|Home > Products > ExtraKeeper-DB|
Database Auditing Appliance System
The greatest threat of computer security comes from insider abuse rather than external intrusion. Firewalls are unable to alleviate these kinds of problems, so auditing system is needed. However, the performance of build-in database auditing system is dissatisfactory. Besides, the audit report format is complex. Most of the traditional database auditing systems is unable to meet customers’ needs.
Latest Database Auditing System
Sammas ExtraKeeper –DB (XK-DB) could solve all these problems. The adoption of Sniff Mode enables XK-DB to record all the activity in database without changing the existing network structure or harming the performance of daily operation. Audit data with static format enables administrator to do statistical analysis and post-event query.
Database is always targeted by hacker since it keeps vulnerable information and it is easy to attack. Access authentications are commonly used in traditional database auditing systems. It protects database by preventing unauthorized access. However, these kinds of passive security systems are unable to satisfy customers’ changing needs.
In order to ensure the audit data are the same with database server record, traditional database auditing systems capture internet activity in Link Layer. Although it could increase the accuracy of audit data, it increases database workload significantly and affects the daily operation. Since the auditing system and database management systems are working on the same server, hackers could delete all the intrusion record easily. The reliability and completeness of audit data are not guaranteed.The common problems of traditional auditing systems:
All these problems could be solved by XK-DB effectively. Sniff mode are adopted by XK-DB, so network structure reform is not required and it will not increase database workload. XK-DB captures and reassembles database activities from data link layer instantly. Then, it will record and analyze important events automatically according to policies and rules set-up by administrator. Analysis of audit data could be used to evaluate the policies and rules set up by administrators. The continuous adjustment could improve the security of database.
Comparison with traditional database auditing systems, the advantages of XK-DB: