Stock Abbreviation : Topsec      Stock Code : 002212
7*24 hour service: 400-777-0777

Database Audit and Protection System

Pre-incident risk warning | Security protection in incident | Post-incident audit

Database Audit and Protection System Overview

Topsec Database Audit and Protection System is a gateway product designed to provide real-time protection for databases proactively. The system integrates multiple engines for database status monitoring, access auditing, database risk scanning, virtual patching, and access control, and provides a series of features, such as blacklist/whitelist and exception policy, login control, access control, and integrated report. In addition, this system can monitor access to a database in real time and provide flexible alarms.

Activity & Announcement
Advantages
Real-time control and protection

When the Database Audit and Protection System is deployed in your network in inline mode, it operates in defense mode. In this mode, the system supports all security control policies and can control, monitor, and audit access to the protected databases. This mode provides strengthened control on database operations performed over the network, and supports a variety of security control policies.

Blacklist and whitelist

The system establishes dynamic models through self-learning and creates a whitelist accordingly. For improvement of the normal database access model, the system also allows administrators to supplement the blacklist and whitelist by dealing with identified SQL information. Administrators can set a policy to audit or directly permit behaviors matching the whitelist, or set a control policy for behaviors matching the blacklist.

Database status monitoring

The system determines whether a database system is running properly by monitoring its status information, including the memory usage, buffer statistics, user connection statistics, cache information, lock information, SQL statistics, database information, planned tasks, thread information, key efficiency, and buffer hit ratio. In this way, the system guarantees the availability and response capability of the database system.

Application
Key data protection

It is critical for a management department to obtain performance indicators of databases promptly, because databases are the core of an enterprise's business systems. Sensitive data stored in a database, such as personal information and the enterprise's financial information, must be protected from illegal interception, unauthorized access (plain text), and leakage in development and testing stages. Therefore, sensitive data requires appropriate control policies and technical measures, such as fine-granularity access control and comprehensive auditing of database operations.

Issues resolved
  • The Database Audit and Protection System can be deployed in front of a production database to monitor access to this database from the intranet in real time. When detecting frequent risky operations on the database, the system generates alarms and interrupts such operations.
  • The system defines an application behavior model in the learning stage, and adds the SQL statements initiated by application systems and learned in this stage to the whitelist.
  • Risky operations on sensitive data have been defined in the system, so that administrators can detect such operations immediately.
  • Certain policies are enabled in the system to monitor buffer overflows and prevent SQL injection, helping to detect and defend against attacks from the Internet in real time.
Value to Customers
Preventing destruction and leakage of core data

The system enhances protection for databases of an enterprise and prevents risky operations that violate security regulations. In addition, it generates timely alarms to notify relevant personnel of risky operations, thus reducing destruction and leakage of core data.

Ensuring security compliance and identifying personnel accountable accurately

The system provides log analysis and retrieval capabilities to accurately identify sources of security incidents (who, when, where, and what), helping managers investigate the causes and identify the personnel accountable after the incidents.

Preventing core data access from unauthorized personnel

An authorization system is established to control access to core data, so that such data is transferred among a few designated personnel. Irrelevant personnel and systems are prevented from accessing core data.

Success Case