Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

5/28/2009
11:53 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

LogLogic Releases Database Security Solution

LogLogic Database Security Manager provides deep database activity monitoring, real-time illegal access quarantine and termination, as well as real-time and historical correlation across a broad range of other information sources

SAN JOSE, Calif., May 28, 2009 " LogLogic', the log management leader, today announced the general availability of LogLogic Database Security Manager. The solution is the first database security product to provide deep database activity monitoring, real-time illegal access quarantine and termination, as well as real-time and historical correlation across a broad range of other information sources. The solution provides IT security teams with a 360-degree view of enterprise activities by integrating database activity monitoring with automated security and log management solutions.

The importance of database security is exemplified by a recent Ponemon Institute study, which found that data breaches cost companies an average of $202 per exposed record in 2008. As businesses increasingly monitor employees and privileged users, integrating database activity monitoring solutions with security event monitoring and overall log management enables IT administrators to analyze database access in the broader context of what a user was doing before and after a suspicious activity and then determine what other transactions were invoked around suspicious database access.

"There are countless benefits to buying log management, database activity monitoring and security event management tools from the same vendor," said Dominique Levin, Executive Vice President of Marketing and Strategy at LogLogic. "LogLogic customers enjoy exceptional product integration and ease of use, and can now improve visibility and security by analyzing database activity in the context of all other user activity."

Until now, security and log management solutions, including LogLogic's, have relied on native database audit data or required integration with point solutions. Turning on native audit significantly slows down database performance, especially when monitoring detailed levels of application layer access and transactions. LogLogic's Database Security Manager now offers an attractive alternative that is based on cutting-edge host-based sensor technology and a plug-and-play appliance, which allow for deeper monitoring and real-time blocking without significant impact on database performance. In addition, LogLogic will continue to provide alerting and reporting for native database audit logs, as well as continue to support integration with point solutions.

"Database activity monitoring and log management are very closely related. It is very common to hear from customers that database activity monitoring is in scope for a log management project," said Levin. "LogLogic is applying its expertise in delivering powerful and easy-to-deploy monitoring solutions to the database market for the best possible outcome " real-time data protection with minimal performance impact and enterprise-wide user monitoring."

LogLogic Database Security Manager's key capabilities include the ability to:

  • Protect sensitive database information with minimal performance impact
  • Monitor all database activity regardless of user type, information classification level, application language, protocol or location of access
  • Identify and prevent SQL Injection attacks from well-known or unknown exploits
  • Quarantine and terminate illegal access using granular policies
  • Independently monitor database administrator activities
  • Seamlessly integrate with LogLogic's open management platform and security event management solutions

    View an exclusive video interview with Mark Nicollet, Vice President of Gartner Research, on the convergence of database activity monitoring and log management, and the benefits of consolidating with one vendor rather than deploying multiple solutions.

    Pricing and Availability LogLogic Database Security Manager is available immediately and a complete solution, including sensors and a management appliance, starts at $45,000.

    For more information, please visit www.loglogic.com/products/database-security-management.

    About LogLogic LogLogic' (www.loglogic.com) is the leader in log management, compliance management and security management solutions designed to improve accountability and lower costs for organizations of all sizes. LogLogic's unique open log management platform enables customers to collect, search and store 100 percent of IT log data for a comprehensive fingerprint of past and current activity across any organization. Powered by the industry's leading open log management platform, LogLogic's business applications correlate user activities and event data in real-time for a unique integrated approach to security event management, database security management and compliance management with industry and government regulations. Check out LogLogic products at http://loglogic.com/logpower and follow LogLogic on Twitter at http://twitter.com/loglogic.

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Why Cyber-Risk Is a C-Suite Issue
    Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
    The Cold Truth about Cyber Insurance
    Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
    Black Hat Q&A: Hacking a '90s Sports Car
    Black Hat Staff, ,  11/7/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Current Issue
    7 Threats & Disruptive Forces Changing the Face of Cybersecurity
    This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-5230
    PUBLISHED: 2019-11-13
    P20 Pro, P20, Mate RS smartphones with versions earlier than Charlotte-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than Emily-AL00A 9.1.0.321(C00E320R1P1T8), versions earlier than NEO-AL00D NEO-AL00 9.1.0.321(C786E320R1P1T8) have an improper validation vulnerability. The system does not perform...
    CVE-2019-5231
    PUBLISHED: 2019-11-13
    P30 smartphones with versions earlier than ELLE-AL00B 9.1.0.186(C00E180R2P1) have an improper authorization vulnerability. The software incorrectly performs an authorization check when a user attempts to perform certain action. Successful exploit could allow the attacker to update a crafted package.
    CVE-2019-5233
    PUBLISHED: 2019-11-13
    Huawei smartphones with versions earlier than Taurus-AL00B 10.0.0.41(SP2C00E41R3P2) have an improper authentication vulnerability. Successful exploitation may cause the attacker to access specific components.
    CVE-2019-5246
    PUBLISHED: 2019-11-13
    Smartphones with software of ELLE-AL00B 9.1.0.109(C00E106R1P21), 9.1.0.113(C00E110R1P21), 9.1.0.125(C00E120R1P21), 9.1.0.135(C00E130R1P21), 9.1.0.153(C00E150R1P21), 9.1.0.155(C00E150R1P21), 9.1.0.162(C00E160R2P1) have an insufficient verification vulnerability. The system does not verify certain par...
    CVE-2010-4177
    PUBLISHED: 2019-11-12
    mysql-gui-tools (mysql-query-browser and mysql-admin) before 5.0r14+openSUSE-2.3 exposes the password of a user connected to the MySQL server in clear text form via the list of running processes.