Not All Database Security Solutions Are Created Equal

Similar documents
McAfee Database Security. Dan Sarel, VP Database Security Products

Database Security in Virtualization and Cloud Computing Environments

How To Buy Nitro Security

Technology Blueprint. Secure Your Virtual Desktop Infrastructure. Optimize your virtual desktop infrastructure for performance and protection

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

McAfee Global Threat Intelligence File Reputation Service. Best Practices Guide for McAfee VirusScan Enterprise Software

McAfee Server Security

McAfee Security Architectures for the Public Sector

Safeguarding the cloud with IBM Dynamic Cloud Security

Total Protection for Compliance: Unified IT Policy Auditing

Application Monitoring for SAP

Database Security, Virtualization and Cloud Computing

Technology Blueprint. Protect Your . Get strong security despite increasing volumes, threats, and green requirements

Securely maintaining sensitive financial and

When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.

Real-Time Database Protection and. Overview IBM Corporation

GOOD PRACTICE GUIDE 13 (GPG13)

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Guardium Change Auditing System (CAS)

How To Protect Your Cloud From Attack

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

IBM Security IBM Corporation IBM Corporation

Enterprise Security Solutions

McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

White Paper. Network Management and Operational Efficiency

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

White Paper. What Auditors Want Database Auditing. 5 Key Questions Auditors Ask During a Database Compliance Audit

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

Securing and protecting the organization s most sensitive data

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

IBM InfoSphere Guardium Data Activity Monitor for Hadoop-based systems

IBM Software InfoSphere Guardium. Planning a data security and auditing deployment for Hadoop

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Modern IT Operations Management. Why a New Approach is Required, and How Boundary Delivers

Power, Patch, and Endpoint Managers Expand McAfee epo Platform Capabilities While Cutting Endpoint Costs

Technology Blueprint. Protect Your VoIP/SIP Servers. Insulating your voice network and its servers from attacks and disruption

McAfee Certified Product Specialist McAfee epolicy Orchestrator

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Reference Architecture: Enterprise Security For The Cloud

IBM PowerSC. Security and compliance solution designed to protect virtualized datacenters. Highlights. IBM Systems and Technology Data Sheet

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

Top 10 Reasons Enterprises are Moving Security to the Cloud

V1.4. Spambrella Continuity SaaS. August 2

An Oracle White Paper January Oracle Database Firewall

Implementing Sarbanes-Oxley Audit Requirements WHITE PAPER

The Benefits of an Integrated Approach to Security in the Cloud

Breaking down silos of protection: An integrated approach to managing application security

Securing the Internet of Things OEM capabilities assure trust, integrity, accountability, and privacy.

How To Secure Your System From Cyber Attacks

IBM QRadar Security Intelligence April 2013

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

IBM Security QRadar Risk Manager

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

IBM PowerSC. Security and compliance solution designed to protect virtualised data centres. Highlights. IBM Systems and Technology Data Sheet

SANS Top 20 Critical Controls for Effective Cyber Defense

Boosting enterprise security with integrated log management

An Oracle White Paper June Oracle Database Firewall 5.0 Sizing Best Practices

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

An Oracle White Paper January Oracle Database Firewall

Solutions Brochure. Security that. Security Connected for Financial Services

On-Premises DDoS Mitigation for the Enterprise

End-user Security Analytics Strengthens Protection with ArcSight

End Your Data Center Logging Chaos with VMware vcenter Log Insight

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012

IPLocks Vulnerability Assessment: A Database Assessment Solution

How To Use Ibm Tivoli Monitoring Software

Technology Blueprint. Protect Your Servers. Preserve uptime by blocking attacks and unauthorized changes

Trend Micro. Advanced Security Built for the Cloud

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

Tivoli Security Information and Event Manager V1.0

Preemptive security solutions for healthcare

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

The Advantages of Security as a Service versus On-Premise Security

Achieve Deeper Network Security

Vulnerability Management

AN OVERVIEW OF VULNERABILITY SCANNERS

How To Monitor Your Entire It Environment

McAfee epolicy Orchestrator

IBM Software Top tips for securing big data environments

ORACLE ENTERPRISE MANAGER 10 g CONFIGURATION MANAGEMENT PACK FOR ORACLE DATABASE

Cloud and Data Center Security

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

IBM Security QRadar Risk Manager

Transcription:

Solution Brief Not All Database s Are Created Equal Compare solutions from different vendors Databases: The Top Regulatory Compliance Challenge In January 2012, Evalueserve surveyed 438 IT decision makers, administrators, consultants, and security analysts worldwide. Respondents listed databases as their most challenging regulatory compliance area. Databases are the leading IT security blind spot In April 2012, Verizon Business released its annual data breach survey (covering more than 800 security breaches), which found that database breaches accounted for 95% of all records breached. We were able to get more value out of McAfee s DB [McAfee database] security product in two weeks than we got from our older DAM product in over a year. Director of IT Security Financial services company Databases are the number one target of cybercriminals and disgruntled insiders. With the recent rash of breaches, you may have already realized that traditional perimeter and network security, as well as built-in database security measures, offer only very limited protection when it comes to securing the organization s most sensitive data, which is often stored in databases. That s why compliance officers as well as auditors are taking a much closer look at database security and compliance. It is also why four main database security vendors have entered the market. This document highlights key database security capabilities and provides an objective, apples-to-apples comparison of the leading database security solutions. What Your Database Should Do Protect all your databases across all threat vectors in real time Partial protection or after-the-fact notifications are of little value if your database has already been compromised. Make certain that you protect all doors and windows (not only what the vendor can support) and that you receive real-time, actionable insights. Establish and verify a security baseline across all your databases Does the solution provide comprehensive vulnerability detection that spans all your database platforms? How often is the scan list updated by the vendor in response to new threats? Is the scan library based on a theoretical framework (for example, database vendor recommendations and industry guidelines), or is it based on real-world security knowhow? Can it integrate with your organization s current IT security landscape: security information event management (SIEM), McAfee epolicy Orchestrator (McAfee epo ) software, and database administration management (DAM) system? Provide detailed reporting and continuous compliance The ability to quickly validate and document compliance will become even more important going forward. Integrated compliance reporting through a central management platform is a must. Easily deploy across complex and heterogeneous IT environments (including virtual and cloud) Today s databases are a hybrid combination of dedicated and virtualized environments that span multiple platforms. Your database security solution must protect all of them. Quickly and easily scale to meet your growth and performance needs How quickly can the solution be deployed? What resources are required to deploy and manage it? Does the solution require hardware appliances? If so, how many must be added, and how will they be managed? What are the maintenance implications? Help ensure segregation of duties for privileged users SOX, PCI-DSS, HITECH, and numerous global privacy regulations now require that your organization enforce and monitor segregation of duty access to sensitive databases.

What Your Database Should Not Do Create an additional security management silo Who has time to learn and manage multiple point products or manually sort through database log files? Disjointed security products that lack an integrated security management console result in time-consuming, reactive, and ineffective database protection and often involve lengthy deployment and configuration. Time-consuming, resource-intensive, and operationally disruptive deployment and integration engagements delay protection and may result in ongoing maintenance commitments. Degrade application/database performance A database security solution cannot slow down businesscritical database services. Solutions that force you to compromise and disable certain features so as to reduce the database performance impact or reduce your network load can be counterproductive. Require substantial time and effort for setup and management This especially a problem if this occurs on an ongoing basis. Based on a business-model that is complex Such solutions can be difficult to track and control, may introduce risk of future licensing surprises (for example, they cannot be properly scoped upfront), may require a repurchase of the solution every few years (for example, appliance hardware refresh cycle), and could open you up to potential enforcement and litigation risks. How s Stack Up Against the Competition Take a closer look at the key functional capabilities you need and how the Security solution compares to the competition in each of the following areas. Database vulnerability management Most vulnerability assessment products aren t comprehensive and intelligent enough to thoroughly test database systems, putting your most sensitive and valuable data at risk. Compulsory for any database security solution is the ability to discover any and all databases on your network, identify the ones that contain sensitive data (credit card numbers, Social Security numbers, and passwords), determine if the latest patches have been applied, and perform an extensive (and regularly updated) comprehensive testing to identify security weaknesses. Used properly, a database vulnerability management solution can help you establish a security baseline across a large number of sensitive databases and periodically monitor databases to highlight any drifts from the approved baseline. Vulnerability Testing Vulnerability Testing Number of Vulnerability Tests Frequency of Scan Library Update Fast Weak Password Scanner McAfee epo Software Integration 1,000 vulnerability tests, mostly based on vendor recommendations and industry standards. SecureSphere DAM 2,000 vulnerability tests, mostly based on vendor recommendations and industry standards. AppDetective Pro/DB Protect 2,000 vulnerability tests. 4,700 vulnerability tests and checks (including CIS and STIG scans). Infrequently Infrequently A few times a year. Every four weeks on average. Slow Slow Slow Very fast scanning algorithm (more than one million combinations per second). No No No Yes It improves visibility and automates management, vulnerability analysis, and reporting in a single console.

Database activity monitoring (DAM) Perimeter and network protection measures and basic security measures built into databases do not provide adequate security to sensitive databases. They don t protect you from today s sophisticated hackers and malicious insiders. An effective database activity monitoring solution must be easy to manage and provide comprehensive protection against modern threats and be able to not only alert, but also stop attacks before they can cause damage. Database Performance Impact of Activity Monitoring Your database and the networks that provide access to them must remain available and responsive. In addition, you need a database security solution that can provide real-time, actionable insights, not just after-the-fact forensics. The Security solution provides a clear competitive advantage in these areas: Performance Performance Autonomous Agents (minimize network traffic and server I/O consumption) Frequency of Scan Library Update Agent Architecture No Sensors must send traffic over the network to a collector appliance for analysis, increasing both server and network load. Agents cache traffic to local disk consuming server I/O and impacting database performance. Blocking requires proxy agents (S-Gate) that introduce latency. Disruptive Requires database/ server shutdown for initial installation and subsequent agent upgrades. Intrusive Agents operate at the kernel level and can affect database and server performance. Blocking agents (S-Gate) installed as proxies introducing latency. SecureSphere No Database host agents must send traffic over the network to the SecureSphere appliance(s) for analysis, increasing network load. Requires database/server shutdown for initial installation and subsequent agent upgrades. Intrusive Agents operate at the kernel level and can affect database and server performance. No Database host agents must send traffic over the network to the SecureSphere appliance(s) for analysis, increasing network load. Requires database/server shutdown for initial installation and subsequent agent upgrades. Intrusive Agents operate at the kernel level and can affect database and server performance. Yes Minimal performance impact: is less than 5% of a single host core CPU per monitored instance, less than 100 MB of RAM. No I/O consumption. Sensors do not introduce latency. Transparent Agent installation and subsequent upgrade doesnot involve server or database shutdown. Non-intrusive Sensors not installed at the kernel level and therefore cannot interfere with database/server performance.

Database Activity Monitoring Implementation and Capabilities Database Activity Monitoring Underlying Monitoring Technology Autonomous versus Console-Dependent Analysis and Blocking Smart, Comprehensive Agent Technology User-Based Application Monitoring for Multitier Environments Monitors at the Database Object Level and Obfuscated Payloads IBM InfoSphere Guardium SQL sniffing via network appliances and/or local host forwarding agents. Limited visibility and easy to evade (relies only on the actual. Dependent Databaseserver agent(s) forward all database traffic back to one or more appliances (collectors) for actual analysis. Requires management appliance to aggregate and manage the collectors. No Intrusive (kernellevel) agents that forward database traffic to an external collector for analysis. Caches traffic to local disk (degrading database performance). S-Gate (blocking) agents act as proxies, delaying transaction execution. Lacks visibility into intra-database activity (dynamic stored procedures, triggers, views, obfuscated payloads, and more). Database and host crashes and restarts are not uncommon. Yes SecureSphere DAM SQL sniffing via network appliances and local host forwarding agents. Limited visibility and easy to evade (relies only on the actual. Dependent Appliance monitors network traffic (requires SPAN/TAP port), and database-server agent(s) forward(s) all local database traffic back to the network appliance(s) for analysis. No Kernel-based agent involves DBMS instrumentation and degrades performance. Agent monitors only the local host traffic but doesn t provide visibility into intra-database activity. Partial Based on correlating event information from WAF logs and DAM logs. Accuracy of matching is not guaranteed and deteriorates rapidly as traffic volume grows. (formerly Secerno) SQL sniffing via network appliances and local host forwarding agents. Limited visibility and easy to evade (relies only on the actual. Dependent Appliances monitor network traffic (requires SPAN/TAP port), and database-server agent(s) forward(s) all local database traffic back to the network appliance(s) for analysis. DB-Protect SQL sniffing via forwarding agents. Limited visibility and easy to evade (relies only on the actual text of the SQL command). Dependent Database server agent(s) forward(s) all database traffic back to appliance(s) for analysis. Monitors by analyzing the database shared memory, providing much more visibility into threats (able to monitor transactions that originate inside the database itself and able to understand how the database interpreted obfuscated SQL payloads). Autonomous Softwareonly solution utilizes hostbased non-intrusive and lightweight autonomous agents (sensors) that monitor the database memory. The autonomous sensors perform the monitoring locally and do not need to forward the full database traffic to an external appliance for analysis. Only relevant events are forwarded to the management console. Sensors do not operate at the kernel level and do not cache traffic to the server hard disk. No No Yes Intelligent, autonomous agent monitors database memory and provides full visibility into all database activity, including transactions originating from inside the database itself (intra-database traffic). This read-only process at the operating system level does not require any database or host downtime, generate any latency, or consume any input/output. No No Yes (accurate) McAfee identifier module captures end-user identity with 100% accuracy regardless of traffic volume, providing full visibility and reporting into who is doing what in the database. Yes McAfee memorybased sensors can see the actual database object being accessed (even if it is not mentioned in the SQL command text). Allows seamless monitoring of all database traffic, including obfuscated payloads (which are visible to the sensor in the clear in the database memory).

Database Activity Monitoring Implementation and Capabilities Database Activity Monitoring Effective Prevention of Unauthorized Local Transactions Establishes Segregation of Duties IBM InfoSphere Guardium Partial (very intrusive and rarely used) Can miss malicious or unauthorized activity as SQL traffic is sent back to the management appliance for analysis. By the time a statement is defined as rogue, it is too late to be blocked. Additionally, blocking requires use of a different agent (S-GATE), which acts as a proxy, adding latency and consuming I/O (caches traffic to disk). It can be easily bypassed by accessing the original database port. SecureSphere DAM Partial Network blocking only (no local host traffic blocking). Network appliance must be in-line to block network threats, introducing a single point of failure in the critical path. Agents cannot block local traffic at all. (formerly Secerno) Partial Network blocking only (no local host traffic blocking). Network appliance must be in-line to block network threats, introducing a single point of failure in the critical path. Agents cannot block local traffic at all. DB-Protect No Yes McAfee can effectively block many types of malicious or unauthorized activity in real time. Because the sensor monitors transactions in memory, operates autonomously and resides on the host system, it can intervene and terminate connections immediately. Yes Database memory monitoring technology sees all database transactions, including access originating inside the databases. Able to detect the actual objects accessed by the database and monitor obfuscated SQL payloads (which are monitored in the clear in the database memory). Establishes strict separation of duties. Script signing No No No No Yes The ability to digitally sign database scripts ensures that they are not modified prior to execution (patent pending). Ability to identify SUDU users No No No No Yes Ease of use and deployment Complex security products require more training and additional consulting and integration costs, which should be taken into account when calculating the total cost of ownership of a solution. What s more, their complexity often results in partial use of product features, resulting in reduced database protection. Solutions that generate too much data or hard-to-decipher security data in unusable formats complicate the database security challenge.

Ease of Deployment and Use Ease of Deployment and Use Easy to Install Agents Installation and Upgrade Process Flexible Deployment in Different Network Topologies/ Distributed Environments Effective in Cloud and Virtualized Environments McAfee epo Software Integration No Routinely requires weeks of professional services to deploy and configure. Intrusive Often requires database/server restart. No Requires one or more collector appliances per location. No All traffic must be sent to central server for evaluation; dynamic infrastructures create out-of-date configurations. SecureSphere No Routinely requires weeks of professional services to deploy and configure. Intrusive Often requires database/server restart. No Routinely requires weeks of professional services to deploy and configure. Intrusive Often requires database/server restart. Security Solution Yes Software-only solution, easy to install and configure. Does not require network setup changes, SPAN/TAP port provisioning. Simple installations completed in hours. Non-intrusive Installation and upgrades of the sensors do not require any database or server restart. Yes Yes Yes Software only and network agnostic. Topology doesn t impact ease of use or management. Smart sensors run in memory on each database. Thousands of sensors monitoring databases in multiple geographies can all be managed from a single MDAM management console. No All traffic must be sent to central server for evaluation; dynamic infrastructures create out-of-date configurations. No Some tools (such as database firewall) require appliance installation. No No No Yes Yes Sensor-based architecture performs perfectly in distributed models, including virtual machines and cloud-based architectures. Business Model Differences Ease of Deployment and Use Total Cost of Ownership Simple, Predictable, and Scalable Business Model Appliance-based model requires costly appliance upgrades every three to five years. Large/complex environments require many appliances (collectors). No Complex model (PVU is dependent on CPU core count and CPU model factors and hundreds of SKUs). High risk of inadvertent licensing compliance violations due to routine server upgrades. Dozens of modules sold as add-ons at extra cost. SecureSphere Appliance-based model requires costly appliance upgrades every three to five years. Large/ complex environments require many appliances (collectors). Requires TAP/SPAN ports, which might entail additional hardware costs. Appliances may require unexpected costly upgrades once traffic volume exceeds the appliance rated capacity. No Traffic volume-based business model, often leads to additional unexpected license costs as database traffic volume grows. Database traffic blocking sold as an add-on to the basic monitoring capability. Appliance-based model requires costly appliance upgrades every three to five years. Large/complex environments require many appliances (collectors). Requires TAP/SPAN ports, which might entail additional hardware costs. Appliances might require costly upgrades once traffic volume exceeds the appliance rated capacity. No Traffic volume-based business model often leads to additional unexpected license costs as database traffic volume grows. Security Solution No appliances, no hardware upgrade cycle. Simple deployment reduces total cost of ownership. No additional costs as database traffic grows. No additional costs associated with TAP/SPAN ports (not required). Yes Simple and scalable model based on the number of database instances monitored. No additional costs. Most functionality is included out-ofthe-box and does not require additional licensing. For more information on the unique and powerful McAfee approach to helping you secure your business-critical databases, visit www.mcafee.com/dbsecurity. Follow us on Twitter: @McAfeeBusiness. 2821 Mission College Boulevard Santa Clara, CA 95054 888 847 8766 www.mcafee.com McAfee, the McAfee logo, epolicy Orchestrator, and McAfee epo are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other marks and brands may be claimed as the property of others. The product plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied. Copyright 2013 McAfee, Inc. 60597brf_db-sec-soln_1013_fnl_ETMG