* The risk to data sitting in databases, and how to protect against it When you enter your credit card information into a Web form, you can take comfort in the reassuring padlock icon on your browser. Peek behind the vendor’s network perimeter, though, and you might lose some sleep.Although companies assure us that transactions are protected in transit by the “military grade” encryption offered by Secure Sockets Layer, once the data pass behind the companies’ perimeter it is often protected by much weaker security, if at all. Last week in Florida, a spammer was indicted on 139 counts for reportedly stealing 8.2G bytes of personal data from a company that stores information on “virtually every adult in the U.S.” The digital heist was reportedly perpetrated using a legitimate username and password acquired while working for a company contracted by the victim.Information protection in the data center is critical to the overall security of a company’s data. Computer-crime statistics show that the majority of computer security breaches (80%, according to a CSI/FBI 2003 Survey – see link below) are committed by insiders, yet data centers are filled with unprotected sensitive data.One of the greatest risks comes from information sitting in databases, where it can be stolen en masse and at leisure. Unlike data in transit, which is fleeting and requires sophisticated “eavesdropping,” data in databases is often accessible by a wide range of systems and users: Web servers, back-up systems, database administrators and data-entry personnel. Although all databases provide access control, it is often difficult to apply and maintain these security measures consistently. Guardium and Ingrian are two vendors that are addressing this problem from two different angles. Guardium’s SQL Guard security appliance can be placed on a network segment next to a database server to monitor all database queries. Although similar products have existed for performance monitoring, SQL Guard focuses on securing database access. As a monitor it can examine each database query to identify the who, when, what and where of each access request. After monitoring “normal” access for a while, administrators of the appliance can define a baseline policy and be alerted to “exceptions” that may indicate foul play. Furthermore, if the appliance is placed in-line (in front of the database) it can also perform access control and actively block queries that deviate from the policy.Ingrian’s appliances offer real-time cryptographic protection of the data, whether it is in transit between servers or sitting in the database. The data is encrypted by the Ingrian appliance before it is stored in the database, while the keys remain securely in escrow inside the appliance. If someone were to retrieve the entire credit-card number column, for example, they would find it filled with encrypted data. By separating the keys from the encrypted data, organizations can enforce “separation of duties” between the database administrator and the security administrator; only through collusion can the data be breached. Furthermore, the data can be kept encrypted as it works its way through application servers and Web servers, only to be decrypted at the last moment, ensuring that it is not visible by the intermediate servers. Combining in-situ and in-transit encryption of data with robust monitoring and auditing capabilities, enterprises can better meet their regulatory and fiduciary obligations as well as combat their customers’ insomnia. Related content news Broadcom to lay off over 1,200 VMware employees as deal closes The closing of VMware’s $69 billion acquisition by Broadcom will lead to layoffs, with 1,267 VMware workers set to lose their jobs at the start of the new year. By Jon Gold Dec 01, 2023 3 mins Technology Industry Mergers and Acquisitions news analysis Cisco joins $10M funding round for Aviz Networks' enterprise SONiC drive Investment news follows a partnership between the vendors aimed at delivering an enterprise-grade SONiC offering for customers interested in the open-source network operating system. By Michael Cooney Dec 01, 2023 3 mins Network Management Software Network Management Software Network Management Software news Cisco CCNA and AWS cloud networking rank among highest paying IT certifications Cloud expertise and security know-how remain critical in building today’s networks, and these skills pay top dollar, according to Skillsoft’s annual ranking of the most valuable IT certifications. Demand for talent continues to outweigh s By Denise Dubie Nov 30, 2023 7 mins Certifications Certifications Certifications news Mainframe modernization gets a boost from Kyndryl, AWS collaboration Kyndryl and AWS have expanded their partnership to help enterprise customers simplify and accelerate their mainframe modernization initiatives. By Michael Cooney Nov 30, 2023 4 mins Mainframes Cloud Computing Data Center Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe