McAfee’s database security solution offers real-time, reliable protection for business-critical databases from external, internal, and intra-database threats, and requires no architecture changes, costly hardware, or database downtime. Organizations of all sizes can gain complete visibility into their overall database landscape and corresponding security posture, fully align their security policy administration practices, and efficiently maintain regulatory compliance. The solution is completely integrated with McAfee ePolicy Orchestrator (McAfee ePO) software and provides single pane manageability for database security and other security solutions.
Top Five Reasons to Deploy a Dedicated
Database Security Solution
1. You Can’t Protect an Asset If You Don’t Know
It Exists Even in buttoned-down enterprise IT environments, it’s not at all uncommon for there to be hundreds or even thousands of database instances containing highly sensitive information—and IT departments would be hard pressed to come up with the exact number, location, data sensitivity, and security posture of those databases. The worst part is that cybercriminals know this and are always testing for blind spots. They have the time and technical resources to exploit databases you thought were secure or didn’t even know existed in the first place. Your lack of visibility is their opportunity.
2. Perimeter Security Doesn’t Defend against Insider Threats
You’ve invested a great deal of time, effort, and capital to select and deploy firewalls and other network security technologies. However, as you know, not all database breaches originate outside the perimeter. In fact, annual research by the Computer Emergency Response Team (CERT) indicates that up to half of database breaches are caused by internal users. So, you need to protect your business-critical data from even more insidious foes—privileged insiders, many of whom have the wherewithal to bypass native database management systems’ (DBMS) security features, tamper with access logs, and cover their tracks.
3. The Bad Guys Can Attack Faster Than You Can Patch
Patch Tuesday ought to be declared a holiday for hackers. It’s the day of the month when database vendors reveal the ripest targets. What’s more, Patch Tuesday gives bad guys a heads up because they know how painful it is for your database management team to take down, patch, and test your databases. In fact, they count on the patching process to be thought of as such an operational disruption that you’ll choose to delay it for as long as possible, giving them ample time to find a way in. There’s really no way around the traditional patching process—and the opening it gives to criminals— unless you have a dedicated database security solution. And that solution must enable you to update the security posture of your databases in real time—without making your staff miserable and without disrupting your business operations.
4. You Can’t Keep Sacrificing Compliance for Continuity
Regulatory compliance requirements that apply across industries such as healthcare, finance, and retail are constantly evolving and becoming increasingly stringent along the way. Not surprisingly, businesscritical databases are heavily impacted by compliance practices, which mandate that databases need to be updated with the latest DBMS vendor-supplied patches. However, given the burdensome nature of having to take down, patch, and then test multiple databases of different types, the majority of organizations sacrifice compliance in order to preserve business continuity. Furthermore, there may be legacy databases still in use for which no patch updates are even offered.
5. When Data Lives in the Cloud, Visibility is Extremely Limited
The cloud offers tremendous IT cost and operational advantages but, as you know, there’s a catch— your staff can lose control of sensitive data and retain almost zero visibility into who might be accessing it. However, with the right database security solution in place, you can protect your data across both physical and virtual environments. The right solution can prevent unauthorized database activity and can report back to your own management console, even when your database is virtualized and lives in the cloud.
Where Does Database Security Fit?
Most enterprises will have solutions deployed for perimeter protection with firewalls, endpoint protection for their clients and servers, but in the end, any organization’s most sensitive data assets are likely stored in a database. These are DBMSes like Oracle or Microsoft SQL Server, and the basic security provided out-of-the-box from these vendors leaves enterprises potentially at risk of a serious data breach.
One obvious problem is the inability to monitor all local access to the database. The typical network monitoring device capturing and analyzing packets from the network will not see local access using IPC or even TCP mechanisms. To overcome this problem, some IPS vendors have introduced kernel-based agent solutions in addition to their network-based appliances. This approach removes the primary advantage that network appliances have—namely, their relatively non-intrusive nature.