Products

Tangram Database Security

and Compliance Solutions

Database security,
a subset of data security

Сonsists of security controls, tools, and countermeasures that can protect a database from malicious attacks. It encompasses the protection of the data itself, the database management systems that manage the data, and applications that access and use the data.

A paradox known as “Anderson’s Rule” states that the more accessible and usable the database, the more vulnerable it is to security threats; the more invulnerable the database is to threats, the more difficult it is to access and use.

Contact us
The worldwide and local regulatory compliance measures

become increasingly tight, thus complying to security, privacy and industry- specific regulations became more and more challenging.

2018 / Imarked a turning point in data privacy policy, as GDPR and other similar legislations had a global impact. Many organizations suddenly realized that databases are a critical security and risk. In many security breaches, the main goal of the attackers is to gain access to databases to steal a large volume of sensitive information.

From the compliance perspective, implementing database security controls, tools and procedures become crucial for passing the compliance audits.

Here are several key success factors for the database security project, based on Tangram vast experience in protecting customers’ data:

Establish sensitive data discovery and classification – a continuous sensitive data discovery and classification procedure should be set up, as you cannot protect information assets you are unaware of.
Perform configuration and vulnerability assessments of the database infrastructure. Vulnerability and configuration assessment should be automated and should be performed as frequently as possible. Any issues detected should be rapidly remediated.
Do your audits using without performance impacts. Once upon a time, database auditing is used to put a heavy strain on performance. Many organizations critically reduced detail in logs to improve operational efficiency. Today, dedicated Database Activity Monitoring tools having minimal to none impact on the performance are available and use of an industry leading tool is crucial for the project success – as you cannot challenge the performance and availability requirements of the business users.
Use real time alerting. As successful attack on a database will cause massive data leakage or data corruption very quickly, establish a real time alerting mechanism and appropriate incident response and remediation cookbooks.
Create a flexible and automated deployment. As the organizations’ database landscape is changing rapidly, your database security deployment should be flexible and agile to adopt to these changes.
Use AI / machine learning and report on suspicious activity. Although the good old “whitelist or blacklist” approach does a good job with securing your database, as the attacks become more sophisticated, so become the security controls. By using advanced threat detection, powered by AI, you can detect and respond to advanced threats such as business user credentials hijacking.
Let your database security project be led by seasoned database security professionals. Securing database requires knowledge not just in information security but in application development, infrastructure, networking, server platforms, database platforms and best practices and so on. Database security experts of Tangram Soft will provide you with the right toolbox and procedures for your database security projects – from sensitive data detection to deploying and maintaining of your database security platform.

Let’s see how Tangram-Soft answers these success factors with IBM Guardium:

001 / Sensitive data detection

IBM Guardium has sensitive data detection capabilities, based on meta data queries and random sampling. Tangram-Soft provides best practices and own add-ons for IBM Guardium. Tangram-Soft had developed assets for detecting sensitive data for Israeli privacy protection law and regulation.

002 / IBM Guardium Vulnerability Assessment

Scans data infrastructures such as databases to detect vulnerabilities and suggest remedial actions. This vulnerability assessment tool identifies exposures suchas missing patches, weak passwords, unauthorized changes, and misconfigured privileges. Full reports, as well as the history data of all vulnerabilities, and the compliance score, are provided as well as suggestions to address all vulnerabilities. These reports may be scheduled and automated for improved compliance.

003 / IBM Guardium prevents leaks

From databases and database platforms such as Hadoop, on premise and on cloud, ensures the integrity of information and automates compliance controls across heterogeneous environments. Guardium is combat-proven to have a neglectable to zero performance effect on the business users, and utilizes a secure, centralized audit repository located out of the monitored databases.

004 / Guardium includes specialized threat detection analytics

That scan and analyze audited data to detect symptoms that may indicate different types of database attacks. Threat detection analytics scans and analyzes audited data to detect symptoms that may indicate database attacks. Guardium does not rely on a comparison against an ever-changing dictionary of attack signatures. Instead, Guardium analyzes audit data activity, exceptions, and outlier data over extended periods of time looking for patterns that indicate an attack. By tracking the suspicious events over time and correlating them, Guardium creates a comprehensive picture of potential risks. This approach is more flexible and comprehensive, and does not require continual signature updates. It provides a scalable platform that enables continuous monitoring of structured and unstructured data traffic as well as enforcement of policies for sensitive data access enterprise-wide.

005 / IBM Guardium processes audit data in real time

And generates a real time alert in case of an offence. IBM Guardium integrates seamlessly with leading SIEM platforms, including IBM QRadar.

006 / IBM Guardium

Offers a flexible and scalable solution to supp

Contact Us