trustwave 700x150

AppDetectivePRO

DATABASE AND BIG DATA SCANNER

AppDetectivePRO is a database and Big Data scanner that can immediately uncover configuration mistakes, identification and access control issues, missing patches, or any toxic combination of settings that could lead to escalation of privileges attacks, data leakage, denial-of-service (DoS), or unauthorized modification of data held within data stores.

Through its simple setup and easy-to-use interface, you can immediately discover, assess, and report on the security, risk, or compliance posture of any database or Big Data store within your environment (on premise or in the cloud) in minutes. Complementary to host/network operating system and static/dynamic application scanners, AppDetectivePRO is a great addition to any existing security toolkit with its concentration on relational databases and Big Data stores.

Benefits 

AppDetectivePRO: Agentless, Automated Data Scanning 

Through its simple setup and easy-to-use interface, you can immediately discover, assess, and report on the security, risk, or compliance posture of any database or Big Data store within your environment (on premise or in the cloud) in minutes. 

Complete, Accurate, and Intuitive Data Security Solution 

Automated inventory, testing, information gathering, and analysis empower you with the intelligence to harden the security of your data stores. 

Automated Data Security, Risk, and Compliance Questionnaire Development 

Create or customize from a number of prepackaged data security controls based on industry standards and regulatory requirements. 

Manage Data Security Assessment Results and Remediation Efforts 

Facilitates closing the loop from initial discovery of databases and Big Data stores to fixing the vulnerability or policy violation. 

Continuously Updated Data Security Knowledgebase 

ASAP Updates - Extensive and continuously updated analytics and knowledgebase of relational databases and Big Data security best practices, configuration settings, and vulnerabilities. 

Discover 

Our data security solutions provide a complete inventory of data stores along with their respective objects, users and enabled security features within your organization. 

  • Easily review all of the accessible assets, user access levels, and security feature usage throughout your environment. 
  • Identify and highlight recently added, rogue or missing data store installations and objects. 
  • Quickly ascertain the configuration state of all your data stores (relational or Big Data). 

Assess 

Our products examine relational databases and Big Data stores for configuration mistakes, identification and access control issues, missing patches, or any toxic combination of settings that could lead to escalation of privileges attacks, data leakage, denial of service (DoS), or unauthorized modification of data. 

We provide unique, agent-less, unauthenticated (network port inspection), and authenticated (credentialed) assessment approach with no impact on the target data store. This multifaceted approach provides an accurate assessment of the security of relational database or Big Data store. 

We also include a comprehensive and continuously updated library of relational database and Big Data store vulnerability and security configuration issues backed by SpiderLabs. Through built-in and customized policies, users can examine data stores for Vulnerability, Configuration, and User Rights issues. 

Report 

Our product reports and dashboards provide a consolidated view of vulnerabilities, threats, risks, and compliance efforts across heterogeneous data store environments. They empower organizations to document their current status, demonstrate progress, effectiveness, and operational efficiency. Through our reporting and analytics platform, organizations can evaluate trends, and drill down for a detailed view of each individual database, group of databases, or databases of specific business units or groups within the enterprise. 

  • Intuitive, easy-to-configure and customize, rapidly 
  • Supports business objectives that include enterprise security and financial risk posture, operational efficiency, regulatory compliance, and strategic planning