Application Security DbProtect v6.2
November 01, 2011
Application Security IncProduct:
DbProtect VM: $1,500; DbProtect RM: $1,500; DbProtect AM: $2,100
- Ease of Use:
- Value for Money:
- Overall Rating:
- Strengths: Business intelligence, analytic abilities, vulnerability knowledge base.
- Weaknesses: Alerting (in the version we tested); pricing is per database type.
- Verdict: A pleasing balance between network- and host-based scanning. Looks to scale nicely if one is in a standardized database environment.
DbProtect v6.2 is a software solution that combines discovery, vulnerability scanning, real-time audit and threat management to help organizations reduce risk and enhance compliance. The tool attempts to bring IT risk management principles to database security by accurately scanning databases, preventing breaches through rooting out vulnerabilities, misconfigurations and unauthorized user privileges before they can be exploited, and alerting on real-time threats with its activity monitoring and intrusion detection system (IDS) technologies.
We installed the product on our virtual Windows Server 2008. The deployment takes some time to install. One has to implement several modules, such as the console, knowledge base, scan engine and sensors. One also must install IBM Cognos v8 and Netflow Analyzer 7.5. All this is done through a wizard that guides admins through the entire process.
Once installed, the product goes out through the network scans, and finds and fingerprints all database instances. There is support for most database platforms. The main components include management for vulnerabilities, rights, audits and threats.
One of the strengths of this product is its use of analytics and business intelligence. This is built on top of IBM Cognos and works to correlate and tie all the data together to deliver valuable alerting.
The versions we reviewed lacked real-time active response and reporting. A new version shipped into general availability prior to our analysis, but we were unable to formally review v6.3. According to the release notes, active response is added, as is new and enhanced management reporting.
Sign up to our newsletters
SC Magazine Articles
- Report indicates Uber looking into Lyft employee as possible culprite in data breach
- IP Expo Europe: Smart equals exploitable, and VW is a threat actor
- Representatives pen letter asking for OPM to stop housing security clearance info
- Senators demand answers on data breach from T-Mobile and Experian
- IP Expo Europe: The Internet of Identities can help manage myriad IoT devices