˙Guardium 首次發表針對阻擋特權使用者存取機密敏感資料的解決方案 - 橫跨且支援所有主要的DBMS平台
May 23, 2008
˙Guardium 獲選為「Red Herring北美100強」的殊榮
May 22, 2008
˙Guardium 獲選為「American Business Awards」的決選入圍者
May 21, 2008
Read more
˙資訊安全焦點新聞
˙精選資安知識庫
 
 
 
 
Guardium / Retie Shield /
Guardium為您所有的應用程式及資料庫結構中所需的安全防護,提供了最簡潔有力的解決方案,包括:
˙ Database leak prevention
資料庫外洩防護系統:能指出在敏感的資料及對資料庫可能造成威脅的安全缺口,並加以防護


Database leak prevention

Address Data Leakage at the Core
Most information leaks, even those that occur via stolen laptops or emailing sensitive information, originate with unauthorized or unusual queries to critical databases.? Many organizations have formal access policies that govern how and when sensitive data is accessed, but lack practical solutions for detecting or blocking activities that fall outside these policies.

Unlike Data Leak Prevention (DLP) solutions that watch data as it leaves the network perimeter via email or end-points via USB devices, Guardium’s database leak prevention solution addresses leakage at the data source—in the data center itself—using three essential technologies:

Auto-Discovery and Classification of Sensitive Data: Guardium’s Classifier uses a database crawler to look for patterns such as 16-digit credit card numbers and 9-digit Social Security numbers in corporate databases.? Companies often fail to locate all of their sensitive data, especially after mergers and acquisitions or when using legacy systems.? Our system generates alerts when it locates sensitive data for the first time, helping organizations quickly identify faulty business or IT processes that result in the storage of confidential data, such as magnetic stripe or PIN block information.

By tagging sensitive objects with meta-data classifications, such as “Privacy-Restricted” or “Regulated Record,” organizations can ensure that appropriate access policies and audit processes are always applied to items with similar properties.? Our system automatically assigns customizable, granular access policies to groups of objects, controlling who has access to them, from which applications and locations, at what times, using which SQL commands, etc.

For forensic investigations and e-discovery initiatives, organizations can use Guardium’s rich data mining tools to analyze a verifiable audit trail of historical transaction information for particular events involving specific classes of data.? Audit trails are stored in Guardium’s audit data warehouse and typically involve tens of millions of sessions.

An Extrusion Policy Engine: Unlike monitoring tools that only inspect inbound database commands, the Guardium solution identifies unauthorized or suspicious actions by monitoring traffic both to and from database servers.? This allows our solution to immediately identify, for example, a database query that returns thousands of credit card numbers, thereby deviating from normal operations based on the presence of sensitive data patterns and the volume of returned records.? Information collected by the Extrusion Policy Engine can also be used to understand the true extent of data theft, thus minimizing breach disclosure efforts and costs.

Extrusion Policies are typically used to detect activities by authorized users that fall outside normal business processes.? Guardium also provides access and security exception policies that monitor inbound database commands for unauthorized actions, such as SELECT operations by privileged users or failed logins that fall outside of a given threshold.

Database Intrusion/Extrusion Prevention:
Guardium provides technology for real-time enforcement and peremptory blocking of transactions that violate security policies.? This is accomplished by configuring the Guardium system either as an in-line database firewall or as a passive monitoring device that initiates other enforcement actions such as data-level blocking, TCP reset blocking, automated lock-outs of database users, VPN port shutdowns, and real-time alerts

 

 
 
Opportunity 人才聘用 / Partners 合作夥伴 / Privacy Policy 隱私權條款 / Site Map 網站地圖