Trellix Database Security
Find and defend databases and the information they contain.
Defend databases and the information they contain
Trellix Database Security finds, classifies, and defends sensitive information in leading database types, keeping your databases secure, patched, and protected even when patches are not an option. Easily conduct regular checks for issues with configuration and coding, as well as find performance problems. Trellix Database Security keeps your databases up-to-date and protects their sensitive information.
Database Activity Monitoring
Safeguard your databases against leaks by actively monitoring, logging, and detecting database access and irregularities, while preemptively blocking potential threats before they impact your environment.
Vulnerability Manager
Automate scanning activities to find supported databases and their sensitive information across your environment. Identify and prioritize known vulnerabilities to expedite detailed remediation, swiftly addressing security gaps.
Virtual Patching
Stop intrusions and other exploits before they breach your database. When available, Trellix’s virtual patches are automatically applied without impacting database availability. When vendor patches aren’t available or you’re unable to update a database, extra security is applied to keep it secure.
Highlights:
- Find Sensitive Data
Discover unknown databases. Locate sensitive and proprietary information in databases across your environment. - Support Compliance Activities
Improve regulatory compliance by blocking unauthorized access to sensitive data, and monitoring and responding to data events. - Enhance Security
Identify known and unknown vulnerabilities, automate patching, and reinforce security when patches are not available.
DID YOU KNOW ...
Trellix Data Security statistics
400+
File formats supported by Trellix Data Loss Prevention24M+
Drives protected worldwide by Trellix Data Encryption700+
Patch protections delivered by Trellix Database SecurityWhy Trellix Database Security?
Find and Classify
Discover sensitive and proprietary information in databases across the environment.
Support Compliance
Improve regulatory compliance by blocking unauthorized access to sensitive data.
Enhance Security
Address vulnerabilities quickly, with little to no downtime.
Product Features
Database Activity Monitoring
Monitor, log, and control database access, in addition to identifying and blocking potential threats before they can damage the environment.
Vulnerability Manager
Perform automated scans to find supported databases and the sensitive data they contain. Identify and prioritize known vulnerabilities — and receive detailed remediation advice.
Virtual Patching
Protect databases from known and unknown vulnerabilities without downtime. Stop intrusions and other exploits before they impact your environment.
Database Security Supports
Supported Databases:
- Oracle
- Microsoft SQL Server
- MySQL
- PostgreSQL
- MariaDB
- Sybase
- DB2
- SAP HANA
- Percona
- Teradata
Supported Operating Systems:
- Windows
- Linux
- Solaris
- AIX
- HPUX
Frequently Asked Questions
Databases contain structured data, in a standard format, that can be highly sensitive like personal identifiers, health information, and payment information. Organizations storing data for a long time and/or adding to legacy databases may not know where all sensitive data resides or be able to keep database protection up to date. In addition, regulations and privacy laws have been rapidly changing. New laws and regulations mandate the restriction of data access, reporting on potential breaches, and the status of who can access sensitive data. Security teams are expected to deliver secure databases that also comply with the latest regulatory expectations, creating the need for tools to enable them.
Database Security solutions can deliver automation for activities that teams have been handling manually. Through discovery scanning, supported databases and the sensitive data they contain can be identified. Organizations can apply rights management to databases to ensure that only authorized employees have access to the information they contain. Through activity monitoring, organizations can block actions, as well as get alerts, and address potential incidents. To ensure that databases are secure and optimized, automated scanning can also detect vulnerabilities, gaps in security, misconfigurations, and other performance issues.
Insider risk has to be considered a top threat. The rise in data breaches from attackers that target insiders especially threatens the sensitive information in databases, since attackers are seeking out these target-rich environments. Additionally, regulations and compliance are top concerns among Information Management, Technology, and Security teams who collaborate in Database Security support. Organizations are also experiencing an expanding information footprint across Database Security support. This footprint includes everything from aging databases on older servers to databases acquired through mergers, to databases that have simply gotten enormous through the addition of information over the years.
One of the biggest benefits of virtual patching is that it can provide extra security to databases with both known and unknown vulnerabilities and requires no downtime. Trellix uses threat intelligence to support virtual patching, and for those teams with legacy applications, this functionality can provide extra peace of mind.