Database Security Pitch Deck v01
Database Security Pitch Deck v01
Security
PITCH DECK
If data is the new gold, databases are
the gold mines.
Evolving risks and increasingly complex regulations
3
What are typical challenges in protecting databases
You need a highly specialized database security tool to protect your most valuable asset - data
4
DbProtect and AppDetectivePRO address your database security needs
Characteristic:
5
Trustwave DbProtect
Where are you now?
Do you know where your most What are you doing to protect What improvements are needed
sensitive data is within your this sensitive data? to improve the security maturity
databases? of your databases?
7
What our clients ask for to protect their databases
8
7x
More in-depth database security checks
12
Annual knowledgebase updates
Continuous database assessment and protection
Manage sensitive data risk exposure to protect your crown jewels from unauthorized access
§ Discover database specific vulnerabilities § Understand who really are your privileged § Detect anomalies like exfiltration based on
and security gaps users data access behavioral models
§ Provide intelligence on how to fix findings § Get visibility to all database access rights § Customize monitoring policies for your
and harden your databases with insight including who can touch sensitive data riskiest data and users
from our SpiderLabs® dedicated
database research team § Implement least privilege to control § Gain threat hunting insight to database
unnecessary access indicators of attack
§ Reduce attack surface directly at the
source
10
Support for 90%+ of enterprise structured databases
On-premise &
Public Cloud
11
Recognized database security leadership
1 Million+
databases protected in
public and private sector
Recognized
As the only database security solution to have meaningful impact in reducing
cyber risk by top global cyber insurers in the Cyber CatalystSM by Marsh program.
250+
Researchers focused on
detecting unknown threats
and providing you clear
guidance on how to harden
your database security
12
Proven database security approach
Eliminate Vulnerabilities 7
Harden database security 4
through remediation and 3 Customized Monitoring
continuously re-test to mature
6
for Anomalies
security posture Continuous assessment led monitoring
Continuous Continuous of suspicious activity based on data
Assessment Protection driven behavioral analytics
Continuously Test 2
Scan for misconfigurations, 1 5
vulnerabilities, and user access issues
with SpiderLabs® intelligence Help Enforce Least Privilege
Detailed Minimize access to the most sensitive
Database Inventory data and support Zero Trust principles
Discover known, unknown, or rogue
databases and sensitive data
13
Trustwave Vulnerability Management
You can’t protect what you don’t know you have
Know where your riskiest data resides so you can prioritize protection of what matters most
Vulnerability Assessment
15
Test with the most complete database assessment
Scan databases with confidence knowing you have 7x more in-depth security checks
2. Continuously Test
Vulnerability Assessment
16
You don’t need to be a database expert to remediate
Rely on Trustwave SpiderLabs® intelligence on how to fix findings and reduce your risk
3. Eliminate Vulnerabilities
Vulnerability Assessment
17
Trustwave Right Management
Your privileged user is not always your DBA
Know who has access to your sensitive data
Rights Management
20
Take action to reduce potential data exfiltration
Revoke access to sensitive data and shrink your risk of data exposure
Rights Management
21
Trustwave Activity Monitoring
Detect suspicious activity on what matters most
Intelligently monitor your databases with minimal performance impact
Continuous Monitoring
24
Maintain cyber resilience with intelligent response
Investigate and effectively respond to alerts to combat data exfiltration and misuse
7. Respond to Alerts
Continuous Monitoring
25
Even the best generalist security scanners are not sufficient to protect your most
important asset – data. You need a highly specialized database security tool
27
DbProtect is highly specialized database protection
Trustwave’s DbProtect goes beyond compliance and provides database security standard vulnerability tools can’t
7x more database specific compliance and Focused database specific threat remediation Integrated database security with Trustwave’s
security checks – we go deep into database guidance so your team knows what and how to portfolio of endpoint, application, e-mail, network,
checks, not broad and shallow like vulnerability remediate threats pen testing and other cybersecurity solutions
assessment tools
Clear insight into who has access and how to Intelligent database monitoring based on
Deep Expertise SpiderLabs® database limit access rights so you can reduce risk to human and machine intelligence provides you
research team focused on database security to sensitive data anomaly detection, alerting to protect against
provide you clear guidance on how to remediate breach and data exfiltration
your weaknesses
Customizable monitoring rules are created
based on known vulnerabilities and access Validated against industry security frameworks
weaknesses and regulation standards like CIS, DISA-STIG,
FISMA, CCPA, CMMC, HIPAA, PCI, GDPR and
many more
28
Trustwave AppDetectivePRO
Where are you now?
We need a specialized We need protection from We need to independently We need to comply with
database scanning tool unauthorized data access validate database security specific regulations
controls
We need a tool specializing in We need to look deeper at We need a tool for our own team We need to comply with
database scanning to provide database level access to ensure to audit the security controls we regulations such as SOX,
visibility into database security protection of sensitive data. have internally defined and that requiring activity monitoring and
that we don’t get from our we will be externally tested other database security
network and application against to validate we are measures
scanners. adhering to corporate and
regulatory requirements.
31
With our specialized database security
and audit scanner, you can
100+
ensure proper database account Hours saved per database audit
access to sensitive data
12
Annual knowledgebase updates
validate database security
controls are properly implemented
Automate Database Security Audit & Assessment
Identify top database security Unravel the complex web of Leverage built-in best practices,
issues within minutes user privileges industry and compliance policies
§ Scan for misconfigurations, vulnerabilities, § Identify privileged users to limit risk § Gain independent analysis to validate risk
access control issues, and more posture and progress
§ Discover over-privileged access to
§ Utilize the most complete knowledgebase sensitive data to comply with data privacy § Achieve a deeper review of risk to data at
of database security checks maintained regulations the database level
by the Trustwave SpiderLabs® database
research team
33
Database Assessments approach with AppDetectivePRO
Process and benefits
Benefits of using 3. Leverage built-in standard compliance policies, or can be easily customized
AppDetectivePRO: 4. Quickly and easily perform evidence-based data access control reviews
5. Automated reporting with all the research built in and done for you
6. Control reviews allow for documentation of scan findings, making reporting a snap
7. Consistent, repeatable results
34
How Organizations are using AppDetectivePRO
Part of vulnerability scanning team Used to fulfill independent audit Used to assess the technology risk
tool kit used to complement objectives to ensure security of of systems during M&A or prior to
network and application scanning business systems joining domains
§ Get a deeper scan at the database level to § Automated and repeatable process for § Broaden assessment to identify risks at
surface risk not identified by other database audits using built-in or the database level
scanners customizable policies
§ Gain visibility to security risks with ad-hoc
§ Easy to use and portable to use in air- § Impartial validation of security controls database scanning as needed for projects
gapped networks without needing specialized resources
§ Extend assessment to database level in
application lifecycle management
35
Questions and Next Steps
Start Your Database Security Journey with DbProtect
37
Get started with AppDetectivePRO today
38