Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

5/28/2009
11:53 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

LogLogic Releases Database Security Solution

LogLogic Database Security Manager provides deep database activity monitoring, real-time illegal access quarantine and termination, as well as real-time and historical correlation across a broad range of other information sources

SAN JOSE, Calif., May 28, 2009 " LogLogic', the log management leader, today announced the general availability of LogLogic Database Security Manager. The solution is the first database security product to provide deep database activity monitoring, real-time illegal access quarantine and termination, as well as real-time and historical correlation across a broad range of other information sources. The solution provides IT security teams with a 360-degree view of enterprise activities by integrating database activity monitoring with automated security and log management solutions.

The importance of database security is exemplified by a recent Ponemon Institute study, which found that data breaches cost companies an average of $202 per exposed record in 2008. As businesses increasingly monitor employees and privileged users, integrating database activity monitoring solutions with security event monitoring and overall log management enables IT administrators to analyze database access in the broader context of what a user was doing before and after a suspicious activity and then determine what other transactions were invoked around suspicious database access.

"There are countless benefits to buying log management, database activity monitoring and security event management tools from the same vendor," said Dominique Levin, Executive Vice President of Marketing and Strategy at LogLogic. "LogLogic customers enjoy exceptional product integration and ease of use, and can now improve visibility and security by analyzing database activity in the context of all other user activity."

Until now, security and log management solutions, including LogLogic's, have relied on native database audit data or required integration with point solutions. Turning on native audit significantly slows down database performance, especially when monitoring detailed levels of application layer access and transactions. LogLogic's Database Security Manager now offers an attractive alternative that is based on cutting-edge host-based sensor technology and a plug-and-play appliance, which allow for deeper monitoring and real-time blocking without significant impact on database performance. In addition, LogLogic will continue to provide alerting and reporting for native database audit logs, as well as continue to support integration with point solutions.

"Database activity monitoring and log management are very closely related. It is very common to hear from customers that database activity monitoring is in scope for a log management project," said Levin. "LogLogic is applying its expertise in delivering powerful and easy-to-deploy monitoring solutions to the database market for the best possible outcome " real-time data protection with minimal performance impact and enterprise-wide user monitoring."

LogLogic Database Security Manager's key capabilities include the ability to:

  • Protect sensitive database information with minimal performance impact
  • Monitor all database activity regardless of user type, information classification level, application language, protocol or location of access
  • Identify and prevent SQL Injection attacks from well-known or unknown exploits
  • Quarantine and terminate illegal access using granular policies
  • Independently monitor database administrator activities
  • Seamlessly integrate with LogLogic's open management platform and security event management solutions

    View an exclusive video interview with Mark Nicollet, Vice President of Gartner Research, on the convergence of database activity monitoring and log management, and the benefits of consolidating with one vendor rather than deploying multiple solutions.

    Pricing and Availability LogLogic Database Security Manager is available immediately and a complete solution, including sensors and a management appliance, starts at $45,000.

    For more information, please visit www.loglogic.com/products/database-security-management.

    About LogLogic LogLogic' (www.loglogic.com) is the leader in log management, compliance management and security management solutions designed to improve accountability and lower costs for organizations of all sizes. LogLogic's unique open log management platform enables customers to collect, search and store 100 percent of IT log data for a comprehensive fingerprint of past and current activity across any organization. Powered by the industry's leading open log management platform, LogLogic's business applications correlate user activities and event data in real-time for a unique integrated approach to security event management, database security management and compliance management with industry and government regulations. Check out LogLogic products at http://loglogic.com/logpower and follow LogLogic on Twitter at http://twitter.com/loglogic.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 6/5/2020
    How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
    Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
    Cybersecurity Spending Hits 'Temporary Pause' Amid Pandemic
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  6/2/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: What? IT said I needed virus protection!
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-13864
    PUBLISHED: 2020-06-05
    The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from a stored XSS vulnerability. An author user can create posts that result in a stored XSS by using a crafted payload in custom links.
    CVE-2020-13865
    PUBLISHED: 2020-06-05
    The Elementor Page Builder plugin before 2.9.9 for WordPress suffers from multiple stored XSS vulnerabilities. An author user can create posts that result in stored XSS vulnerabilities, by using a crafted link in the custom URL or by applying custom attributes.
    CVE-2020-11696
    PUBLISHED: 2020-06-05
    In Combodo iTop a menu shortcut name can be exploited with a stored XSS payload. This is fixed in all iTop packages (community, essential, professional) in version 2.7.0 and iTop essential and iTop professional in version 2.6.4.
    CVE-2020-11697
    PUBLISHED: 2020-06-05
    In Combodo iTop, dashboard ids can be exploited with a reflective XSS payload. This is fixed in all iTop packages (community, essential, professional) for version 2.7.0 and in iTop essential and iTop professional packages for version 2.6.4.
    CVE-2020-13646
    PUBLISHED: 2020-06-05
    In the cheetah free wifi 5.1 driver file liebaonat.sys, local users are allowed to cause a denial of service (BSOD) or other unknown impact due to failure to verify the value of a specific IOCTL.