Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

Vendors Prep for Database Security War

New products set to roll as enterprises look to safeguard their most sensitive data

Online criminals today know what they want, and they know where to find it: in your corporate database. Yet, despite a number of highly-publicized data breaches and thefts, many enterprises still have not fully developed a database security strategy.

Experts agree that database information -- particularly customer lists and personal user data -- is currently the most marketable and attractive target for electronic thieves. But most databases aren't ready for the onslaught of attacks they are beginning to see, the experts warn.

"In my opinion, database security is riddled with holes and it's the biggest problem we face in IT today," says David Litchfield, managing director of NGS Software, who has discovered numerous vulnerabilities in database software over the past year. (See Is Oracle Downplaying Security Vulnerabilities?)

Next week at the RSA conference in San Francisco, several vendors will be stepping up to do something about that problem. Application Security on Tuesday will unveil DbProtect, a suite of tools that includes vulnerability scanning, database activity monitoring, and data encryption.

AppSec joins Guardium, which next week will demonstrate its own database monitoring tool, which was introduced last week. (See Guardium to Protect Database.) Several other vendors, including Imperva, Microsoft, and Oracle, will also be announcing or demonstrating database security tools at RSA.

The vendors say they are being driven by two sides of the corporation: The security people, who are concerned about targeted attacks on their data from the outside; and compliance auditors, who are seeking holes that may allow unauthorized users to access databases from the inside.

"The auditors often are the ones that are the catalysts for companies to call us in," says Ted Julian, vice president of marketing at AppSec. "In the past, database administrators and other users have shared privileged access, and it was possible for them to access data without anyone knowing who did it. That's a hole that auditors want to see closed."

But many IT people still don't know much about database security, says Phil Neray, vice president of marketing at Guardium. "They don't know that there are non-intrusive ways to implement database security without reconfiguring the whole system."

In fact, many enterprises still don't know how many databases they are supporting, or how they are configured, experts say. Some enterprises give business units and departments freedom to create databases as they wish, without centrally controlling or managing them.

"We've seen companies with hundreds of databases that they don't even know about," says Julian.

New security products from database vendors such as IBM, Microsoft, and Oracle can help monitor database access, but they usually aren't enough by themselves, experts say.

"Some auditors see it as the fox guarding the henhouse when the database security and monitoring tools are made by the same vendor as the database itself," Julian says. In addition, many enterprises use databases from several different vendors, making a third-party security product the only viable choice, he observes.

There are some significant differences between the available solutions. Guardium's product, for example, is an appliance, while AppSec's is a software suite. Some products do scanning, real-time monitoring, and encryption; others do only one or two of those.

The cost of a database security solution may also be daunting for some enterprises. Guardium's product starts at about $50,000 for a single appliance, and the company has some customers who are spending more than $1 million. AppSec's suite can be purchased in modules, but a full suite starts at more than $20,000, and the company also has some $1 million customers as well.

"It's a significant investment, but there really is a good ROI case here," says Neray. "Even if you put aside the cost of a breach, there is a good case you can make for automating a lot of the processes required for compliance."

— Tim Wilson, Site Editor, Dark Reading

  • Application Security Inc.
  • Guardium Inc.
  • Imperva Inc.
  • Microsoft Corp. (Nasdaq: MSFT)
  • Oracle Corp. (Nasdaq: ORCL) Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio
     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/6/2020
    Ripple20 Threatens Increasingly Connected Medical Devices
    Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
    DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
    Dark Reading Staff 6/30/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    How Cybersecurity Incident Response Programs Work (and Why Some Don't)
    This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-15570
    PUBLISHED: 2020-07-06
    The parse_report() function in whoopsie.c in Whoopsie through 0.2.69 mishandles memory allocation failures, which allows an attacker to cause a denial of service via a malformed crash file.
    CVE-2020-15569
    PUBLISHED: 2020-07-06
    PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
    CVE-2020-7690
    PUBLISHED: 2020-07-06
    It's possible to inject JavaScript code via the html method.
    CVE-2020-7691
    PUBLISHED: 2020-07-06
    It's possible to use <<script>script> in order to go over the filtering regex.
    CVE-2020-15562
    PUBLISHED: 2020-07-06
    An issue was discovered in Roundcube Webmail before 1.2.11, 1.3.x before 1.3.14, and 1.4.x before 1.4.7. It allows XSS via a crafted HTML e-mail message, as demonstrated by a JavaScript payload in the xmlns (aka XML namespace) attribute of a HEAD element when an SVG element exists.