0% found this document useful (0 votes)
30 views35 pages

Database Security Pitch Deck v01

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views35 pages

Database Security Pitch Deck v01

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Database

Security
PITCH DECK
If data is the new gold, databases are
the gold mines.
Evolving risks and increasingly complex regulations

More sensitive data Cloud storage increases Data is the Regulation


moving to the cloud attack surface end target proliferation

Digital transformations No longer know where Data breaches will Regulations,


increasing need for data is continue to grow in size complexity and costs
cloud security and velocity rising

3
What are typical challenges in protecting databases

Manage Risk Strengthen Security Posture Protect Sensitive Data


Provide deeper insights into Understand how to go beyond Provide deeper context on possible
vulnerabilities and threats to compliance to security data breaches on-premise and in the
structured databases cloud
Provide intelligence to understand and
Provide visibility to the riskiest data in remediate vulnerabilities quickly Understand type of data and
my databases sensitivity

Protect data by preventing


unauthorized access and exfiltration

You need a highly specialized database security tool to protect your most valuable asset - data

4
DbProtect and AppDetectivePRO address your database security needs

Characteristic:

Typical Customer Profile Enterprise IT Internal & External Auditors

Vulnerability Management Vulnerability Management


Solution Offering Rights Management Rights Management
Activity Monitoring

Scalability Enterprise Desktop

Automation Continuous automated security Ad hoc Point in-time scanning

5
Trustwave DbProtect
Where are you now?

Do you know where your most What are you doing to protect What improvements are needed
sensitive data is within your this sensitive data? to improve the security maturity
databases? of your databases?

7
What our clients ask for to protect their databases

Manage Risk Strengthen Security Protect Sensitive Data Integrate without


Posture Disruption
Provide deeper insights into Provide deeper context
vulnerabilities and threats Going beyond compliance when investigating if a Protect databases with little
to structured databases requirements to be security possible data breach impact on performance
focused occurred in on-premise and
Provide visibility to the cloud data stores Provide a licensing model
riskiest data Provide intelligence to that doesn’t increase as
understand and remediate What type of data exists, databases grow
vulnerabilities so security what is sensitive and
team does not need to be protect it by preventing Integrate database security
database experts unauthorized access and with 3rd party security tools
exfiltration

8
7x
More in-depth database security checks

With our purpose-built database risk 100+


Hours saved per database audit
management offering you can

proactively mitigate data risk,


80%
Up to savings in TCO

harden your databases against attack 0


Proprietary appliances

respond intelligently to anomalous activity


0
Price increase with vertical scaling

12
Annual knowledgebase updates
Continuous database assessment and protection
Manage sensitive data risk exposure to protect your crown jewels from unauthorized access

Identify and Remediate Assess and Control Monitor and Respond


Security Weaknesses User Privileges to Database Activity

§ Discover database specific vulnerabilities § Understand who really are your privileged § Detect anomalies like exfiltration based on
and security gaps users data access behavioral models
§ Provide intelligence on how to fix findings § Get visibility to all database access rights § Customize monitoring policies for your
and harden your databases with insight including who can touch sensitive data riskiest data and users
from our SpiderLabs® dedicated
database research team § Implement least privilege to control § Gain threat hunting insight to database
unnecessary access indicators of attack
§ Reduce attack surface directly at the
source

10
Support for 90%+ of enterprise structured databases

On-premise &
Public Cloud

Support for database versions


up to 1 year after vendor end
of extended support date

11
Recognized database security leadership

1 Million+
databases protected in
public and private sector
Recognized
As the only database security solution to have meaningful impact in reducing
cyber risk by top global cyber insurers in the Cyber CatalystSM by Marsh program.
250+ ​

Researchers focused on
detecting unknown threats
and providing you clear
guidance on how to harden
your database security

12
Proven database security approach

Review User Entitlements Respond to Alerts


Analyze user privileges to ensure Alerts provide indication of trouble to
they match business needs enable an appropriate response plan

Eliminate Vulnerabilities 7
Harden database security 4
through remediation and 3 Customized Monitoring
continuously re-test to mature
6
for Anomalies
security posture Continuous assessment led monitoring
Continuous Continuous of suspicious activity based on data
Assessment Protection driven behavioral analytics

Continuously Test 2
Scan for misconfigurations, 1 5
vulnerabilities, and user access issues
with SpiderLabs® intelligence Help Enforce Least Privilege
Detailed Minimize access to the most sensitive
Database Inventory data and support Zero Trust principles
Discover known, unknown, or rogue
databases and sensitive data

Vulnerability Assessment Rights Management Continuous Monitoring

13
Trustwave Vulnerability Management
You can’t protect what you don’t know you have
Know where your riskiest data resides so you can prioritize protection of what matters most

1. Detailed Database Inventory

Know what databases you have and if they store


sensitive data, so you know the level of protection
that needs to be implemented
§ Import your known databases from your CMDB
§ Discover rogue and unknown databases
§ 3rd party applications installed databases that go unmanaged
§ Test databases spun up by developers
§ Classify your databases by sensitivity as not all databases store
critical data
Breakdown of asset inventory by database type

Vulnerability Assessment

15
Test with the most complete database assessment
Scan databases with confidence knowing you have 7x more in-depth security checks

2. Continuously Test

Assess your database security posture and go


beyond basic compliance checks provided by
general assessment products
§ Network based scanning with minimal impact on performance
§ Choose from over 50 policies (e.g., CIS, DISA-STIG, HIPAA)
or customize policies specific to your environment

Our dedicated Trustwave SpiderLabs® database


research team is focused on database vulnerability
– we go deep in database assessment with over
5,000 compliance and security checks Top: Partial list of built-in policies

Right: Dashboard showing


vulnerabilities by risk and categories

Vulnerability Assessment

16
You don’t need to be a database expert to remediate
Rely on Trustwave SpiderLabs® intelligence on how to fix findings and reduce your risk

3. Eliminate Vulnerabilities

Actively harden your databases with in-depth


guidance on remediation steps to proactively
prevent potential breaches and exfiltration
§ Enable DBA’s with fix script reports that provide clear guidance on
how certain findings could be fixed via templated SQL statements
§ Track your remediation progress between scans
and validate fixes are being applied

Reduce risk with expert remediation guidance from


our dedicated research team that goes beyond telling
you to “apply the latest patch” with feasible Top: Dashboard showing findings
workarounds vs non-findings by categories

Right: Knowledgebase details


with remediation guidance

Vulnerability Assessment

17
Trustwave Right Management
Your privileged user is not always your DBA
Know who has access to your sensitive data

4. Review User Entitlements

Tighten access to critical data and continuously


certify user rights to validate only authorized
access is granted
§ Limit your risk to unauthorized access with proprietary user
entitlement scans by understanding which accounts have
access to what data and how they were granted these rights

Unravel the complex web of user privileges with


entitlement reports to be used in reviews with your
business and data owners – we provide greater Top: Detailed view of user privilege rights possessed
visibility than anyone else by specified users

Right: Dashboard showing number of privileged users


that have access right likeness to that of DB administrator

Rights Management

20
Take action to reduce potential data exfiltration
Revoke access to sensitive data and shrink your risk of data exposure

5. Enforce Least Privilege

Ensure you are putting in the right access


controls to critical data and limiting access
based on need to know
§ Make necessary changes to privileges granted to sensitive
data to support your least privilege model

Access the necessary intelligence to see relationships


between user access rights, roles, privileges, and
objects specific to the data supporting the business Top: Exploring user access privileges
available in database

Right: Detailed view of users and roles


granted the CREATE DATABASE privilege

Rights Management

21
Trustwave Activity Monitoring
Detect suspicious activity on what matters most
Intelligently monitor your databases with minimal performance impact

6. Customized Monitoring for Anomalies

Improve your time to detection on the data that


matters the most and gain visibility to uncover
indicators of attack so you can understand if
data was compromised
§ View detailed monitoring results from pre-built or customer defined
policies and behavioral models to detect anomalies based on the
detailed assessment findings and risk position of each database

Avoid alert paralysis that competitors deliver with their


inline proxy approach that requires all queries to go
through them and becomes a single point of failure Top: Details of anomaly with supporting
and bottleneck alert activity

Right: Trend dashboard showing alerts


and anomalies over time

Continuous Monitoring

24
Maintain cyber resilience with intelligent response
Investigate and effectively respond to alerts to combat data exfiltration and misuse

7. Respond to Alerts

Be equipped to appropriately counter alerts


based on your custom monitoring rules, so
you can continuously expose and mitigate risk
§ Get visibility to data access activity and investigate indicators of
attack from customized monitoring policy – end the blind spot
overlooked by other solutions

Enable effective response and investigation against


data exfiltration and suspicious activity based on
alerts from behavioral analytics and custom rules Top: Filtered alerts showing all DROP
rules

Right: Details of a DROP TABLE alert

Continuous Monitoring

25
Even the best generalist security scanners are not sufficient to protect your most
important asset – data. You need a highly specialized database security tool

Standard vulnerability assessment providers


only offer basic security for databases

700 vs 5,000+ Incomplete Limited intelligence


Generalist scanners provide only basic § Only database vulnerability management Their guidance is limited to infrequent
database compliance checks (700) vs. (VM) knowledge updates based on industry CVE
Trustwave’s 5,000+ and vulnerability feeds
§ No user access review and control (RM)
§ No intelligent database activity monitoring
(AM) that can detect data exfiltration,
among other threats

27
DbProtect is highly specialized database protection
Trustwave’s DbProtect goes beyond compliance and provides database security standard vulnerability tools can’t

We take you beyond Specialized protection Achieve mature database


01 your database 02 against breach and 03 security with DbProtect
compliance demands data exfiltration

7x more database specific compliance and Focused database specific threat remediation Integrated database security with Trustwave’s
security checks – we go deep into database guidance so your team knows what and how to portfolio of endpoint, application, e-mail, network,
checks, not broad and shallow like vulnerability remediate threats pen testing and other cybersecurity solutions
assessment tools

Clear insight into who has access and how to Intelligent database monitoring based on
Deep Expertise SpiderLabs® database limit access rights so you can reduce risk to human and machine intelligence provides you
research team focused on database security to sensitive data anomaly detection, alerting to protect against
provide you clear guidance on how to remediate breach and data exfiltration
your weaknesses
Customizable monitoring rules are created
based on known vulnerabilities and access Validated against industry security frameworks
weaknesses and regulation standards like CIS, DISA-STIG,
FISMA, CCPA, CMMC, HIPAA, PCI, GDPR and
many more

28
Trustwave AppDetectivePRO
Where are you now?

We need a specialized We need protection from We need to independently We need to comply with
database scanning tool unauthorized data access validate database security specific regulations
controls

We need a tool specializing in We need to look deeper at We need a tool for our own team We need to comply with
database scanning to provide database level access to ensure to audit the security controls we regulations such as SOX,
visibility into database security protection of sensitive data. have internally defined and that requiring activity monitoring and
that we don’t get from our we will be externally tested other database security
network and application against to validate we are measures
scanners. adhering to corporate and
regulatory requirements.

31
With our specialized database security
and audit scanner, you can

extend your assessment visibility


7x
More in-depth database security checks
of database security weaknesses

100+
ensure proper database account Hours saved per database audit
access to sensitive data

12
Annual knowledgebase updates
validate database security
controls are properly implemented
Automate Database Security Audit & Assessment

Assess Security Identify Excessive Audit and Validate


Weaknesses User Privileges Security Controls

Identify top database security Unravel the complex web of Leverage built-in best practices,
issues within minutes user privileges industry and compliance policies
§ Scan for misconfigurations, vulnerabilities, § Identify privileged users to limit risk § Gain independent analysis to validate risk
access control issues, and more posture and progress
§ Discover over-privileged access to
§ Utilize the most complete knowledgebase sensitive data to comply with data privacy § Achieve a deeper review of risk to data at
of database security checks maintained regulations the database level
by the Trustwave SpiderLabs® database
research team

33
Database Assessments approach with AppDetectivePRO
Process and benefits

Consultant AppDetectivePRO In-Scope Databases Database Findings & CIO/CISO/VP/DIR IT Sec.


Violations Report

1. Automated, quick scans


2. Expanded scope (can cover a larger number of databases while onsite in less time)

Benefits of using 3. Leverage built-in standard compliance policies, or can be easily customized
AppDetectivePRO: 4. Quickly and easily perform evidence-based data access control reviews
5. Automated reporting with all the research built in and done for you
6. Control reviews allow for documentation of scan findings, making reporting a snap
7. Consistent, repeatable results

34
How Organizations are using AppDetectivePRO

Corporate Security IT Audit | OIG Technology Risk

Part of vulnerability scanning team Used to fulfill independent audit Used to assess the technology risk
tool kit used to complement objectives to ensure security of of systems during M&A or prior to
network and application scanning business systems joining domains
§ Get a deeper scan at the database level to § Automated and repeatable process for § Broaden assessment to identify risks at
surface risk not identified by other database audits using built-in or the database level
scanners customizable policies
§ Gain visibility to security risks with ad-hoc
§ Easy to use and portable to use in air- § Impartial validation of security controls database scanning as needed for projects
gapped networks without needing specialized resources
§ Extend assessment to database level in
application lifecycle management

35
Questions and Next Steps
Start Your Database Security Journey with DbProtect

Schedule Trial Assess Run an


a DbProtect Continuous databases in-depth
Demo Assessment for risk Proof of
Let us know when you want Access our easy to install Trustwave Security Concept
to see how DbProtect uses trial software to assess one Architects will help you Gain clarity on how
a Continuous Assessment target database for understand the Continuous DbProtect will help you
and Protection approach to vulnerabilities, Assessment results adopt a mature database
secure your databases misconfigurations, user security plan and enable
access weaknesses you to protect the critical
data in your databases

37
Get started with AppDetectivePRO today

Schedule a Demo Trial the Software


Let us know when you want us to lead a demo for your team Install the software with a full license for 30 days

38

You might also like