DBSecWorx Services  
 Home / Services

      Products Services Industries Resources Relationships About Us
SQLcillin GL

We have released the first
security tool designed specifically
to address the glogin vulnerability.

The GLOGIN vulnerability has existed for more than 30 years and has been leveraged in  many successful attacks

Contact us to learn how you can effectively and inexpensively
prevent this attack.
Ad Hoc Q&A



Code Review


Deployment & Installation

Document Review

Expert Witness

Key Hire Interview

Knowledge Transfer
Lunch & Learn


Secure Configuration

Vulnerability Audit
Security Best Practice = Defense in Depth

At the center of every Defense in Depth diagram is databases and data. Yet our industry focuses most of its effort and money on the perimeter. Firewalls, VPNs, networks, end-point monitoring, behavioral analytics, and identity management all have value ... but they are not Defense in Depth?

Databases are not bit buckets. They contain tools that can be used to exfiltrate data and tools that can be used to support and conceal an attack: Many of which do not require escalated privileges for use.

To achieve Defense in Depth you must have a solution at every level of the stack and a solution that will prevent inappropriate access by someone with valid credentials.

Our Resource pages are our "Proof of Competence" and we encourage you and your technical staff to explore the many code demos, presentations and detailed explanations we publish.

Then, contact us to  explore the many ways that our Subject Matter Expertise can help protect you and your organization.

Use the links, at top, to access detailed information about our services including a free, no sales pitch, Lunch & Learn for your team.
- Blog Principles Principals Contact Us
DBSecWorx secures data and databases

 Copyright © 2019-2021
DBSecWorx All rights reserved.
Privacy & Cookies Policy Privacy Shield Legal