and centralized management for efficient security management. Each solution offers unique tools and technologies aimed at safeguarding sensitive data and meeting regulatory requirements.

Uploaded by

kwakutse20
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views5 pages

Comprehensive Database Security Solutions

The document outlines various database security solutions from McAfee, FortiDB, Oracle, and Imperva, highlighting their capabilities in protecting databases from threats, ensuring compliance, and providing real-time monitoring. Key features include automated policy generation, comprehensive threat protection, detailed audit trails, and centralized management for efficient security management. Each solution offers unique tools and technologies aimed at safeguarding sensitive data and meeting regulatory requirements.

Uploaded by

kwakutse20
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

MCAFEE DATABASE SECURITY

McAfee Database Activity Monitoring automatically finds databases on your network, protects them
with a set of preconfigured defenses, and helps you build a custom security policy for your environment
— making it easier to demonstrate compliance to auditors and improve critical asset data protection.
Database Activity Monitoring cost-effectively protects your data from all threats by monitoring activity
locally on each database server and by alerting or terminating malicious behavior in real time, even
when running in virtualized or cloud computing environments.

Comprehensive threat protection — Protect even your unpatched databases against zero-day attacks by
blocking attacks that exploit known vulnerabilities and terminating sessions that violate your security
policies.

Detailed audit trail reports — Audit trail reports are available to meet SOX, PCI, and other compliance
audit requirements. During post-incident forensic analysis, this audit trail can help you understand the
amount of lost data and gain greater insight into malicious activity.

Streamlined patching with no required downtime — Applying missing patches and fixing
misconfigurations found by the Database Activity Monitoring vulnerability scan will improve the security
posture of your databases immediately — without requiring any downtime via McAfee’s virtual patching
technology.

ePolicy Orchestrator (ePO) integration — McAfee Database Activity Monitor can be directly managed
with the ePO platform, providing centralized reporting and summary information for thousands of
databases in a single, consistent dashboard.

Database Security and Compliance -


FortiDB
FortiDB is a comprehensive Database Security and Compliance platform that helps large
enterprises and cloud-based service providers protect their databases and applications
from internal and external threats. Utilizing its flexible policy framework, FortiDB allows
quick and easy implementation of internal IT control frameworks for database activity
monitoring, IT audit and regulatory compliance.
Highlights
 Scalable protection for hundreds of databases extends built-in database security
features for comprehensive protection against internal and external threats.
 Heterogeneous platform support includes AIX, Red Hat Enterprise Linux, Solaris 10,
Windows XP/Vista, Windows Server 2003, and virtualized environments.
 Quick time-to-value with hundreds of pre-populated policies covering known exploits,
configuration weaknesses, sensitive data, operational risks and compliance.
 Automated policy generation to accelerate deployment process.
 Easy deployment of database activity monitoring/audit across hundreds of databases
via centralized policy management.
 Provides Privilege change data for User Access management and integration.
 Completeness of data is assured by capturing all types of database activity from
administration events to user activity, regardless of command or connection type.
 Out-of-the-box reports help you to meet security and compliance requirements such as
SOX and PCI DSS.
Oracle Database Security
From the outset, Oracle has delivered the industry's most advanced technology to safeguard data at the source—the
database. Oracle provides a comprehensive portfolio of security solutions to ensure data privacy, protect against
insider threats, and enable regulatory compliance for both Oracle and non-Oracle databases. Oracle's powerful
preventive and detective security controls include database activity monitoring and blocking, privileged user and
multifactor access control, data classification and discovery, transparent data encryption, consolidated auditing and
reporting, secure configuration management, and data masking. With Oracle, customers can deploy reliable data
security solutions that require no changes to existing applications, saving time and money

Products include

Oracle Key Vault


Oracle Key Vault enables customers to deploy encryption and other security solutions by centrally managing
encryption keys, Oracle Wallets, Java Keystores, and credential files.

Oracle Audit Vault and Database Firewall


Monitor Oracle and non-Oracle database traffic to detect and block threats, as well as improve compliance reporting
by consolidating audit data from databases, operating systems, directories, and other sources.

Oracle Advanced Security


Comply with privacy and regulatory mandates that require encrypting and redacting (display masking) application
data, such as credit cards, social security numbers, or personally identifiable information (PII). By encrypting data at
rest and masking data whenever it leaves the database, Oracle Advanced Security provides the most cost-effective
solution for comprehensive data protection.

Oracle Database Vault


Increase the security of existing applications and address regulatory mandates that call for separation of duties, least
privilege, and other preventive controls to ensure data integrity and data privacy. Oracle Database Vault proactively
protects application data stored in the Oracle database from being accessed by privileged database users.

Oracle Label Security


Easily categorize and mediate access to data based on its classification. Designed to meet public-sector
requirements for multilevel security and mandatory access control, Oracle Label Security provides a flexible
framework that both government and commercial entities worldwide can use to manage data access on a "need to
know" basis in order to protect data privacy and achieve regulatory compliance.
Oracle Data Masking and Subsetting
Comply with data privacy and protection mandates that restrict the use of actual customer data. With Oracle Data
Masking and Subsetting Pack, sensitive information such as credit card or social security numbers can be replaced
with realistic values, allowing production data to be safely used for development, testing, or sharing with out-source or
off-shore partners.

IMPERVA

Imperva SecureSphere Database Security Products ▪ Audit all access to sensitive data ▪ Alert or
block database attacks and unauthorized activities in real time ▪ Detect and virtually patch
database vulnerabilities ▪ Identify excessive user rights and dormant users, and enable a complete
rights review cycle ▪ Accelerate incident response and forensics investigations with advanced
analytics ▪ Protect RDBMS, data warehouses, Big Data platforms, and mainframe databases
Products SecureSphere Database Activity Monitor SecureSphere Database Firewall
SecureSphere Database Assessment User Rights Management for Databases ADC Insights
Imperva Data Security Capabilities Continuous Auditing of Sensitive Data Usage SecureSphere
continuously monitors and audits all database operations in

IMPERVA DATABASE SECURITY PRODUCTS


Database Activity Monitor
Full auditing and visibility into database data usage
Database Firewall
Activity monitoring and real-time protection for critical databases
Database Assessment
Vulnerability assessment, configuration management, and data classification for databases User
Rights Management for Databases
Review and manage user access rights to sensitive databases
ADC Insights
Pre-packaged reports and rules for SAP, Oracle EBS, and PeopleSoft compliance and security

You might also like