DBSecWorx Services  
 Home / Resources


 
      Products Services Industries Resources Relationships About Us
   
SQLcillin GL


We have released the first
security tool designed specifically
to address the glogin vulnerability.


The GLOGIN vulnerability has existed for more than 30 years and has been leveraged in  many successful attacks

Contact us to learn how you can effectively and inexpensively
prevent this attack.
 
Ad Hoc Q&A

Architecture

Assessment

Code Review

Consulting


 
Deployment & Installation

Document Review

Expert Witness

Key Hire Interview

Knowledge Transfer
Lunch & Learn

Mitigation

Secure Configuration

Vulnerability Audit
 
Security Best Practice = Defense in Depth
 
       

At the center of every Defense in Depth diagram is databases and data. Yet our industry focuses most of its effort and money on the perimeter. Firewalls, VPNs, networks, end-point monitoring, behavioral analytics, and identity management all have value ... but they are not Defense in Depth?

Databases are not bit buckets. They contain tools that can be used to exfiltrate data and tools that can be used to support and conceal an attack: Many of which do not require escalated privileges for use.

To achieve Defense in Depth you must have a solution at every level of the stack and a solution that will prevent inappropriate access by someone with valid credentials.

Our Resource pages are our "Proof of Competence" and we encourage you and your technical staff to explore the many code demos, presentations and detailed explanations we publish.

Then, contact us to  explore the many ways that our Subject Matter Expertise can help protect you and your organization.

Use the links, at top, to access detailed information about our services including a free, no sales pitch, Lunch & Learn for your team.
- Blog Principles Principals Contact Us
 
DBSecWorx secures data and databases
 

 Copyright © 2019-2021
DBSecWorx All rights reserved.
 
Privacy & Cookies Policy Privacy Shield Legal