McAfee Database Security. Dan Sarel, VP Database Security Products



Similar documents
The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

Not All Database Security Solutions Are Created Equal

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Practical Guide to Database Security & Compliance

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

Database Security & Auditing

Vulnerability Management

Complete Database Security. Thomas Kyte

How To Buy Nitro Security

Hedgehog: Host-Based Database Activity Monitoring & Prevention

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

IT Security & Compliance. On Time. On Budget. On Demand.

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

1 Introduction Product Description Strengths and Challenges Copyright... 5

White Paper. Managing Risk to Sensitive Data with SecureSphere

McAfee Database Activity Monitoring 5.0.0

Guardium Change Auditing System (CAS)

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Real-Time Database Protection and. Overview IBM Corporation

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Integrated Threat & Security Management.

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

PCI DSS Overview and Solutions. Anwar McEntee

Protecting Sensitive Data Reducing Risk with Oracle Database Security

8 Steps to Holistic Database Security

Extreme Networks Security Analytics G2 Vulnerability Manager

<Insert Picture Here> Oracle Database Security Overview

Application Security Center overview

Auditing Data Access Without Bringing Your Database To Its Knees

Securing Data in Oracle Database 12c

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Managing Privileged Identities in the Cloud. How Privileged Identity Management Evolved to a Service Platform

Uncover security risks on your enterprise network

The Value of Vulnerability Management*

Breaking down silos of protection: An integrated approach to managing application security

Securing SharePoint 101. Rob Rachwald Imperva

Database Security and Auditing: Leading Practices. Rob Barnes Director, Enterprise Auditing Solutions Application Security, Inc.

Database Auditing: Best Practices. Rob Barnes, CISA Director of Security, Risk and Compliance Operations

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Secret Server Qualys Integration Guide

Total Protection for Compliance: Unified IT Policy Auditing

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Preemptive security solutions for healthcare

Securely maintaining sensitive financial and

Avoiding the Top 5 Vulnerability Management Mistakes

Data Security: Strategy and Tactics for Success

Review: McAfee Vulnerability Manager

Worldwide Trends in Database Threats and Database Security

IBM Security QRadar Vulnerability Manager

eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life

Privileged User Monitoring for SOX Compliance

HP Application Security Center

TRIPWIRE NERC SOLUTION SUITE

Enterprise Security Solutions

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

VULNERABILITY MANAGEMENT

Enterprise Database Security & Monitoring: Guardium Overview

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Network Security and Vulnerability Assessment Solutions

Cloud and Data Center Security

INTRODUCING isheriff CLOUD SECURITY

IBM InfoSphere Guardium Vulnerability Assessment

IBM InfoSphere Guardium Vulnerability Assessment

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Trend Micro. Advanced Security Built for the Cloud

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

External Penetration Assessment and Database Access Review

VULNERABILITY & COMPLIANCE MANAGEMENT SYSTEM

Making Database Security an IT Security Priority

locuz.com Professional Services Security Audit Services

Continuous Network Monitoring

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

SANS Top 20 Critical Controls for Effective Cyber Defense

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Virtualization Impact on Compliance and Audit

ARE YOU REALLY PCI DSS COMPLIANT? Case Studies of PCI DSS Failure! Jeff Foresman, PCI-QSA, CISSP Partner PONDURANCE

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

White Paper The Dynamic Nature of Virtualization Security

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

THE FIRST UNIFIED DATABASE SECURITY SOLUTION. Product Overview Security. Auditing. Caching. Masking.

Devising a Server Protection Strategy with Trend Micro

Bringing Continuous Security to the Global Enterprise

2012 North American Managed Security Service Providers Growth Leadership Award

A Practical Guide to Database Security

MySQL Security: Best Practices

Transcription:

McAfee Database Security Dan Sarel, VP Database Security Products

Agenda Databases why are they so frail and why most customers Do very little about it? Databases more about the security problem Introducing McAfee s Database Security Products Product demo if time permits

Database Security and the Enterprise Databases power the largest applications in the world Customers store their most critical and sensitive data in databases, any loss, interruption, or breach could be disastrous Any vulnerability, misconfiguration or exploitation means non-compliance to audits (HIPAA, SOX, PCI, etc.)

Enterprises are Focusing on Database Security Spending on database security tops the list at 93% 92% of records breached involved databases 50% of breaches attributed to internal users

What's the Problem? Database administrators like to create a locked-down gold configuration Proper configuration of databases from a security perspective is extremely complex Concerned with the impact of database security on performance degradation or instability Updating, even to apply security patches, is a carefully controlled process, requiring extensive testing Basic security tools from database management system (DBMS) vendors don t cover their needs Most organizations have multiple DBMS vendors Lack segregation of duties Easily bypassed and NO prevention

The Challenge Your Most Valuable Data is in Databases Customer Records and PII Credit card numbers, account numbers, billing data, authentication data Employee Information SSNs, salary, reviews Financial Data & IP Revenue, receivables, research

A Never Ending Stream Of Breaches

Why All These Breaches? Organizations have VERY little visibility into the security posture of their databases And often can t keep DB current with the latest vendor patches And have no way to know in REAL-TIME (let alone PREVENT) unauthorized access, including by privileged users Databases are a blind spot from a data security perspective

The Reality Is Database servers are involved in 25% of all breaches Database breaches account for 92% of all records breached # of Breaches # of Records Sophisticated attacks make up 15% of all attacks Sophisticated attacks account for 87% of all records breached DB # of Breaches Other # of Records - Source: Verizon Business Study 2010 High Low/Mod

Announcing, the acquisition of Sentrigo! McAfee broadens its Database Security solutions with the acquisition of Sentrigo Database Activity Monitoring, Vulnerability Management, and Virtual Patching Proven technology, strong differentiation Scalable from SMB to largest global enterprise Compatible with existing Risk and Compliance portfolio

Sentrigo Background Patent-pending innovator in database security Solutions for vulnerability assessment, activity monitoring, breach prevention and compliance Red Team conducts independent database security research: Discovers vulnerabilities in DBMS systems, and delivers virtual patches Credited by Oracle in 7 of last 10 patches Works with leading researchers around the globe

McAfee Database Security Product Name 1 McAfee Vulnerability Manager for Databases Description Extends VA capabilities to databases with over 3,800 checks for Oracle, SQL Server, IBBM DB2, Sybase, MySQL and PostgreSQL 2 McAfee Database Activity Monitoring Introduces Change Prevention and Policy Enforcement capabilities to Databases, similar to what Solidcore provides on Servers vpatch module protects unpatched Databases against known threats, and all databases from common hacker techniques 3 McAfee Integrity Monitor for Databases Provides basic DB Scanning and Audit capabilities to meet compliance

New Products (August 2011) McAfee Database Security Scanner McAfee Database vpatch McAfee User IDentifier

McAfee Vulnerability Manager for Databases VULNERABILITY ASSESSMENT

Best-in-class Vulnerability Assessment for DBs Built on deep real-world security knowledge Developed with the top authorities on database protection Not simply based on DBMS vendors' "security guidelines" Provide practical remedy advice / solutions Test and report on real issues (vs. lengthy unreadable reports) Prioritized results include fix scripts and expert recommendations Enterprise Ready Automated discovery of databases and sensitive information Centralized reporting for up to thousands of DBs Create different roles / outputs for various stakeholders (DBAs, developers, IT Security) Easy automation & integration

About Vulnerability Manager for Databases Over 4,000 vulnerability checks Patch levels Weak passwords Sensitive data discovery (PII, SSN, etc) Configuration base lining Vulnerable PL/SQL code Backdoor detection, rootkits Unused features Custom checks

McAfee Database Activity Monitoring TRUSTED AUDIT AND REAL- TIME INTRUSION PREVENTION

Fundamental Principles Protection from the Inside Out More effective More efficient Better fit with today s IT environment Lower Cost and Complexity of Implementation Software-only solution Easy to download, evaluate, and buy Fastest Time-to-Compliance

Listener Bequeath Full Coverage of All Accesses Databases can be accessed from three sources: 1) From the network 2) From the host 3) From within the database (Intra-DB) intra-db threats DB Admins Sys Admins Programmers Local Connection DBMS Stored Proc. Shared Intra- Memory Trigger SAP Network Connection Data View

Reaction in Real-time Memory-based, Read-only Sensor is Close Enough to Intervene in Response to Threats Alerting via dashboard or other tools Session termination (via Native DB APIs) User quarantine Firewall update

Segregation of Duties and Audit Trail Database Administrators (DBA) and compliance team define policy System Administrators install sensors InfoSec monitors alerts and sensor status

McAfee DAM: Enterprise Deployment Cloud Network DB Alerts / Events epo McAfee Database Security Server (software) Sensor Sensor Sensor DB DBDBDB DB DB DB Web-based Admin Console

Database Dashboard

Unpatched Databases = HUGE Risk Zero Day Reported Vulnerability Patch Issued Patch Installed High Low Months/Years Months/Years Exploits published on the web Often do not require DBA-level skill and automated tools now available Risk highest after patch is issued Risk window is months long, sometimes years

Why Virtual Patching? Applying DBMS security patches is painful: Requires extensive testing and db downtime Often results in business disruption Sometimes it's near impossible: 24/7/365 operations (one maintenance window per year) Heavily customized applications DBMS versions that are no longer supported by vendor (e.g. 8i) Resources are limited Solution: Virtual Patching Protects against known and zero-day vulnerabilities without any downtime or code changes until you can patch

DEMONSTRATION

Key Differentiators Single, easy-to-deploy solution sees ALL threats Only solution to see real objects and intra-db attacks Non-intrusive, with no special effort (pre-load, etc.) Distributed architecture with autonomous sensors Only solution to work well for virtualization / cloud Real-time termination, and Virtual Patching Without being inline, and a single click Fastest deployment, lowest TCO Only solution to scale from SMB global enterprise Dedicated research team & strong ties to independents New vpatches in 24-48 hours, often before the vendors Commercially Classified

Our channel Sentrigo sold only via channel in EMEA Easy evaluations (download -> test) for both large and small organizations Scalable product and scalable pricing No/Low touch sales for medium businesses Various services can be offered with products: Risk assessment Database Penetration Testing Compliance projects (PCI-DSS, Privacy laws, SOX ) Database Security Policy concept and application

Thank You! QUESTIONS???

Next Steps Contact us with questions Dan_sarel@mcafee.com Trial software: www.mcafee.com/producttrials Visit the new Database Security Page on McAfee.com http://www.mcafee.com/dbsecurity Lots of great resources Risk & Compliance Survey Whitepaper on Database Hardening Solution Brief on Database Security Archive of April Hacking Exposed Webcast