THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.



Similar documents
Securing and Accelerating Databases In Minutes using GreenSQL

How DataSunrise Helps to Comply with SOX, PCI DSS and HIPAA Requirements

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

PCI DSS Reporting WHITEPAPER

Enforcive / Enterprise Security

ALERT LOGIC LOG MANAGER & LOGREVIEW

HP Server Automation Standard

MySQL Security: Best Practices

VULNERABILITY MANAGEMENT

APPLICATION COMPLIANCE AUDIT & ENFORCEMENT

How To Achieve Pca Compliance With Redhat Enterprise Linux

DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cloud and Data Center Security

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

CONTINUOUS LOG MANAGEMENT & MONITORING

Trend Micro. Advanced Security Built for the Cloud

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Analyzing Logs For Security Information Event Management Whitepaper

Analyzing Logs For Security Information Event Management Whitepaper

An Oracle White Paper January Oracle Database Firewall

Installing and Configuring Guardium, ODF, and OAV

Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant

8 Steps to Holistic Database Security

CloudCheck Compliance Certification Program

The Business Case for Security Information Management

Devising a Server Protection Strategy with Trend Micro

McAfee Database Security. Dan Sarel, VP Database Security Products

An Oracle White Paper January Oracle Database Firewall

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

Clavister InSight TM. Protecting Values

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

Achieving & Maintaining Database Compliance for HIPAA

Intro to QualysGuard IT Compliance SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

1Checkpoint. 2How Logtrust. Check Point is a firewall network that offers solutions. Logtrust offers to Check Point firewall Networks

Implementing Managed Services in the Data Center and Cloud Space

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:

Data Sheet: Vigilant Web Application Firewall. Where every interaction matters. Security-as-a-Service. Fully Managed Solution

Real-Time Database Protection and. Overview IBM Corporation

The SIEM Evaluator s Guide

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Devising a Server Protection Strategy with Trend Micro

An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011

Discover & Investigate Advanced Threats. OVERVIEW

PCI DSS 3.0 Compliance

SapphireIMS 4.0 Asset Management Feature Specification

Secret Server Splunk Integration Guide

Enterprise Security Solutions

Oracle Database 11g: Security. What you will learn:

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Analyzing Logs For Security Information Event Management

Current IBAT Endorsed Services

Detect & Investigate Threats. OVERVIEW

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Exporting IBM i Data to Syslog

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

What s New in Centrify Server Suite 2015

Enforcive /Cross-Platform Audit

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

Total Defense Endpoint Premium r12

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Open source business rules management system

How To Buy Nitro Security

SolarWinds Network Performance Monitor powerful network fault & availabilty management

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Archive-SeCure 3600 for Midsized Businesses

SERENA SOFTWARE Serena Service Manager Security

PCI DSS Top 10 Reports March 2011

Unified Threat Management, Managed Security, and the Cloud Services Model

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

White Paper. Imperva Data Security and Compliance Lifecycle

Privileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery

1. Thwart attacks on your network.

Data Security and Governance with Enterprise Enabler

SolarWinds Network Performance Monitor

Maximizing Configuration Management IT Security Benefits with Puppet

White Paper. How to Effectively Provide Safe and Productive Web. Environment for Today's Businesses

End-user Security Analytics Strengthens Protection with ArcSight

Cyberoam Perspective BFSI Security Guidelines. Overview

How To Protect Your Cloud From Attack

Vendor Questionnaire

Best Practices for Building a Security Operations Center

How To Manage A Privileged Account Management

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Transcription:

THE FIRST UNIFIED DATABASE SECURITY SOLUTION Product Overview Security. Auditing. Caching. Masking.

2 The First Unified Database Security Solution About the products The GreenSQL family of Unified Database Security solutions provides databases with ALL-IN-ONE Security, Caching, Auditing and Masking. GreenSQL Unified Database Security protects databases from internal and external threats in real time, demonstrates security compliance and accelerates database performance. How it works GreenSQL is installed as a front end to databases, fully hiding and securing them. It can be installed on the database server or on a dedicated server protecting multiple databases, on a virtual machine (VM) or on the application server. GreenSQL reviews every database query and response, making it the perfect tool to secure, accelerate and manage a company s database security regulations and policy. GreenSQL shields, secures, and accelerates multiple databases. GreenSQL is your front end to databases, fully hiding and securing them. About GreenSQL GreenSQL LTD, a private venture established in 2009, provides a Unified Database Security Solution to organizations seeking an all-in-one security solution for their databases. GreenSQL s mission is to help businesses of all sizes and sectors defend against known and unknown database attacks, accelerate database performance, protect their information assets, and demonstrate regulatory compliance. GreenSQL leads the world in installed database security solutions for MySQL and PostgreSQL databases. GreenSQL helps businesses secure their information assets and demonstrate regulatory compliance. GreenSQL #4 in Top Ten of Best of Show RSA Conference 2010 By Richard Stiennon, Founder and Chief Research Analyst at IT-Harvest

3 GreenSQL Solutions GreenSQL s solutions protect an organization s database systems, operations, assets, and revenue. GreenSQL Unified Database Security combines 4 key elements to provide best practice security and acceleration for databases. Security. Auditing. Caching. Masking. Security Database Firewall. Provides three policy options: Learning Mode Policy automatically created security policies Firewall Policy custom rules based on user-defined parameters, query or table based. Risk-Based IPS/IDS Policy realtime intrusion detection and prevention. Virtual Patching. Automatically protects against newly discovered database exploits. Separation of Duties. Enforces access control and separation of duties, where DBAs only administrate and users only access data. Auditing Database Activity Monitoring. Independently monitors and analyzes your database activity to alert about unauthorized activities. Using Advanced Auditing option, GreenSQL provides a full audit of all sensitive tables, including a before and after view of all changes and who made them. It helps companies demonstrate compliance with industry and government regulations, including Sarbanes-Oxley (SOX), the payment card industry data security standard (PCI DSS), the Gramm-Leach- Bliley Act (GLBA), and Basel II. Caching GreenSQL s patented smart caching solution dramatically increases database performance by automatically responding to SQL query behavior patterns and change frequencies of stored data. Caching policy can be determined per Proxy, Database, Table or Query to provide full control of caching behavior. Caching reduces bandwidth consumption, increases hit ratio, and improves overall database efficiency. Masking GreenSQL s masking feature enables you to mask sensitive information from non-privileged users. GreenSQL Solution provides a real-time masking and ensures that database users are exposed only to approved information. Masked data is generated in real time and is not stored on the database, thereby preserving data integrity.

4 GreenSQL Management Benefits Web-based Interface GreenSQL s web-based GUI console simplifies database security set-up and configuration. The GUI provides an intuitive system dashboard that enables you to deploy database security very easily and quickly. Supports Multiple Database Servers With a single GreenSQL installation, you can protect multiple databases from a variety of vendors. For example, you can configure protection for MySQL, SQL Server and PostgreSQL databases using a single GreenSQL installation. High Availability When continuity is crucial for your organization, GreenSQL can be configured as a high availability solution using two GreenSQL installations. One acts as Master and one as Slave, in active or passive mode respectively. To the network, this GreenSQL cluster appears to be a single GreenSQL installation, processing SQL traffic and providing Unified Database Security (UDS) services. Administrative Profile Each GreenSQL administrator account belongs to an administrative profile. The profile divides GreenSQL s features into access control categories to which you can grant List, View, Create, Edit or Delete access. Each GreenSQL administrator can have a unique profile with limited GreenSQL access. GreenSQL SOC Integration GreenSQL can send log events via syslog to any centralized NOC, SIM or SOC solution.

5 GreenSQL Product Portfolio The comprehensive GreenSQL product family of Unified Database Security solutions is appropriate for organizations of any size, from small businesses to enterprise-level corporations. GreenSQL is delivered with an intuitive, easy to-use, web-based management console. GreenSQL EXPRESS Free tool to provide basic security for one database server GreenSQL STANDARD Advanced security and caching package GreenSQL PRO Advanced security, caching and auditing package GreenSQL ENTERPRISE Advanced security, caching, auditing, masking and High Availability Features EXPRESS STANDARD PRO ENTERPRISE Proxies Included * 1 2 2 5 Basic Database Security ** Advanced Database Security Database Caching Advanced Auditing Database Masking High Availabilty * Additional Proxies can be purchased ** Basic Database Security does not include virtual patching, user rights management, or database activity monitoring. GreenSQL Unified Database Security solutions are appropriate for organizations of any size, from small businesses to enterprise-level corporations. Key GreenSQL Benefits Supplies advanced database security, caching, auditing and masking in a single integrated solution Hides sensitive data such as credit cards or social security numbers Helps to comply with governmental regulations (PCI, SOX, HIPAA, Basel II) Enables auditing and masking policy per column Provides a friendly, easy-to-use interface Accelerates database performance Facilitates full separation of duties Delivers protection in minutes OPERATING SYSTEMS SUPPORTED BY GREENSQL Windows Windows Server 2008 / 2003 Linux Ubuntu / CentOS / Debian DATABASE APPLICATIONS SUPPORTED BY GREENSQL Oracle MySQL Microsoft SQL Server PostgreSQL