Welcome!

News Feed Item

DB Networks Helps Prevent High-Profile Customer Data Breaches With Network Behavioral Analysis and Continuous Monitoring of Databases

Real-Time Continuous Monitoring of Database Traffic Can Help Retailers Avoid Loss of Customer Data From Database Breaches

SAN DIEGO, CA -- (Marketwired) -- 01/23/14 -- DB Networks, an innovator of behavioral analysis in database security, today announced that it delivers the behavioral analysis and continuous monitoring of databases at the core of the network that can help organizations avoid high-profile breaches, such as those publicized at Target and Neiman Marcus, which result in the loss of customer data and the retailers' reputations.

While details are still being gathered, the findings of the high-profile breach at Target revealed that hackers stole not only 40 million credit cards but also breached database records with personally identifiable information (PII) of at least 70 million customers, including names, mailing addresses, telephone numbers and email addresses. While not uncommon, the revelation of other similar breaches over the holidays has brought the protection of customer data to the forefront. Details common across breaches such as these include the loss of customers' PII over a period of time, sometimes as a result of a database exploit. The largest known breach at a U.S. retailer was in 2007 at TJX Cos Inc., where more than 90 million credit cards were stolen over approximately 18 months.

"Retailers have not come clean on all the facts of these attacks, but in Target's case it appears an internal database was accessed and customer data was stolen over time," said Brett Helm, CEO of DB Networks. "The scope of these breaches is truly shocking -- this is a wakeup call that organizations need to get serious about their information security. The fact that breaches are perpetrated over such a long period of time is truly unconscionable in this day and age. Real-time monitoring of database traffic and alarming when rogue commands are detected can dramatically limit the scope of such a breach."

DB Networks' IDS-6300 intelligent security appliance is the industry's first next-generation Core Intrusion Detection System (IDS). The IDS-6300 is the industry's first Core IDS that combines behavioral analysis and advanced continuous database communications monitoring, helping organizations avoid and be instantly alerted to database attacks, including advanced and Zero-Day SQL injection attacks. The solution also addresses specific compliance requirements within regulations such as PCI DSS, HIPAA, GLBA, and NIST spec 800-53.

In addition to highlighting the need for enhanced security solutions that provide continuous monitoring and core network threat detection, the recent breaches at organizations such as Target and Neiman Marcus emphasize another critical information security issue. The details of these security breaches are not shared in a timely manner or with sufficient details to facilitate improvements to security systems. Retailers claim shoppers' credit card information and PII are once again safe simply to lure back shoppers, but without the chance for security fixes these types of massive exploits will continue.

As a result, legislation is in the works which would mandate timely reporting of security breaches which can help consumers once their information has been compromised. Senate Judiciary Committee Chairman Patrick Leahy earlier this month introduced a new version of a 2005 bill that would set criminal penalties for intentional or willful concealing of a personal data breach that causes economic damage to consumers. It also ensures that conspiring or attempting to commit computer fraud would face the same penalties as completed offenses. Sen. Tom Carper (D.-Del.) has also discussed reintroducing a bill that creates a reporting standard for breaches. Accurate and timely reporting of breaches in compliance with this proposed legislation is facilitated by continuous monitoring of core network systems and activity.

About DB Networks
DB Networks is an innovating behavioral analysis technology provider in the field of database security. Developed for organizations that need to protect their data from advanced attacks, including Zero-Day attacks, DB Networks offers effective countermeasures against SQL injection and database Denial of Service attacks. Database attacks happen rapidly -- in a matter of minutes -- and bypass traditional perimeter security measures. DB Networks' unique approach uses behavioral analysis technology to automatically learn each application's proper SQL statement behavior. Any SQL statement dispatched from the application that deviates from the established behavioral model immediately raises an alarm as a possible attack. DB Networks is a privately held company headquartered in San Diego, Calif. For more information, see http://www.dbnetworks.com, or call (800) 598-0450.

DB Networks is a registered trademark of DB Networks in the United States and other countries. All other company and product names are either trademarks or registered trademarks of their respective companies.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Dan Spalding
408-960-9297
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List.
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Personalization has long been the holy grail of marketing. Simply stated, communicate the most relevant offer to the right person and you will increase sales. To achieve this, you must understand the individual. Consequently, digital marketers developed many ways to gather and leverage customer information to deliver targeted experiences. In his session at @ThingsExpo, Lou Casal, Founder and Principal Consultant at Practicala, discussed how the Internet of Things (IoT) has accelerated our abil...
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue an...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
Leading cloud-centric IT organizations are establishing core capabilities to improve productivity, control costs and provide a highly responsive end-user experience. Key steps along this journey include creating an end-user cloud services catalog, automating workflows and provisioning, and implementing IT showback and chargeback. In his session at 19th Cloud Expo, Mark Jamensky, executive vice president of Products at Embotics, will walk attendees through an in-depth case study of enterprise I...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...