Welcome!

News Feed Item

DB Networks Helps Prevent High-Profile Customer Data Breaches With Network Behavioral Analysis and Continuous Monitoring of Databases

Real-Time Continuous Monitoring of Database Traffic Can Help Retailers Avoid Loss of Customer Data From Database Breaches

SAN DIEGO, CA -- (Marketwired) -- 01/23/14 -- DB Networks, an innovator of behavioral analysis in database security, today announced that it delivers the behavioral analysis and continuous monitoring of databases at the core of the network that can help organizations avoid high-profile breaches, such as those publicized at Target and Neiman Marcus, which result in the loss of customer data and the retailers' reputations.

While details are still being gathered, the findings of the high-profile breach at Target revealed that hackers stole not only 40 million credit cards but also breached database records with personally identifiable information (PII) of at least 70 million customers, including names, mailing addresses, telephone numbers and email addresses. While not uncommon, the revelation of other similar breaches over the holidays has brought the protection of customer data to the forefront. Details common across breaches such as these include the loss of customers' PII over a period of time, sometimes as a result of a database exploit. The largest known breach at a U.S. retailer was in 2007 at TJX Cos Inc., where more than 90 million credit cards were stolen over approximately 18 months.

"Retailers have not come clean on all the facts of these attacks, but in Target's case it appears an internal database was accessed and customer data was stolen over time," said Brett Helm, CEO of DB Networks. "The scope of these breaches is truly shocking -- this is a wakeup call that organizations need to get serious about their information security. The fact that breaches are perpetrated over such a long period of time is truly unconscionable in this day and age. Real-time monitoring of database traffic and alarming when rogue commands are detected can dramatically limit the scope of such a breach."

DB Networks' IDS-6300 intelligent security appliance is the industry's first next-generation Core Intrusion Detection System (IDS). The IDS-6300 is the industry's first Core IDS that combines behavioral analysis and advanced continuous database communications monitoring, helping organizations avoid and be instantly alerted to database attacks, including advanced and Zero-Day SQL injection attacks. The solution also addresses specific compliance requirements within regulations such as PCI DSS, HIPAA, GLBA, and NIST spec 800-53.

In addition to highlighting the need for enhanced security solutions that provide continuous monitoring and core network threat detection, the recent breaches at organizations such as Target and Neiman Marcus emphasize another critical information security issue. The details of these security breaches are not shared in a timely manner or with sufficient details to facilitate improvements to security systems. Retailers claim shoppers' credit card information and PII are once again safe simply to lure back shoppers, but without the chance for security fixes these types of massive exploits will continue.

As a result, legislation is in the works which would mandate timely reporting of security breaches which can help consumers once their information has been compromised. Senate Judiciary Committee Chairman Patrick Leahy earlier this month introduced a new version of a 2005 bill that would set criminal penalties for intentional or willful concealing of a personal data breach that causes economic damage to consumers. It also ensures that conspiring or attempting to commit computer fraud would face the same penalties as completed offenses. Sen. Tom Carper (D.-Del.) has also discussed reintroducing a bill that creates a reporting standard for breaches. Accurate and timely reporting of breaches in compliance with this proposed legislation is facilitated by continuous monitoring of core network systems and activity.

About DB Networks
DB Networks is an innovating behavioral analysis technology provider in the field of database security. Developed for organizations that need to protect their data from advanced attacks, including Zero-Day attacks, DB Networks offers effective countermeasures against SQL injection and database Denial of Service attacks. Database attacks happen rapidly -- in a matter of minutes -- and bypass traditional perimeter security measures. DB Networks' unique approach uses behavioral analysis technology to automatically learn each application's proper SQL statement behavior. Any SQL statement dispatched from the application that deviates from the established behavioral model immediately raises an alarm as a possible attack. DB Networks is a privately held company headquartered in San Diego, Calif. For more information, see http://www.dbnetworks.com, or call (800) 598-0450.

DB Networks is a registered trademark of DB Networks in the United States and other countries. All other company and product names are either trademarks or registered trademarks of their respective companies.

Add to Digg Bookmark with del.icio.us Add to Newsvine

Contact:
Dan Spalding
408-960-9297
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Is your aging software platform suffering from technical debt while the market changes and demands new solutions at a faster clip? It’s a bold move, but you might consider walking away from your core platform and starting fresh. ReadyTalk did exactly that. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, will discuss why and how ReadyTalk diverted from healthy revenue and over a decade of audio conferencing product development to start an innovati...
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Early adopters of IoT viewed it mainly as a different term for machine-to-machine connectivity or M2M. This is understandable since a prerequisite for any IoT solution is the ability to collect and aggregate device data, which is most often presented in a dashboard. The problem is that viewing data in a dashboard requires a human to interpret the results and take manual action, which doesn’t scale to the needs of IoT.
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
“Being the one true cloud-agnostic and storage-agnostic software solution, more and more customers are coming to Commvault and saying ' What do you recommend? What's your best practice for implementing cloud?” explained Randy De Meno, Chief Technologist at Commvault, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
As companies gain momentum, the need to maintain high quality products can outstrip their development team’s bandwidth for QA. Building out a large QA team (whether in-house or outsourced) can slow down development and significantly increases costs. This eBook takes QA profiles from 5 companies who successfully scaled up production without building a large QA team and includes: What to consider when choosing CI/CD tools How culture and communication can make or break implementation
IoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, ...
UpGuard has become a member of the Center for Internet Security (CIS), and will continue to help businesses expand visibility into their cyber risk by providing hardening benchmarks to all customers. By incorporating these benchmarks, UpGuard's CSTAR solution builds on its lead in providing the most complete assessment of both internal and external cyber risk. CIS benchmarks are a widely accepted set of hardening guidelines that have been publicly available for years. Numerous solutions exist t...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Verizon Communications Inc. (NYSE, Nasdaq: VZ) and Yahoo! Inc. (Nasdaq: YHOO) have entered into a definitive agreement under which Verizon will acquire Yahoo's operating business for approximately $4.83 billion in cash, subject to customary closing adjustments. Yahoo informs, connects and entertains a global audience of more than 1 billion monthly active users** -- including 600 million monthly active mobile users*** through its search, communications and digital content products. Yahoo also co...
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application tha...
Cloud analytics is dramatically altering business intelligence. Some businesses will capitalize on these promising new technologies and gain key insights that’ll help them gain competitive advantage. And others won’t. Whether you’re a business leader, an IT manager, or an analyst, we want to help you and the people you need to influence with a free copy of “Cloud Analytics for Dummies,” the essential guide to this explosive new space for business intelligence.