Published on February 27, 2014
Yoav Alter, Product Engineer 2013
Our mission Fulfill the ever growing unmet need for Database Security offering easy to deploy comprehensive solutions at affordable prices
About The Company Started as an Open Source Project (2006) More than 100,000 downloads Serving customers spread over 72 countries Named by Gartner as “Cool Vendor in Security” for 2013
Customers Government Gaming Technology
What We Offer Database Security Database Activity Monitoring Dynamic Data Masking
Customers Concern Interconnect App Integration Automated connections Data Integration Data load/unload Replication Testing Reporting servers Backup ETL Financial data HR data User connections Database Private data Customer data High privileged users Monitoring Administrators Casual users Application Users
How It Works GreenSQL can be installed on: Dedicated Server (physical or virtual): Best performance Secure multiple database servers Database Server Doesn’t require additional hardware Application Server
Database Security Stop/Detect SQL Injection Attacks Database Firewall Separation Of Duties
Database Activity Monitoring Audit Administrative Commands Advanced Auditing of sensitive columns (Before & After) Compliance - PCI/SOX/HIPPA Real Time Email Alerts
Database Activity Monitoring
Dynamic Data Masking Hide sensitive data (Credit Cards/Salaries/Medical Information etc.) No original data modification Mask data for specific users/applications/IP addresses
The Value • • • • Prevent unauthorized access to your database Detect & Block SQL injection attacks Monitor, Audit & Alert database activity Hide sensitive data from unauthorized personnel
High Barriers to Enter OuterCore and SMB Markets Imperva , Guardium /IBM, Secerno/Oracle > 2.5 yrs Sentrigo/McAfee GreenSQL Solution Type Hardware Based - appliance Software Based Database Agent Software Based Solution implemented architecture • Network: Non-inline sniffer, transparent bridge • Host: Light-weight agents (Requires the appliance on site) • Agent less collection of 3rd party database audit logs Database Memory Agent Only spots Incoming traffic, 25-35% transaction loss Reverse Proxy + bridge Complexity of implementation 6-18 Month 2-3 Month 40min -2 Days Ease of use X X √ Affordable relative to DB type X X √ Feature Synergy X X √ + Masking Go to market approach Channel Partners Onsite engineers Channel Partners Onsite engineers Downloadable Sales 2.0
View in: Classic | Tablet | Mobile - Privacy & Security Statement | Terms & Conditions. Copyright ... Copyright © 2014 by GreenSQL ...
Database Administration; SQL Server Security ... makes it easy to ... Have you heard about new solution from scriptlogic for managing sql server security ...
The SQL Server security model, ... Run the "#Update database(s) and security.cmd" file and you ... Such an attribute must be easy to retrieve and ...
Automated SQL injection attack tool makes database extraction as easy as a button click for cybercriminals Today's exponential increase in attack volume ...
Implementing comprehensive database security solutions can be an onerous task. ... and if left unchanged, are easy to exploit.
SQL Server Security http://social.technet.microsoft.com/Forums/de-DE/01a864fd-d3c2-407f-8d14-858f8314ac1a/simple-script-to-add-sql-database-security-user ...
Create a database from scratch or by using a template from Office.com. ... Create an Access database. ... Access makes it easy to work with data from other ...
Easy Online Database 'Tables' ... Strong Security Controls. You always control who sees what. ... Looking for Online Databases?
I have inherited a SQL Server box with a series of databases and it has Windows Auth for ... Information Security; Database Administrators; Drupal Answers;
To enhance security when using database authentication, Oracle recommends that you use password management, ... Is easy to administer: ...