Security Testing

DbProtect

A highly scalable database security platform that enables organizations to secure their relational databases and big data stores, both on premises and in the cloud, with a distributed architecture and enterprise-level analytics.

Enterprise Database Security Platform

Databases contain sensitive and proprietary information, making them a prized target for cybercriminals who are constantly looking for ways to access valuable data for large financial payoffs. Trustwave DbProtect helps your business overcome resource limitations to uncover database configuration errors, access control issues, missing patches, and other weaknesses that could lead to data leakage and misuse and other serious repercussions.


What DbProtect Brings to You

  • High scalability with real-time visibility and protection against advanced, persistent, stealthy and insider threats.
  • End-to-end visibility and protection for critical databases across the entire organization – both on premises and in the cloud.
  • A real-time view of database assets, vulnerabilities, risk levels, user privileges, anomalies and incidents via a single dashboard.
  • The ability to detect, alert and take corrective action against suspicious activities, intrusions and policy violations.
  • Compliance reporting capabilities across multiple sets of business, security and regulatory policies.
  • Extensive and continuously updated analytics and knowledgebase of relational database and big data stores, backed by Trustwave SpiderLabs.
Data Sheet

Trustwave DbProtect

DbProtect is a database security platform that uncovers database configuration, identification and access control issues, missing patches, or settings that could lead to privileges attacks, data leakage, denial-of-service or unauthorized data modification.

Get Your Copy Now

Secure. Manageable. Flexible.


  • Magnifying Glass Icon

    Discovery and Inventory

    Survey databases across your entire enterprise, along with their respective objects, users and enabled security features.

  • Application Icon

    Conduct Assessments

    Examine data stores for vulnerability, configuration and user rights issues through built-in and customized policies.

  • Officer Icon

    Identify Excessively Privileged User Accounts

    Proactively establish an environment of least privilege by gaining visibility into who has access to your sensitive data.

  • QL Injection Icon

    Implement Controls

    Address high-risk vulnerabilities and misconfigurations, while assigning exceptions to ones that cannot immediately be patched.

  • Storage Icon

    Database Activity Monitoring (DAM)

    Reduce the resource burden on internal teams by identifying and alerting on unusual or suspicious behavior.

  • Security Report Icon

    Audit Privileged User Behavior

    Collect forensic audit trails of all privileged activities to satisfy compliance requirements.

  • Soical Icon

    Detect, Alert and Respond to Policy Violations

    Send alert messages for operations center personnel to take appropriate action when a security violation is identified.

  • Paper Data Icon

    Reporting, Integration and Analytics

    Run analytics and reports against your current status, and demonstrate progress and operational efficiency.

Highly Scalable, Software-based Architecture


Virtual environment ready
Non-disruptive agentless scan engines
Lightweight, low-network footprint sensor technology
No network reconfiguration needed