SlideShare a Scribd company logo
1 of 21
Database Security Solution

Developed By
Protech Infosystems Pvt. Ltd.
(PIPL)

An ISO 9001:2008 Certified Company
Why Data Security apart from that offered by DATABASE
Governments and industry groups are mandating security measures over
privacy, healthcare and financial data,
Companies create, modify, store, and move vast amount of data every day.
Loss of data integrity by unauthorized manipulation of crucial data has
emerged as one of the biggest hurdles inside the enterprises today. Usually
such incidents are detected much later.
According to IDC, several of the top issues faced by IT organizations involve
threats to sensitive data:
• Outsiders penetrating the network and gaining access to protected
information and modify the data creating loss of database integrity
• Intentional misuse by disgruntled or malicious insiders / outsourcing
partner
• Inadvertent mistakes by under-informed insiders
• Employees following flawed policies and/or procedures
Today’s Data Security problem
Operating
System
Administrators
or
Database
Administrators or external hackers or outsourcing
maintenance team can do anything they want to the
database almost without any track.

Each year, approximately 15 million Americans are
identity theft victims with financial losses to the
country totaling close to $50 billion.
Source:
http://www.identitytheft.info/financial.aspx

Recent Headlines:

 Criminal gangs with malicious plan get into identity
theft and modification of critical data sets.
ShieldDB – A Unique Data Security product
Why ShieldDB (Problem Statement)

Business areas affected by Unauthorized access
• Bank / Demat Account / Credit Card / Insurance / Health Care
• Salary, Income Tax Related Information
• University Admission, Marks Data
• Land and License Records
• Business Secrets of Government & other organizations
• Resident Information

Trend
Through 2016, the financial impact of cybercrime will grow 10
% per year due to the continuing discovery of new
vulnerabilities. Gartner Top Predictions for 2012: Control Slips Away, Gartner, December 2011
Present Security Scenario
Background of ShieldDB
 Data manipulations, mostly by internal users, without keeping any track are
considered as unauthorized access and are biggest threat – our ShieldDB
is designed to identify such events and report to owners.
 Our solution is based on Statistical methods. Once the solution is
implemented, such thefts will be brought to notice for taking corrective
measures.
 Performance of Application will not be degraded while our solution is
implemented.

 Our solution maps large dataset into a small digital fingerprint (cryptic
image of the database) and will be under up gradation with every change in
main database by registered applications.
 Desired fingerprints will be matched with Actual at preset intervals for
identifying the changed location in database, date
and time of
unauthorized changes, even made through privileged authority.
ShieldDB Environment
How ShieldDB protects…
 Any unauthorized modification can be identified
and original data can be restored back.

 Source of unauthorized access & Time of such
transactions can also to be tracked.
 The key to access the shieldDB database will be
divided among multiple users.
 Reporting of incidences of security breaches
and related identity through e-mail / SMS.
ShieldDB Architecture
Application Service Delivery
Using J2EE

Security Service Delivery Using
J2EE

Application Service
Orchestration & Integration
Using J2EE

Security Service Orchestration
& Integration Using J2EE

Application Layer
Core & Common Business
Service using C++ and J2EE

ShieldDB Security
Layer using C++ and
J2EE

Security
Server

Database Layer (ORACLE/ Sybase/DB2/MSSQL/MYSQL etc.)
OS Layer (UNIX / Linux/Solaris/ Windows/ IBM z/OS etc.)
User – ShieldDB Interface
Core processes in ShieldDB
Fingerprint
Generation
Security
Server

Fingerprint
Updated
Fingerprint

Fingerprint
Updation

Fingerprint
Verification

Fingerprint
Generation

Fingerprint

Mail
Client
Database
Server

Fingerprint
Comparison

Verification
Error

SMS
Configuration of ShieldDB Security Server
Hardware:
• Standard mid-range Server
• Server configuration depending upon transactions &
Data volume

System Software:
• Server- Windows 2008 /Red Hat Linux/ Solaris
• Client - Windows XP/ Vista/ Windows 7
• Java Runtime Environment (JRE) 1.5
• Apache Tomcat Server 5.5 / 6.0
• IE 9 / Mozilla Firefox 16.0 / Google Chrome 22.0
• Database as in Production environment
Support requirement - Implementation
• Access permission of Production database is
essential for formation of Digital finger print of
database and Updation required for matching. p
• Separate ShieldDB Server
• Identification of crucial Tables / Columns
• List
of
authorized
applications
and
corresponding tables in database.
• Database
• JAVA 1.7 (JRE and JDK)
• Apache Tomcat 6.0
Administrative Multi authentication Log-In Screen – ShieldDB
ShieldDB Error Reporting As on Fri Sep 20, 2013- 16:59:14

Error Description

Table Name

Value
before
Updation

Value
after
Updation

Unauthorized change made in Col = 3 of Row No = 2

DEPT

DALllllll

DALl

Unauthorized change made in Col = 2 of Row No = 3

DEPT

SALE

SAL

Unauthorized change made in Col = 3 of Row No = 7

BONUS

7512

7

Unauthorized change made in Col = 9 of Row No = 3687

BIG_DATA

7000

70

Unauthorized change made in Col = 7 of Row No = 5116

BIG_DATA

9000

90
ShieldDB Features
Serial
No.

PRODUCT
FEATURES

Version – 1

Version – 2

1

Restricted Access to Sensitive Data



2

Customized Policy Administration



3

Security Audit(Point of Access &
Logging Details Detection)





4

Unauthorized Access Detection





5

Session Management and Access
Control Mechanism

6

Alert generation and Built in Report

7

Data Management Tools



8

Integration with other Application







Product Highlights/Benefits to client
 At present similar innovative product with indicated
functionalities and effective alert system is not
available
 Incorporation of user-specific reporting tools.
 Robust algorithm based on Statistical Techniques.
 No serious effect on optimum performance of
Production Server
 Works without interacting AUDIT TRAIL
 Assist management to monitor integrity of database
 Support multiple Database Platforms.
 Intellectual Consultancy for ShieldDB provided by
academicians of Indian Statistical Institute, Kolkata.
Intellectual Support & Consultancy
Protech Infosystems Pvt. Ltd. – A Snapshot
 Incorporated in 2007 in INDIA.
 ISO 9001:2008 Certified Company
 Experienced team of Management & Professionals
 Maturity in IT, ITES and GIS Projects
 Experience in Multiple Domains & Technologies
 Business Associates from different Industries
Protech Infosystems Pvt. Ltd. – Goals










Create impact in Information Technology
Early Return on Investment
Grow at a manageable pace
Fulfill Social Responsibility
Meeting Financial Target
Generate Large client base
Diversification in R&D
Focus in identified Niche Area
IT’S THE BEGINNING OF THE JOURNEY

THANK YOU
Office: AQ-13/1, 4th Floor, Salt Lake,
Sector-V, Kolkata-700091
Contacts: +91 (33) 6541 1317 / +91 98300 10867(M)
E-mail:
corporate@ptinfosys.com
Website: www.ptinfosys.com

More Related Content

What's hot

PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyAlienVault
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance ChecklistControlCase
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Matthew Rosenquist
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
The Role of Government in Identity Management
The Role of Government in Identity ManagementThe Role of Government in Identity Management
The Role of Government in Identity ManagementDon Lovett
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationCreus Moreira Carlos
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS ComplianceControlCase
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIvanti
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorCamilo Fandiño Gómez
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationControlCase
 
Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?Samsung SDS America
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance MonitoringKimberly Simon MBA
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONhimalya sharma
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyNandita Nityanandam
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditSBWebinars
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalWendy Murphy
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoJonathan Eubanks
 

What's hot (19)

PCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance StrategyPCI DSS v3.0: How to Adapt Your Compliance Strategy
PCI DSS v3.0: How to Adapt Your Compliance Strategy
 
AL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_webAL_PCI-Cheatsheet_web
AL_PCI-Cheatsheet_web
 
PCI DSS Compliance Checklist
PCI DSS Compliance ChecklistPCI DSS Compliance Checklist
PCI DSS Compliance Checklist
 
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
Intel Cyber Security Briefing at the Cyberstrat14 Security Conference in Hels...
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
The Role of Government in Identity Management
The Role of Government in Identity ManagementThe Role of Government in Identity Management
The Role of Government in Identity Management
 
WISekey IoT Technologies Presentation
WISekey IoT Technologies PresentationWISekey IoT Technologies Presentation
WISekey IoT Technologies Presentation
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
IT Service & Asset Management Better Together
IT Service & Asset Management Better TogetherIT Service & Asset Management Better Together
IT Service & Asset Management Better Together
 
Whitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity MonitorWhitepaper IBM Guardium Data Activity Monitor
Whitepaper IBM Guardium Data Activity Monitor
 
Introduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) CertificationIntroduction to Token Service Provider (TSP) Certification
Introduction to Token Service Provider (TSP) Certification
 
Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?Is Government Data as Safe as it Could Be?
Is Government Data as Safe as it Could Be?
 
Continual Compliance Monitoring
Continual Compliance MonitoringContinual Compliance Monitoring
Continual Compliance Monitoring
 
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATIONPCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
PCI DSS | PCI DSS Training | PCI DSS IMPLEMENTATION
 
Vulnerability Testing Services Case Study
Vulnerability Testing Services Case StudyVulnerability Testing Services Case Study
Vulnerability Testing Services Case Study
 
Qradar Business Case
Qradar Business CaseQradar Business Case
Qradar Business Case
 
The Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance AuditThe Trick to Passing Your Next Compliance Audit
The Trick to Passing Your Next Compliance Audit
 
Frost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-finalFrost Entrust Datacard-award-write-up-final
Frost Entrust Datacard-award-write-up-final
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance Info
 

Viewers also liked

Rapport de la célébration des 15 ans de Wikipedia en Côte d'Ivoire
Rapport de la célébration des 15 ans de Wikipedia en Côte d'IvoireRapport de la célébration des 15 ans de Wikipedia en Côte d'Ivoire
Rapport de la célébration des 15 ans de Wikipedia en Côte d'IvoireWikimedia Côte d'Ivoire
 
Top 10 ems supervisor interview questions and answers
Top 10 ems supervisor interview questions and answersTop 10 ems supervisor interview questions and answers
Top 10 ems supervisor interview questions and answerstonychoper4106
 
Postcron's new feature: CONTENT RECOMMENDATION
Postcron's new feature: CONTENT RECOMMENDATIONPostcron's new feature: CONTENT RECOMMENDATION
Postcron's new feature: CONTENT RECOMMENDATIONyousefain
 
Plumes économiques :: Média Kit 2014
Plumes économiques :: Média Kit 2014Plumes économiques :: Média Kit 2014
Plumes économiques :: Média Kit 2014Abdallah Bibou
 
О людях, их решениях и интуиции или поведенческая экономика для дизайнеров UX...
О людях, их решениях и интуиции или поведенческая экономика для дизайнеров UX...О людях, их решениях и интуиции или поведенческая экономика для дизайнеров UX...
О людях, их решениях и интуиции или поведенческая экономика для дизайнеров UX...Evgeniya Zhadyaeva
 
Proceso creacion app infografía
Proceso creacion app infografíaProceso creacion app infografía
Proceso creacion app infografíaIzaskun Saez
 
Gerunds and infinitives
Gerunds and infinitivesGerunds and infinitives
Gerunds and infinitivesGlenn R
 
второй 13 14
второй 13 14второй 13 14
второй 13 14Natalia179
 
Scalaの文字列処理 Day 4 Stringの文字コード変換と数値型との相互変換
Scalaの文字列処理 Day 4 Stringの文字コード変換と数値型との相互変換Scalaの文字列処理 Day 4 Stringの文字コード変換と数値型との相互変換
Scalaの文字列処理 Day 4 Stringの文字コード変換と数値型との相互変換ynupc
 
Monoliths and Microservices
Monoliths and Microservices Monoliths and Microservices
Monoliths and Microservices Bozhidar Bozhanov
 
SPICE Model of 15 Models Update JUL2015 in SPICE PARK
SPICE Model of 15 Models Update JUL2015 in SPICE PARKSPICE Model of 15 Models Update JUL2015 in SPICE PARK
SPICE Model of 15 Models Update JUL2015 in SPICE PARKTsuyoshi Horigome
 
Kalender jawa 2014
Kalender jawa 2014Kalender jawa 2014
Kalender jawa 2014Trisna Putra
 

Viewers also liked (20)

Rapport de la célébration des 15 ans de Wikipedia en Côte d'Ivoire
Rapport de la célébration des 15 ans de Wikipedia en Côte d'IvoireRapport de la célébration des 15 ans de Wikipedia en Côte d'Ivoire
Rapport de la célébration des 15 ans de Wikipedia en Côte d'Ivoire
 
Cursos online
Cursos online Cursos online
Cursos online
 
Allergy front page
Allergy front pageAllergy front page
Allergy front page
 
Top 10 ems supervisor interview questions and answers
Top 10 ems supervisor interview questions and answersTop 10 ems supervisor interview questions and answers
Top 10 ems supervisor interview questions and answers
 
Finalaya daily wrap_24dec2013
Finalaya daily wrap_24dec2013Finalaya daily wrap_24dec2013
Finalaya daily wrap_24dec2013
 
St antony visions
St antony visionsSt antony visions
St antony visions
 
Postcron's new feature: CONTENT RECOMMENDATION
Postcron's new feature: CONTENT RECOMMENDATIONPostcron's new feature: CONTENT RECOMMENDATION
Postcron's new feature: CONTENT RECOMMENDATION
 
Plumes économiques :: Média Kit 2014
Plumes économiques :: Média Kit 2014Plumes économiques :: Média Kit 2014
Plumes économiques :: Média Kit 2014
 
О людях, их решениях и интуиции или поведенческая экономика для дизайнеров UX...
О людях, их решениях и интуиции или поведенческая экономика для дизайнеров UX...О людях, их решениях и интуиции или поведенческая экономика для дизайнеров UX...
О людях, их решениях и интуиции или поведенческая экономика для дизайнеров UX...
 
Proceso creacion app infografía
Proceso creacion app infografíaProceso creacion app infografía
Proceso creacion app infografía
 
Gerunds and infinitives
Gerunds and infinitivesGerunds and infinitives
Gerunds and infinitives
 
Baden Baden
Baden BadenBaden Baden
Baden Baden
 
A envoyer avant noel
A envoyer avant noelA envoyer avant noel
A envoyer avant noel
 
второй 13 14
второй 13 14второй 13 14
второй 13 14
 
Scalaの文字列処理 Day 4 Stringの文字コード変換と数値型との相互変換
Scalaの文字列処理 Day 4 Stringの文字コード変換と数値型との相互変換Scalaの文字列処理 Day 4 Stringの文字コード変換と数値型との相互変換
Scalaの文字列処理 Day 4 Stringの文字コード変換と数値型との相互変換
 
Monoliths and Microservices
Monoliths and Microservices Monoliths and Microservices
Monoliths and Microservices
 
SPICE Model of 15 Models Update JUL2015 in SPICE PARK
SPICE Model of 15 Models Update JUL2015 in SPICE PARKSPICE Model of 15 Models Update JUL2015 in SPICE PARK
SPICE Model of 15 Models Update JUL2015 in SPICE PARK
 
La música emociona
La música emocionaLa música emociona
La música emociona
 
Kalender jawa 2014
Kalender jawa 2014Kalender jawa 2014
Kalender jawa 2014
 
El aprendiz de brujo
El aprendiz de brujoEl aprendiz de brujo
El aprendiz de brujo
 

Similar to Shield db data security

Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"IBM Security
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...SolarWinds
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a ServiceDenodo
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergdawnrk
 
A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)Denodo
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control DBmaestro - Database DevOps
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptxTranVu383073
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceDavid J Rosenthal
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 
Oil and gas big data edition
Oil and gas  big data editionOil and gas  big data edition
Oil and gas big data editionMark Kerzner
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?IBM Security
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big riskIBM Sverige
 
GDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestGDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestAdrian Dumitrescu
 

Similar to Shield db data security (20)

BREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAPBREACHED: Data Centric Security for SAP
BREACHED: Data Centric Security for SAP
 
Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"Avoiding the Data Compliance "Hot Seat"
Avoiding the Data Compliance "Hot Seat"
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
Government and Education Webinar: How to Reduce Vulnerabilities and Harden yo...
 
Three Dimensions of Data as a Service
Three Dimensions of Data as a ServiceThree Dimensions of Data as a Service
Three Dimensions of Data as a Service
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)A Key to Real-time Insights in a Post-COVID World (ASEAN)
A Key to Real-time Insights in a Post-COVID World (ASEAN)
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
DG_Architecture_Training.pptx
DG_Architecture_Training.pptxDG_Architecture_Training.pptx
DG_Architecture_Training.pptx
 
Greenplum User Case
Greenplum User Case Greenplum User Case
Greenplum User Case
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Microsoft Office 365 Security and Compliance
Microsoft Office 365 Security and ComplianceMicrosoft Office 365 Security and Compliance
Microsoft Office 365 Security and Compliance
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 
Oil and gas big data edition
Oil and gas  big data editionOil and gas  big data edition
Oil and gas big data edition
 
How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?How Vulnerable is Your Critical Data?
How Vulnerable is Your Critical Data?
 
David valovcin big data - big risk
David valovcin big data - big riskDavid valovcin big data - big risk
David valovcin big data - big risk
 
GDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & CyberquestGDPR Part 5: Better Together Quest & Cyberquest
GDPR Part 5: Better Together Quest & Cyberquest
 

Recently uploaded

Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024christinemoorman
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...lizamodels9
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africaictsugar
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 

Recently uploaded (20)

Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024The CMO Survey - Highlights and Insights Report - Spring 2024
The CMO Survey - Highlights and Insights Report - Spring 2024
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
Lowrate Call Girls In Sector 18 Noida ❤️8860477959 Escorts 100% Genuine Servi...
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Kenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby AfricaKenya’s Coconut Value Chain by Gatsby Africa
Kenya’s Coconut Value Chain by Gatsby Africa
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 

Shield db data security

  • 1. Database Security Solution Developed By Protech Infosystems Pvt. Ltd. (PIPL) An ISO 9001:2008 Certified Company
  • 2. Why Data Security apart from that offered by DATABASE Governments and industry groups are mandating security measures over privacy, healthcare and financial data, Companies create, modify, store, and move vast amount of data every day. Loss of data integrity by unauthorized manipulation of crucial data has emerged as one of the biggest hurdles inside the enterprises today. Usually such incidents are detected much later. According to IDC, several of the top issues faced by IT organizations involve threats to sensitive data: • Outsiders penetrating the network and gaining access to protected information and modify the data creating loss of database integrity • Intentional misuse by disgruntled or malicious insiders / outsourcing partner • Inadvertent mistakes by under-informed insiders • Employees following flawed policies and/or procedures
  • 3. Today’s Data Security problem Operating System Administrators or Database Administrators or external hackers or outsourcing maintenance team can do anything they want to the database almost without any track. Each year, approximately 15 million Americans are identity theft victims with financial losses to the country totaling close to $50 billion. Source: http://www.identitytheft.info/financial.aspx Recent Headlines:  Criminal gangs with malicious plan get into identity theft and modification of critical data sets. ShieldDB – A Unique Data Security product
  • 4. Why ShieldDB (Problem Statement) Business areas affected by Unauthorized access • Bank / Demat Account / Credit Card / Insurance / Health Care • Salary, Income Tax Related Information • University Admission, Marks Data • Land and License Records • Business Secrets of Government & other organizations • Resident Information Trend Through 2016, the financial impact of cybercrime will grow 10 % per year due to the continuing discovery of new vulnerabilities. Gartner Top Predictions for 2012: Control Slips Away, Gartner, December 2011
  • 6. Background of ShieldDB  Data manipulations, mostly by internal users, without keeping any track are considered as unauthorized access and are biggest threat – our ShieldDB is designed to identify such events and report to owners.  Our solution is based on Statistical methods. Once the solution is implemented, such thefts will be brought to notice for taking corrective measures.  Performance of Application will not be degraded while our solution is implemented.  Our solution maps large dataset into a small digital fingerprint (cryptic image of the database) and will be under up gradation with every change in main database by registered applications.  Desired fingerprints will be matched with Actual at preset intervals for identifying the changed location in database, date and time of unauthorized changes, even made through privileged authority.
  • 8. How ShieldDB protects…  Any unauthorized modification can be identified and original data can be restored back.  Source of unauthorized access & Time of such transactions can also to be tracked.  The key to access the shieldDB database will be divided among multiple users.  Reporting of incidences of security breaches and related identity through e-mail / SMS.
  • 9. ShieldDB Architecture Application Service Delivery Using J2EE Security Service Delivery Using J2EE Application Service Orchestration & Integration Using J2EE Security Service Orchestration & Integration Using J2EE Application Layer Core & Common Business Service using C++ and J2EE ShieldDB Security Layer using C++ and J2EE Security Server Database Layer (ORACLE/ Sybase/DB2/MSSQL/MYSQL etc.) OS Layer (UNIX / Linux/Solaris/ Windows/ IBM z/OS etc.)
  • 10. User – ShieldDB Interface
  • 11. Core processes in ShieldDB Fingerprint Generation Security Server Fingerprint Updated Fingerprint Fingerprint Updation Fingerprint Verification Fingerprint Generation Fingerprint Mail Client Database Server Fingerprint Comparison Verification Error SMS
  • 12. Configuration of ShieldDB Security Server Hardware: • Standard mid-range Server • Server configuration depending upon transactions & Data volume System Software: • Server- Windows 2008 /Red Hat Linux/ Solaris • Client - Windows XP/ Vista/ Windows 7 • Java Runtime Environment (JRE) 1.5 • Apache Tomcat Server 5.5 / 6.0 • IE 9 / Mozilla Firefox 16.0 / Google Chrome 22.0 • Database as in Production environment
  • 13. Support requirement - Implementation • Access permission of Production database is essential for formation of Digital finger print of database and Updation required for matching. p • Separate ShieldDB Server • Identification of crucial Tables / Columns • List of authorized applications and corresponding tables in database. • Database • JAVA 1.7 (JRE and JDK) • Apache Tomcat 6.0
  • 14. Administrative Multi authentication Log-In Screen – ShieldDB
  • 15. ShieldDB Error Reporting As on Fri Sep 20, 2013- 16:59:14 Error Description Table Name Value before Updation Value after Updation Unauthorized change made in Col = 3 of Row No = 2 DEPT DALllllll DALl Unauthorized change made in Col = 2 of Row No = 3 DEPT SALE SAL Unauthorized change made in Col = 3 of Row No = 7 BONUS 7512 7 Unauthorized change made in Col = 9 of Row No = 3687 BIG_DATA 7000 70 Unauthorized change made in Col = 7 of Row No = 5116 BIG_DATA 9000 90
  • 16. ShieldDB Features Serial No. PRODUCT FEATURES Version – 1 Version – 2 1 Restricted Access to Sensitive Data  2 Customized Policy Administration  3 Security Audit(Point of Access & Logging Details Detection)   4 Unauthorized Access Detection   5 Session Management and Access Control Mechanism 6 Alert generation and Built in Report 7 Data Management Tools  8 Integration with other Application    
  • 17. Product Highlights/Benefits to client  At present similar innovative product with indicated functionalities and effective alert system is not available  Incorporation of user-specific reporting tools.  Robust algorithm based on Statistical Techniques.  No serious effect on optimum performance of Production Server  Works without interacting AUDIT TRAIL  Assist management to monitor integrity of database  Support multiple Database Platforms.  Intellectual Consultancy for ShieldDB provided by academicians of Indian Statistical Institute, Kolkata.
  • 18. Intellectual Support & Consultancy
  • 19. Protech Infosystems Pvt. Ltd. – A Snapshot  Incorporated in 2007 in INDIA.  ISO 9001:2008 Certified Company  Experienced team of Management & Professionals  Maturity in IT, ITES and GIS Projects  Experience in Multiple Domains & Technologies  Business Associates from different Industries
  • 20. Protech Infosystems Pvt. Ltd. – Goals         Create impact in Information Technology Early Return on Investment Grow at a manageable pace Fulfill Social Responsibility Meeting Financial Target Generate Large client base Diversification in R&D Focus in identified Niche Area
  • 21. IT’S THE BEGINNING OF THE JOURNEY THANK YOU Office: AQ-13/1, 4th Floor, Salt Lake, Sector-V, Kolkata-700091 Contacts: +91 (33) 6541 1317 / +91 98300 10867(M) E-mail: corporate@ptinfosys.com Website: www.ptinfosys.com