SlideShare a Scribd company logo
1 of 2
Download to read offline
Secerno DataStream™
For Comprehensive Database Traffic Analysis
Introduction
Secerno DataStream™, a virtual appliance available on the VMware
Server platform, brings the powerful analysis capabilities of
Secerno’s SynoptiQ™ Engine technology to deliver comprehensive
data stream analysis to developers, QA teams, and security and
compliance auditors by exposing the way that applications and
users access databases and interact with data.
Secerno DataStream’s SynoptiQ Engine automatically analyses
the intent of all database queries. To improve the efficiency of
auditing, it uses a patented technique called Semantic Clustering™
to log and group database requests with others of similar intent;
clearly and concisely showing how data is accessed. We call this
360-degree model of all your database transactions Intent-Based
Modeling™ and it spotlights areas of concern such as:
  Authenticated users carrying out unauthorised activity
  Non-compliant data access or changes to data
  Credit card numbers being used by unexpected queries
  Users changing data, when they should only be viewing it
  Unauthorised access to sensitive data
  New software versions that violate the corporate data
  security policy
  Unusual database requests coming from any part of the                 Offering a new approach to compliance auditing, Secerno
  organisation                                                          DataStream offers optional differential auditing capabilities which
                                                                        – rather than logging all SQL requests to a database – can be set to
  Privilege escalation                                                  log only changes in data access and/or exceptions to a
  Applications with permission to access specific data,                 compliance-approved policy. This considerably reduces the time
  but have not used it before                                           and resources spent reviewing logged data and processing alerts
                                                                        for compliance.
  Vulnerabilities and inefficiencies in applications – in
  development or live
  Poor quality queries and stored procedures that impact
  performance



How Secerno DataStream Works
Secerno DataStream is part of the award-winning Secerno
DataWall™ family of database activity monitoring and database policy
enforcement hardware and virtual appliances that deliver the world’s
most advanced, comprehensive and intelligent database security.
Secerno DataStream, with Secerno’s radical SynoptiQ technology
at its core, analyses all database traffic and automatically builds
up a model of application-to-database behaviour. As a result of
the SynoptiQ Engine’s deep understanding of the SQL language its
Semantic Clustering groups together statements of similar intent
for a concise, yet extremely granular, Intent-Based Model that
shows exactly how data is being accessed.

Differential Auditing for Compliance
Simply logging database access is often impractical because of the
sheer volume of logs generated. Secerno DataStream offers a new
approach to compliance auditing. Uniquely, the solution supports
differential (selection) auditing of data access which enables a
baseline of compliant activity to be easily created. Thereafter, this
customer baseline can be simply and easily compared with new
activity – highlighting only changes to this baseline.
Differential auditing from Secerno significantly reduces the
resources required to process audit trails, since only exceptions –                   Figure 1: Sample Compliance Reports
possible non-compliant activity – need then to be audited.

Secerno.SQL Agile – Data Stream Analysis                                                                                    www.secerno.com
Data Stream Analysis


Secerno DataStream™ for                                                                                 Software
                                                                                                   Development

Development Teams                                                                                       Team


SecernoDataStream data stream analysis capabilities deliver
                                                                                          Staging
far-reaching benefits to improve the security and efficiency of                         Applications
applications that will access an organisation’s – or its customers’ –
databases.
Applications in Development
Used by development teams in the development, QA and
maintenance cycles such as in the image here, Secerno
DataStream supports multiple development phases and paths.
                                                                                                             Secerno DataStream                         Secerno DataStream
The solution enables application delivery staff to receive high
quality analysis of SQL and stored procedure interaction with the
database. This allows them to identify SQL code issues such as                                               Secerno DataStream                         Secerno DataStream
poor performing queries, syntax errors, non-standard formatting
and SQL queries that could be vulnerable to subversion.
                                                                                                             Secerno DataStream                         Secerno DataStream
With Secerno DataStream, it is cost-effective and fast for
application delivery staff to identify and fix vulnerabilities and
inefficiencies in applications. According to Gartner, it is estimated
to cost up to fifty times more to do this once an application has
been deployed in a live environment.                                                              Oracle                                 MS-SQL   Sybase



                                                                                           Figure 2: Secerno DataStream used in Software Development

Secerno DataStream for
Penetration Testing                                                                   Who Benefits from Secerno
Secerno DataStream’s in-depth analysis of SQL queries shows                           DataStream?
exactly how applications are accessing corporate databases and
spotlights vulnerabilities in applications both in development and in                 Secerno DataStream guarantees the most intelligent and effective
live environments.                                                                    data stream analysis available for any organisation. It is particularly
                                                                                      beneficial for:
Secerno DataStream is unique in its ability to:
                                                                                        Auditors verifying compliance with regulatory requirements,
  Measure running systems, rather than scan static code                                 who can easily use Secerno DataStream to audit data access and
  Classify queries highly efficiently: grouping hundreds of                             its usage
  thousands of statements into a handful of Semantic Clusters,                           Software developers and QA managers seeking to improve
  based on the true                                                                      database application efficiency, quality and security through
  intent of database queries                                                             powerful SQL traffic analysis, comparison and measurement
  Highlight SQL query security concerns, rather than other                               Penetration testers, who can use a powerful tool providing
  sorts of concern, such as performance or code errors                                   deep forensic analysis capabilities for client engagements
  Show changes in live behaviour, relative to either:                                    Security specialists who wish to see exactly what queries are
  • A security baseline or policy measurement                                            being executed on the database and who is making the requests
  • Another version of software
  • Different time periods
  • Different ways of running the program



About Secerno
Secerno DataStream is Secerno’s award-winning family of database activity             The SynoptiQ Engine automatically clusters database interactions with others of
monitoring and database security solutions – uniquely available as either             similar intent; highlighting areas of concern such as authenticated users abusing
hardware or virtual appliances. Secerno DataWall protects data at the point at        their privileges, attackers masquerading as authenticated users or any other
which it is accessed and delivers the highest levels of protection against internal   form of SQL injection attack.
and external threats, optimises compliance auditing and delivers the ability to
improve the security and efficiency of applications.                                  The Secerno DataWall family of products enforces a positive security policy of only
                                                                                      approved behaviour, providing the option to either log, monitor, block or substitute
At the core of all products is Secerno’s SynoptiQ™ Engine technology, based           policy violations, all the while delivering zero-defect policy and eliminating the
on breakthrough research into efficient grammatical clustering and machine-           need for manually-scripted defences or externally-produced signatures.
learning. The SynoptiQ Engine analyses all database traffic to automatically
fingerprint the true intent of all database requests. This enables organisations      Secerno empowers organisations to derive the most value from their information
to see and prove with unprecedented granular analysis exactly how their data is       and to enable data security without the costs associated with traditional solutions.
accessed and changed.




                                                                                                                                         Code: UK_DS1008_DataStream

  Web: www.secerno.com   Email: enquiries@secerno.com                                                                                               Copyright © Secerno

More Related Content

What's hot

"How to document your decisions", Dmytro Ovcharenko
"How to document your decisions", Dmytro Ovcharenko "How to document your decisions", Dmytro Ovcharenko
"How to document your decisions", Dmytro Ovcharenko Fwdays
 
Best Practices for Integrating Applications Development
Best Practices for Integrating Applications DevelopmentBest Practices for Integrating Applications Development
Best Practices for Integrating Applications DevelopmentKovair
 
Managing Software Risk with CAST
Managing Software Risk with CASTManaging Software Risk with CAST
Managing Software Risk with CASTCAST
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Conference Papers
 
Highly Available XenApp Cloud
Highly Available XenApp CloudHighly Available XenApp Cloud
Highly Available XenApp Cloudijitcs
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9Ian Sommerville
 
The App Sec How-To: Choosing a SAST Tool
The App Sec How-To: Choosing a SAST ToolThe App Sec How-To: Choosing a SAST Tool
The App Sec How-To: Choosing a SAST ToolCheckmarx
 
Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Duane Bodle
 
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 ApplianceESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 ApplianceSymantec
 
Building Efficient Software with Property Based Testing
Building Efficient Software with Property Based TestingBuilding Efficient Software with Property Based Testing
Building Efficient Software with Property Based TestingCitiusTech
 
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...IRJET Journal
 
Übersicht Cloud Control - EM 12c
Übersicht Cloud Control - EM 12cÜbersicht Cloud Control - EM 12c
Übersicht Cloud Control - EM 12cVolker Linz
 

What's hot (18)

"How to document your decisions", Dmytro Ovcharenko
"How to document your decisions", Dmytro Ovcharenko "How to document your decisions", Dmytro Ovcharenko
"How to document your decisions", Dmytro Ovcharenko
 
Best Practices for Integrating Applications Development
Best Practices for Integrating Applications DevelopmentBest Practices for Integrating Applications Development
Best Practices for Integrating Applications Development
 
Managing Software Risk with CAST
Managing Software Risk with CASTManaging Software Risk with CAST
Managing Software Risk with CAST
 
Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...Adaptive authentication to determine login attempt penalty from multiple inpu...
Adaptive authentication to determine login attempt penalty from multiple inpu...
 
Highly Available XenApp Cloud
Highly Available XenApp CloudHighly Available XenApp Cloud
Highly Available XenApp Cloud
 
JESSIESEMANA_CV_1
JESSIESEMANA_CV_1JESSIESEMANA_CV_1
JESSIESEMANA_CV_1
 
Ch18-Software Engineering 9
Ch18-Software Engineering 9Ch18-Software Engineering 9
Ch18-Software Engineering 9
 
The App Sec How-To: Choosing a SAST Tool
The App Sec How-To: Choosing a SAST ToolThe App Sec How-To: Choosing a SAST Tool
The App Sec How-To: Choosing a SAST Tool
 
Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...Project Business Case and Capital Justification for Implementation of Applica...
Project Business Case and Capital Justification for Implementation of Applica...
 
Ch21 real time software engineering
Ch21 real time software engineeringCh21 real time software engineering
Ch21 real time software engineering
 
Oim Poc1.0
Oim Poc1.0Oim Poc1.0
Oim Poc1.0
 
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 ApplianceESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
ESG Labs Testing and Performance Audit of the NetBackup 5330 Appliance
 
Building Efficient Software with Property Based Testing
Building Efficient Software with Property Based TestingBuilding Efficient Software with Property Based Testing
Building Efficient Software with Property Based Testing
 
TermPaper
TermPaperTermPaper
TermPaper
 
Message management
Message managementMessage management
Message management
 
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
A Survey on Provable Multi-copy Dynamic Data Possession in Cloud Computing Sy...
 
Übersicht Cloud Control - EM 12c
Übersicht Cloud Control - EM 12cÜbersicht Cloud Control - EM 12c
Übersicht Cloud Control - EM 12c
 
context-sdm-brochure
context-sdm-brochurecontext-sdm-brochure
context-sdm-brochure
 

Similar to Comprehensive Database Traffic Analysis with Secerno DataStream

Supply Chain Management System
Supply Chain Management SystemSupply Chain Management System
Supply Chain Management Systemguest631b66
 
Community Resource Portal for the Healthcare Sector
Community Resource Portal for the Healthcare SectorCommunity Resource Portal for the Healthcare Sector
Community Resource Portal for the Healthcare SectorMike Taylor
 
Pillars of great Azure Architecture
Pillars of great Azure ArchitecturePillars of great Azure Architecture
Pillars of great Azure ArchitectureKarthikeyan VK
 
MICROSOFT SQL Server
MICROSOFT SQL ServerMICROSOFT SQL Server
MICROSOFT SQL Serverwebhostingguy
 
MICROSOFT SQL Server
MICROSOFT SQL ServerMICROSOFT SQL Server
MICROSOFT SQL Serverwebhostingguy
 
MICROSOFT SQL Server
MICROSOFT SQL ServerMICROSOFT SQL Server
MICROSOFT SQL Serverwebhostingguy
 
Seceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptx
Seceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptxSeceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptx
Seceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptxCompanySeceon
 
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014Amazon Web Services
 
SafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud AppsSafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud AppsVladi Vexler
 
RESUME_NEHA _SELENIUM
RESUME_NEHA _SELENIUMRESUME_NEHA _SELENIUM
RESUME_NEHA _SELENIUMNeha Samal
 
8+ years of experience in Java/J2EE technologies
8+ years of experience in Java/J2EE technologies8+ years of experience in Java/J2EE technologies
8+ years of experience in Java/J2EE technologiessukanyanarra
 
MICROSOFT SQL Server
MICROSOFT SQL ServerMICROSOFT SQL Server
MICROSOFT SQL Serverwebhostingguy
 
MICROSOFT SQL Server
MICROSOFT SQL ServerMICROSOFT SQL Server
MICROSOFT SQL Serverwebhostingguy
 
MICROSOFT SQL Server
MICROSOFT SQL ServerMICROSOFT SQL Server
MICROSOFT SQL Serverwebhostingguy
 
Sql Server 2008 Product Overview
Sql Server 2008 Product OverviewSql Server 2008 Product Overview
Sql Server 2008 Product OverviewIsmail Muhammad
 
Online Blood Donation management System ABSTRACT.doc
Online Blood Donation management System ABSTRACT.docOnline Blood Donation management System ABSTRACT.doc
Online Blood Donation management System ABSTRACT.docsanjaypawar128131
 
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...Amazon Web Services
 

Similar to Comprehensive Database Traffic Analysis with Secerno DataStream (20)

Supply Chain Management System
Supply Chain Management SystemSupply Chain Management System
Supply Chain Management System
 
Community Resource Portal for the Healthcare Sector
Community Resource Portal for the Healthcare SectorCommunity Resource Portal for the Healthcare Sector
Community Resource Portal for the Healthcare Sector
 
Pillars of great Azure Architecture
Pillars of great Azure ArchitecturePillars of great Azure Architecture
Pillars of great Azure Architecture
 
MICROSOFT SQL Server
MICROSOFT SQL ServerMICROSOFT SQL Server
MICROSOFT SQL Server
 
MICROSOFT SQL Server
MICROSOFT SQL ServerMICROSOFT SQL Server
MICROSOFT SQL Server
 
MICROSOFT SQL Server
MICROSOFT SQL ServerMICROSOFT SQL Server
MICROSOFT SQL Server
 
Seceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptx
Seceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptxSeceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptx
Seceon Innovations in 2023 - A Look Back on a Big Year - Seceon.pptx
 
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
(ENT211) Migrating the US Government to the Cloud | AWS re:Invent 2014
 
SafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud AppsSafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud Apps
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Predix
PredixPredix
Predix
 
RESUME_NEHA _SELENIUM
RESUME_NEHA _SELENIUMRESUME_NEHA _SELENIUM
RESUME_NEHA _SELENIUM
 
Migration Services
Migration ServicesMigration Services
Migration Services
 
8+ years of experience in Java/J2EE technologies
8+ years of experience in Java/J2EE technologies8+ years of experience in Java/J2EE technologies
8+ years of experience in Java/J2EE technologies
 
MICROSOFT SQL Server
MICROSOFT SQL ServerMICROSOFT SQL Server
MICROSOFT SQL Server
 
MICROSOFT SQL Server
MICROSOFT SQL ServerMICROSOFT SQL Server
MICROSOFT SQL Server
 
MICROSOFT SQL Server
MICROSOFT SQL ServerMICROSOFT SQL Server
MICROSOFT SQL Server
 
Sql Server 2008 Product Overview
Sql Server 2008 Product OverviewSql Server 2008 Product Overview
Sql Server 2008 Product Overview
 
Online Blood Donation management System ABSTRACT.doc
Online Blood Donation management System ABSTRACT.docOnline Blood Donation management System ABSTRACT.doc
Online Blood Donation management System ABSTRACT.doc
 
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
 

More from Paul Tompsett

Workbooks CRM datasheet
Workbooks CRM datasheetWorkbooks CRM datasheet
Workbooks CRM datasheetPaul Tompsett
 
Webroot countrywide casestudy
Webroot countrywide casestudyWebroot countrywide casestudy
Webroot countrywide casestudyPaul Tompsett
 
Webroot Construction sector datasheet
Webroot Construction sector datasheetWebroot Construction sector datasheet
Webroot Construction sector datasheetPaul Tompsett
 
Workbooks Administrator Service datasheet
Workbooks Administrator Service datasheetWorkbooks Administrator Service datasheet
Workbooks Administrator Service datasheetPaul Tompsett
 
Workbooks Lyonsdown casestudy
Workbooks Lyonsdown casestudyWorkbooks Lyonsdown casestudy
Workbooks Lyonsdown casestudyPaul Tompsett
 
Operation Getaway incentive poster
Operation Getaway incentive posterOperation Getaway incentive poster
Operation Getaway incentive posterPaul Tompsett
 

More from Paul Tompsett (8)

Workbooks CRM datasheet
Workbooks CRM datasheetWorkbooks CRM datasheet
Workbooks CRM datasheet
 
Webroot countrywide casestudy
Webroot countrywide casestudyWebroot countrywide casestudy
Webroot countrywide casestudy
 
Webroot Construction sector datasheet
Webroot Construction sector datasheetWebroot Construction sector datasheet
Webroot Construction sector datasheet
 
Workbooks Administrator Service datasheet
Workbooks Administrator Service datasheetWorkbooks Administrator Service datasheet
Workbooks Administrator Service datasheet
 
Workbooks Lyonsdown casestudy
Workbooks Lyonsdown casestudyWorkbooks Lyonsdown casestudy
Workbooks Lyonsdown casestudy
 
Operation Getaway incentive poster
Operation Getaway incentive posterOperation Getaway incentive poster
Operation Getaway incentive poster
 
Infosecurity Ad
Infosecurity AdInfosecurity Ad
Infosecurity Ad
 
Webroot popup
Webroot popupWebroot popup
Webroot popup
 

Recently uploaded

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 

Recently uploaded (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 

Comprehensive Database Traffic Analysis with Secerno DataStream

  • 1. Secerno DataStream™ For Comprehensive Database Traffic Analysis Introduction Secerno DataStream™, a virtual appliance available on the VMware Server platform, brings the powerful analysis capabilities of Secerno’s SynoptiQ™ Engine technology to deliver comprehensive data stream analysis to developers, QA teams, and security and compliance auditors by exposing the way that applications and users access databases and interact with data. Secerno DataStream’s SynoptiQ Engine automatically analyses the intent of all database queries. To improve the efficiency of auditing, it uses a patented technique called Semantic Clustering™ to log and group database requests with others of similar intent; clearly and concisely showing how data is accessed. We call this 360-degree model of all your database transactions Intent-Based Modeling™ and it spotlights areas of concern such as: Authenticated users carrying out unauthorised activity Non-compliant data access or changes to data Credit card numbers being used by unexpected queries Users changing data, when they should only be viewing it Unauthorised access to sensitive data New software versions that violate the corporate data security policy Unusual database requests coming from any part of the Offering a new approach to compliance auditing, Secerno organisation DataStream offers optional differential auditing capabilities which – rather than logging all SQL requests to a database – can be set to Privilege escalation log only changes in data access and/or exceptions to a Applications with permission to access specific data, compliance-approved policy. This considerably reduces the time but have not used it before and resources spent reviewing logged data and processing alerts for compliance. Vulnerabilities and inefficiencies in applications – in development or live Poor quality queries and stored procedures that impact performance How Secerno DataStream Works Secerno DataStream is part of the award-winning Secerno DataWall™ family of database activity monitoring and database policy enforcement hardware and virtual appliances that deliver the world’s most advanced, comprehensive and intelligent database security. Secerno DataStream, with Secerno’s radical SynoptiQ technology at its core, analyses all database traffic and automatically builds up a model of application-to-database behaviour. As a result of the SynoptiQ Engine’s deep understanding of the SQL language its Semantic Clustering groups together statements of similar intent for a concise, yet extremely granular, Intent-Based Model that shows exactly how data is being accessed. Differential Auditing for Compliance Simply logging database access is often impractical because of the sheer volume of logs generated. Secerno DataStream offers a new approach to compliance auditing. Uniquely, the solution supports differential (selection) auditing of data access which enables a baseline of compliant activity to be easily created. Thereafter, this customer baseline can be simply and easily compared with new activity – highlighting only changes to this baseline. Differential auditing from Secerno significantly reduces the resources required to process audit trails, since only exceptions – Figure 1: Sample Compliance Reports possible non-compliant activity – need then to be audited. Secerno.SQL Agile – Data Stream Analysis www.secerno.com
  • 2. Data Stream Analysis Secerno DataStream™ for Software Development Development Teams Team SecernoDataStream data stream analysis capabilities deliver Staging far-reaching benefits to improve the security and efficiency of Applications applications that will access an organisation’s – or its customers’ – databases. Applications in Development Used by development teams in the development, QA and maintenance cycles such as in the image here, Secerno DataStream supports multiple development phases and paths. Secerno DataStream Secerno DataStream The solution enables application delivery staff to receive high quality analysis of SQL and stored procedure interaction with the database. This allows them to identify SQL code issues such as Secerno DataStream Secerno DataStream poor performing queries, syntax errors, non-standard formatting and SQL queries that could be vulnerable to subversion. Secerno DataStream Secerno DataStream With Secerno DataStream, it is cost-effective and fast for application delivery staff to identify and fix vulnerabilities and inefficiencies in applications. According to Gartner, it is estimated to cost up to fifty times more to do this once an application has been deployed in a live environment. Oracle MS-SQL Sybase Figure 2: Secerno DataStream used in Software Development Secerno DataStream for Penetration Testing Who Benefits from Secerno Secerno DataStream’s in-depth analysis of SQL queries shows DataStream? exactly how applications are accessing corporate databases and spotlights vulnerabilities in applications both in development and in Secerno DataStream guarantees the most intelligent and effective live environments. data stream analysis available for any organisation. It is particularly beneficial for: Secerno DataStream is unique in its ability to: Auditors verifying compliance with regulatory requirements, Measure running systems, rather than scan static code who can easily use Secerno DataStream to audit data access and Classify queries highly efficiently: grouping hundreds of its usage thousands of statements into a handful of Semantic Clusters, Software developers and QA managers seeking to improve based on the true database application efficiency, quality and security through intent of database queries powerful SQL traffic analysis, comparison and measurement Highlight SQL query security concerns, rather than other Penetration testers, who can use a powerful tool providing sorts of concern, such as performance or code errors deep forensic analysis capabilities for client engagements Show changes in live behaviour, relative to either: Security specialists who wish to see exactly what queries are • A security baseline or policy measurement being executed on the database and who is making the requests • Another version of software • Different time periods • Different ways of running the program About Secerno Secerno DataStream is Secerno’s award-winning family of database activity The SynoptiQ Engine automatically clusters database interactions with others of monitoring and database security solutions – uniquely available as either similar intent; highlighting areas of concern such as authenticated users abusing hardware or virtual appliances. Secerno DataWall protects data at the point at their privileges, attackers masquerading as authenticated users or any other which it is accessed and delivers the highest levels of protection against internal form of SQL injection attack. and external threats, optimises compliance auditing and delivers the ability to improve the security and efficiency of applications. The Secerno DataWall family of products enforces a positive security policy of only approved behaviour, providing the option to either log, monitor, block or substitute At the core of all products is Secerno’s SynoptiQ™ Engine technology, based policy violations, all the while delivering zero-defect policy and eliminating the on breakthrough research into efficient grammatical clustering and machine- need for manually-scripted defences or externally-produced signatures. learning. The SynoptiQ Engine analyses all database traffic to automatically fingerprint the true intent of all database requests. This enables organisations Secerno empowers organisations to derive the most value from their information to see and prove with unprecedented granular analysis exactly how their data is and to enable data security without the costs associated with traditional solutions. accessed and changed. Code: UK_DS1008_DataStream Web: www.secerno.com Email: enquiries@secerno.com Copyright © Secerno