DB Networks Identifies Credential Abuse with Machine Learning and Behavioral Analysis
Credential identification is one of the issues that is part of the legal battle with Apple and the FBI. The iPhone (News - Alert) in question will delete all of the data on the device if the right credential is not used after 10 attempts. Organizations also face similar problems with credential abuse, which have resulted in costly data breaches. DB Networks, a database cybersecurity company, has launched a solution to non-intrusively identify compromised credentials of database communication with machine learning and behavioral analysis in real-time.
Logon credentials is one of the vectors used by hackers to initiate an attack, and in most instances it is the result of abuse logon by legitimate users of an organization. According to DB Networks, individuals that lost their credential to an attacker will pose an insider threat. If the compromised credential is not quickly identified, it will continue to jeopardize the organization.
The new approach by DB Networks evaluates any risk and deviation from the normal business context in real-time. Using its security appliance and layer sensor, it can detect whenever a new behavior is revealed, which in most cases it is an attacker with stolen credentials.
"Databases are the organizations 'crown jewels' and compromised database credentials are essentially the 'keys to the kingdom' for attackers," said DB Networks' Chairman and CEO Brett Helm. "Through the unique application of machine learning and behavioral analysis, DB Networks is now able to immediately identify stolen credentials so that a data breach can be stopped in its tracks."
The DBN-6300 is a security appliance designed to protect databases in physical and virtual forms. This platform has advanced capabilities to quickly identify and analyze database traffic to detect any activity that is not normal.
The analytics engine of the DBN-6300 maps all of the activity while monitoring the system for any unusual code. It then creates an activity log to give administrators valuable data which can be mined to create visualizations of traffic, client/server relationships, transactions, loads and most any other element created by database traffic.
The Layer 7 Database Sensor also delivers security by providing deep insights into the database infrastructure. This includes protocol analysis of the database traffic layer with situational awareness. The information it provides can be used to create defensive layers of the database to lower the risk of data breach and the attack surface.
If there is one constant in the digital world, it is eventually everyone will experience some type of breach. Minimizing the damage requires technology that is able to identify anomalies in real-time and take the necessary actions. The DBN-6300 and Layer 7 Database Sensor are one of many tools that have to be deployed in order to create a widespread net of protection, from the end user to the datacenter.
Edited by Maurice Nagle