DataSunrise Security for IBM DB2 Security with DataSunrise

IBM DB2, you’re using, is one of the best relational databases on the market. However, whether it’s commercial-grade version or free DB2 Express-C, it is still vulnerable to hacker attacks and insider threats. DataSunrise Database Security Suite, we’ve developed for IBM DB2 security, is the ideal solution to most data security problems. It blocks unauthorized access attempts in real time. Due to advanced threat detection algorithms, it prevents SQL injection attacks as well.

Tech Info

DataSunrise security solution protects IBM DB2 databases from both outside attacks and inside threats. It performs deep traffic filtering on an application level. Every incoming and outgoing packet is analyzed for compliance with the customized rules set. If the transaction triggers certain security rule, the blocking scenario includes disconnection of a client from DB or closing of the session.

Proxy mode deployment prevents direct communication between client and database. The firewall acts as an intermediary between client and server, it audits and logs queries or blocks execution of the ones violating firewall's security policies.

DB2 security

Smart SQL analysis algorithms provide continuous monitoring of database activity. During initial traffic processing DataSunrise disassembles user queries, database output etc. Then the queries undergo careful analysis and the firewall determines target database objects, schemas, tables names and other important information. Then the firewall logs queries, blocks their execution or obfuscates database output according to predefined security policies.

 

Scanning of traffic along with detection and blocking mechanisms allows you to capture SQL injections in real time. The firewall blocks the following SQL injection techniques:

  • Union Exploitation Technique
  • Boolean Exploitation Technique
  • Out of band Exploitation technique
  • Time delay Exploitation technique
  • Automated Exploitation
  •  

    DataSunrise helps you to build a DB2 security system with the help of security, audit and masking rules. Rule settings include the following parameters:

  • type, instance and name of the target database;
  • whether queries came from a certain client application;
  • whether intercepted queries contain certain SQL statements;
  • whether queries contain signs of SQL injection (OR and UNION statements, comments, double queries, constant expression, keyword in comments);
  • whether queries are directed to certain database elements (schemas, tables, columns, stored procedures).
  •  

    Among supported features there are:

  • User authentication methods (SERVER CLIENT)
  • All main data types
  • Simple single DDL and DML statements
  •  

    DataSunrise Database Firewall runs on Windows and Linux and supports IBM DB2 version 8+.