Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

Vendors Prep for Database Security War

New products set to roll as enterprises look to safeguard their most sensitive data

Online criminals today know what they want, and they know where to find it: in your corporate database. Yet, despite a number of highly-publicized data breaches and thefts, many enterprises still have not fully developed a database security strategy.

Experts agree that database information -- particularly customer lists and personal user data -- is currently the most marketable and attractive target for electronic thieves. But most databases aren't ready for the onslaught of attacks they are beginning to see, the experts warn.

"In my opinion, database security is riddled with holes and it's the biggest problem we face in IT today," says David Litchfield, managing director of NGS Software, who has discovered numerous vulnerabilities in database software over the past year. (See Is Oracle Downplaying Security Vulnerabilities?)

Next week at the RSA conference in San Francisco, several vendors will be stepping up to do something about that problem. Application Security on Tuesday will unveil DbProtect, a suite of tools that includes vulnerability scanning, database activity monitoring, and data encryption.

AppSec joins Guardium, which next week will demonstrate its own database monitoring tool, which was introduced last week. (See Guardium to Protect Database.) Several other vendors, including Imperva, Microsoft, and Oracle, will also be announcing or demonstrating database security tools at RSA.

The vendors say they are being driven by two sides of the corporation: The security people, who are concerned about targeted attacks on their data from the outside; and compliance auditors, who are seeking holes that may allow unauthorized users to access databases from the inside.

"The auditors often are the ones that are the catalysts for companies to call us in," says Ted Julian, vice president of marketing at AppSec. "In the past, database administrators and other users have shared privileged access, and it was possible for them to access data without anyone knowing who did it. That's a hole that auditors want to see closed."

But many IT people still don't know much about database security, says Phil Neray, vice president of marketing at Guardium. "They don't know that there are non-intrusive ways to implement database security without reconfiguring the whole system."

In fact, many enterprises still don't know how many databases they are supporting, or how they are configured, experts say. Some enterprises give business units and departments freedom to create databases as they wish, without centrally controlling or managing them.

"We've seen companies with hundreds of databases that they don't even know about," says Julian.

New security products from database vendors such as IBM, Microsoft, and Oracle can help monitor database access, but they usually aren't enough by themselves, experts say.

"Some auditors see it as the fox guarding the henhouse when the database security and monitoring tools are made by the same vendor as the database itself," Julian says. In addition, many enterprises use databases from several different vendors, making a third-party security product the only viable choice, he observes.

There are some significant differences between the available solutions. Guardium's product, for example, is an appliance, while AppSec's is a software suite. Some products do scanning, real-time monitoring, and encryption; others do only one or two of those.

The cost of a database security solution may also be daunting for some enterprises. Guardium's product starts at about $50,000 for a single appliance, and the company has some customers who are spending more than $1 million. AppSec's suite can be purchased in modules, but a full suite starts at more than $20,000, and the company also has some $1 million customers as well.

"It's a significant investment, but there really is a good ROI case here," says Neray. "Even if you put aside the cost of a breach, there is a good case you can make for automating a lot of the processes required for compliance."

— Tim Wilson, Site Editor, Dark Reading

  • Application Security Inc.
  • Guardium Inc.
  • Imperva Inc.
  • Microsoft Corp. (Nasdaq: MSFT)
  • Oracle Corp. (Nasdaq: ORCL) Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    Data Leak Week: Billions of Sensitive Files Exposed Online
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  12/10/2019
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon Contest
    Write a Caption, Win a Starbucks Card! Click Here
    Latest Comment: Our Endpoint Protection system is a little outdated... 
    Current Issue
    The Year in Security: 2019
    This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
    Flash Poll
    Rethinking Enterprise Data Defense
    Rethinking Enterprise Data Defense
    Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2019-19750
    PUBLISHED: 2019-12-12
    minerstat msOS before 2019-10-23 does not have a unique SSH key for each instance of the product.
    CVE-2019-4606
    PUBLISHED: 2019-12-12
    IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 could allow a local attacker to execute arbitrary code on the system, caused by an untrusted search path vulnerability. By using a executable file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-For...
    CVE-2019-16246
    PUBLISHED: 2019-12-12
    Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
    CVE-2019-17358
    PUBLISHED: 2019-12-12
    Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP ...
    CVE-2019-17428
    PUBLISHED: 2019-12-12
    An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.