˙Guardium 首次發表針對阻擋特權使用者存取機密敏感資料的解決方案 - 橫跨且支援所有主要的DBMS平台
May 23, 2008
˙Guardium 獲選為「Red Herring北美100強」的殊榮
May 22, 2008
˙Guardium 獲選為「American Business Awards」的決選入圍者
May 21, 2008
Read more
˙資訊安全焦點新聞
˙精選資安知識庫
 
 
 
 
Guardium / Retie Shield /
Guardium為您所有的應用程式及資料庫結構中所需的安全防護,提供了最簡潔有力的解決方案,包括:
˙ Vulnerability management solutions
弱點安全管理方案:在弱點安全控管上的判讀及解決方案


Vulnerability management solutions

The Complexity Challenge
A core responsibility of the IT security organization is to protect the business from internal and external threats.? But the threat environment is constantly changing—and enterprise application and database environments are particularly challenging to secure because their functionality and complexity are constantly increasing.

In particular:

˙ DBMS systems are rich and complex systems incorporating hundreds of millions of lines of code.? Over the past 25+ years, DBMS vendors have continuously added functionality to their systems.? Today’s DBMS’ run virtual machines (Java within the database), offer Web services from within the database, link heterogeneous distributed repositories into one virtual store, and run XML and full procedural languages such as PL/SQL.? The many new DBMS features and services have brought numerous new vulnerabilities and the potential for misconfiguration and misuse
˙ Web applications have transformed and improved the ways companies do business but have also left the database more exposed.? The exposure exists because the application which uses the data now caters to a much wider audience and because users are not limited to inside employees. Attackers now have a direct pipe—through the application, past perimeter defenses—into the database
˙ There is an imbalance in many organizations between the sophistication with which organizations run their businesses and the knowledge, skills, and processes required to secure their underlying business systems.? Most organizations utilize DBAs to manage the database (the lifeblood of any application) and ensure availability, performance, and correctness. However, what percentage of a DBA’s time is devoted to data security?? How much does the average information security professional know about databases?? Finally, can these professionals address the complexity of modern, distributed data management in heterogeneous environments and secure it through robust technology and processes?

Addressing the Vulnerability Management Lifecycle
Guardium provides the only solution that enables enterprises to go beyond vulnerability reporting to address the entire vulnerability management lifecycle, including assessing business risk, supporting mitigation activities and streamlining compliance reporting and oversight processes.? In particular, Guardium allows you to rapidly:

Pinpoint database vulnerabilities
Missing patches, misconfigured privileges, default accounts, and weak passwords create enormous risk.? Guardium incorporates an extensive library of assessment tests, based on industry best practices, to flag these and other static vulnerabilities.? It also identifies dynamic or behavioral vulnerabilities—such as sharing of administration accounts and excessive administrator logins—by monitoring actual user activity over time.? Finally, it includes embedded knowledge about enterprise applications such as Oracle EBS and SAP, to protect critical tables reserved for these applications (an essential control for SOX).? A quarterly subscription service ensures that assessment tests are always up to date.

Prioritize remediation activities—based on business risk
Guardium automatically locates and classifies sensitive data such as credit card numbers in corporate databases, and analyzes baseline behavior to understand how and when line-of-business applications are accessing vulnerable databases.? Risk assessment is crucial for prioritizing remediation, since most organizations do not have sufficient resources to patch all vulnerable systems at the same time.

Protect unpatched systems with real-time controls
Vulnerable systems can take 3-6 months to patch. Guardium’s solution protects databases before and after they’re patched, through database activity monitoring and signature-based policies, along with preventive controls such as real-time alerts, automated account lockouts and blocking.? Policies and activity baselining can also protect against application vulnerabilities such as SQL injection and buffer overflow.

Harden databases
Once vulnerable systems have been repaired using recommendations provided by the assessment tests, organizations need to ensure that only authorized changes are made.? Guardium’s Configuration Audit System (CAS) prevents unauthorized changes to databases once a secure configuration baseline has been established.

Document and streamline compliance
Auditors want to know that incidents are being tracked and resolved in a timely manner.? Guardium’s incident management and Compliance Workflow Automation modules allow you to track progress on the remediation of vulnerable systems and automate compliance report distribution, electronic sign-offs and escalations.

 
 
Opportunity 人才聘用 / Partners 合作夥伴 / Privacy Policy 隱私權條款 / Site Map 網站地圖