DBSEC data security products and services
lower the data breach risks,prevent sensitive data from being threatened,and meet the requirements of laws and regulations
Data Security Products Series
DBScan(DBS)
Product Overview
DBS provides customers with security inspection solutions for both international and domestic mainstream databases. DBS discovers weak security configuration, risky code and weak password in their databases, analyzes and osmotically simulated attacks the known vulnerability. It exposes the security problems of current database system efficiently, and monitors the security status of databases persistently. DBS provides database security assessment reports and databases security hardening advices for customers after the inspection, which imporves database security significantly.
Product Values
Compliance Inspection
DBS provides inspection policies of Information security technology-Baseline for classified cybersecurity protection 2 and 3, and also supports database security inspection policies from various industries, such as the public security and the operator. DBS can be utilized in industry inspection and organization self-inspection.
Database Vulnerabilities Discovery
The vulnerabilities of mainstream databases are exposed gradually and of a large number. The Oracle vulnerabilities only exposed by CVE reaches more than 1,200. DBS can inspect database vulnerabilities such as DBMS vulnerability, default configuration, permission promotion vulnerability, buffer overflow, unupgraded patch, etc.
Security Risk Discovery in Using
According to investigations, half of the production business databases have default account and default password. In common attack cases, hackers usually only utilize the built-in security vulnerabilities of databases, which can be protected by improving basic security configuration.
Database Security Monitoring
Most users start to analyze reasons of their security event only after its happens. However, databases store a big number of complex data, parameters and user privilege informations, makes manual tracking and data analysis more complecated. DBS provides persistently monitoring capability for database security, bulid a solid security line, and reports security status in real time.
Product Advantages
Accurate Risk Level
DBS provides customized vulnerability levels that meet the grading principle of CVE and CNNVD standards, and consistent with international mainstream and professional tools.
Comprehensive Inspection Scope
DBS supports over 1,900 security vulnerabilities and provides 5,327 security inspection points in total, while domestic ordinary security vendors can only inspect about 300 vulnerabilities and professional database vulnerability inspection tool can only inspect 600 to 700 vulnerabilities.
DBS supports many kinds of database types, including 7 internaltional mainstream databases and 3 domestic databases.
Advanced Inspection Technologies
DBS supports many kinds of database auto-inspection technologies and network database discovery technologies. It provides database server discovery technology, database instance discovery technology, various DBMS password generation technologies, more than 10,000 password blasting databases, and rapidly weak password inspection methods.
Special Database Security Monitoring
Traditional vulnerability scaning products only used as database vulnerability inspection tools. DBS broke through the limit of traditional products, monitors the operating and maintenance security of database, including assess their security configuration, connection status, user changing status, privilege changing status, code changing status, etc. DBS bulids a solid security line, and provides security changing reports and analysis.
High Self-Security
DBS provides three kinds of users, they are administrator, operator and auditor, who have different privileges from each other and monitor each other. The scanning function of DBS can be performed by read-only account. Database connection information and password are encrypted stored in the detection report.