DB Networks is a privately held
Information Security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthori ...
company founded in the United States The company is headquartered in
San Diego
San Diego ( , ; ) is a city on the Pacific Ocean coast of Southern California located immediately adjacent to the Mexico–United States border. With a 2020 population of 1,386,932, it is the eighth most populous city in the United States ...
,
California
California is a state in the Western United States, located along the Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the most populous U.S. state and the 3rd largest by area. It is also the ...
, and its regional offices are located in
Palo Alto
Palo Alto (; Spanish for "tall stick") is a charter city in the northwestern corner of Santa Clara County, California, United States, in the San Francisco Bay Area, named after a coastal redwood tree known as El Palo Alto.
The city was es ...
,
California
California is a state in the Western United States, located along the Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the most populous U.S. state and the 3rd largest by area. It is also the ...
and
Seattle
Seattle ( ) is a port, seaport city on the West Coast of the United States. It is the county seat, seat of King County, Washington, King County, Washington (state), Washington. With a 2020 population of 737,015, it is the largest city in bo ...
,
Washington
Washington commonly refers to:
* Washington (state), United States
* Washington, D.C., the capital of the United States
** A metonym for the federal government of the United States
** Washington metropolitan area, the metropolitan area centered o ...
.
In May 2018, DB Networks announced that it will change its company name to DB CyberTech.
History
DB Networks was founded in United States in 2009 to provide
database security
Database security concerns the use of a broad range of information security controls to protect databases (potentially including the data, the database applications or stored functions, the database systems, the database servers and the associated ...
including database infrastructure assessment, compromised credential identification, and
SQL injection
In computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL inj ...
defense, predominantly to the financial services industry and federal government. The company was initially financed by
Angel investors
An angel investor (also known as a business angel, informal investor, angel funder, private investor, or seed investor) is an individual who provides capital for a business or businesses start-up, usually in exchange for convertible debt or owner ...
. In 2012 the company raised $4.5M in
venture capital
Venture capital (often abbreviated as VC) is a form of private equity financing that is provided by venture capital firms or funds to start-up company, startups, early-stage, and emerging companies that have been deemed to have high growth poten ...
from
Khosla Ventures
Khosla Ventures is an American venture capital firm founded by Vinod Khosla, focused on early-stage companies in the Internet, computing, mobile, financial services, agriculture, healthcare and clean technology sectors. Some of its most succe ...
. In 2014 the company closed a $17 Million round of funding led by Khosla Ventures and Grotech Ventures.
The company's first product, the ADF-4200, was launched in February 2013.
Also in February 2013 the company announced a partnership with Alamo City Engineering Services (ACES) to offer its products to the
US Military
The United States Armed Forces are the military forces of the United States. The armed forces consists of six service branches: the Army, Marine Corps, Navy, Air Force, Space Force, and Coast Guard. The president of the United States is the ...
and
civilian federal agencies. In October 2013 the company announced the IDS-6300, later renamed DBN-6300, originally as a
SQL injection
In computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL inj ...
defense and database infrastructure security product.
In 2013 DB Networks was invited to join the Cync
cybersecurity
Computer security, cybersecurity (cyber security), or information technology security (IT security) is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, th ...
technology program under the direction of
Northrop Grumman
Northrop Grumman Corporation is an American multinational aerospace and defense technology company. With 90,000 employees and an annual revenue in excess of $30 billion, it is one of the world's largest weapons manufacturers and military tec ...
and the
University of Maryland, Baltimore County
The University of Maryland, Baltimore County (UMBC) is a public research university in Baltimore County, Maryland. It has a fall 2022 enrollment of 13,991 students, 61 undergraduate majors, over 92 graduate programs (38 master, 25 doctoral ...
Research Park Corporation. The Cync program identifies innovative technologies to combat cybersecurity threats.
In 2014 AMP Tech Solutions was announced as a channel partner to offer DB Network products through the
NASA Solutions for Enterprise-Wide Procurement (SEWP) IV contract to the
United States federal agencies
Legislative definitions of a federal agency are varied, and even contradictory. The official ''United States Government Manual'' offers no definition. While the Administrative Procedure Act definition of "agency" applies to most executive branch ...
.
In 2015 DB Networks was awarded two United States patents for their database security technologies.
DB Networks began licensing their database security software and technologies to original equipment manufacturers (
OEM
An original equipment manufacturer (OEM) is generally perceived as a company that produces non-aftermarket parts and equipment that may be marketed by another manufacturer. It is a common industry term recognized and used by many professional or ...
s) in February 2016 coinciding with the launch of their Layer 7 Database Sensor.
Partnerships have been announced with
FireEye
Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company founded in 2022. It has been involved in the detection and prevention of major cyber attacks.
It provides hardware, software, and services to investigat ...
, Cyphort, and Security On-Demand.
Technology
DB Networks database security technology is based on
machine learning
Machine learning (ML) is a field of inquiry devoted to understanding and building methods that 'learn', that is, methods that leverage data to improve performance on some set of tasks. It is seen as a part of artificial intelligence.
Machine ...
and
behavioral analysis
Behaviorism is a systematic approach to understanding the behavior of humans and animals. It assumes that behavior is either a reflex evoked by the pairing of certain antecedent stimuli in the environment, or a consequence of that individual' ...
as opposed to the traditional information security approach requiring human generated
blacklists or
whitelist
A whitelist, allowlist, or passlist is a mechanism which explicitly allows some identified entities to access a particular privilege, service, mobility, or recognition i.e. it is a list of things allowed when everything is denied by default. It is ...
s.
The machine learning and behavioral analysis platform learns each applications' proper SQL transaction behavior. Compromised credentials and rogue SQL statements, such as a SQL injection attack, will deviate from the established model and will raise an alarm as a database attack.
Machine learning and behavioral analysis technologies have the ability to prevent advanced and
zero-day database attacks without prior
threat intelligence
Threat intelligence is the "cyclical practice" of planning, collecting, processing, analyzing and disseminating information that poses a threat to applications and systems. Threat intelligence collects information in real-time to showcase the thre ...
or the need to establish and maintain signature files of known attack strings.
Products
DB Networks DBN-6300 was announced in October 2013 (originally referred to as the IDS-6300). The DBN-6300 is a 2U purpose-built database
security appliance A security appliance is any form of server appliance that is designed to protect computer networks from unwanted traffic.
Types of Security Appliances
* Active devices block unwanted traffic. Examples of such devices are firewalls, anti virus sc ...
. It uses machine learning and behavioral analysis to identify database attacks in real-time.
A
virtual appliance
A virtual appliance is a pre-configured virtual machine image, ready to run on a hypervisor; virtual appliances are a subset of the broader class of software appliances. Installation of a software appliance on a virtual machine and packaging that ...
version of the DBN-6300 was launched in February 2014, now referred to as the DBN-6300v.
The Layer 7 Database Sensor was launched in February 2016. The Layer 7 Database Sensor enables other information security product manufactures to integrate DB Networks database security technology into their products.
In March 2016, "insider threat" protection capabilities were added to the DBN-6300 and Layer 7 Database Sensor products.
Industry Recognition
2016
* Best Data Center Security Solution for 2016 - Cyber Defense Magazine
* Grand Trophy - Info Security Awards
* Top-30 Cybersecurity Providers in Silicon Valley
* Ranked 47 in the Cybersecurity 500
2015
* The Best Data Center Security Product for 2015 - Cyber Defense Magazine
* Grand Trophy - Info Security Awards
* Top 100 Cyber Security Companies
2014
* CIO Review's 20 Most Promising Enterprise Security Companies
* "Grand Global Excellence" Trophy for the Best of the Best in Security Technology - Info Security's Global Excellence Awards
* Most Innovative Intrusion Detection System for 2014 - Cyber Defense Magazine
* Finalist for SC Magazine 2014 Best Database Security Solution
2013
* Finalist for SC Magazine 2013 Best Database Security Solution
* 2013 Info Security's Global Excellence Awards
** Gold winner - Database Security
** Gold winner - Firewalls
** Gold winner - New Product Launch
See also
*
SQL
*
Relational database
A relational database is a (most commonly digital) database based on the relational model of data, as proposed by E. F. Codd in 1970. A system used to maintain relational databases is a relational database management system (RDBMS). Many relatio ...
*
Information security
Information security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthori ...
*
Digital forensics
Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery, investigation, examination and analysis of material found in digital devices, often in relation to mobile devices and comp ...
*
Code injection
Code injection is the exploitation of a computer bug that is caused by processing invalid data. The injection is used by an attacker to introduce (or "inject") code into a vulnerable computer program and change the course of execution. The res ...
*
Cyberwarfare
Cyberwarfare is the use of cyber attacks against an enemy state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, manipulation or economic war ...
References
External links
* {{Official website, http://www.dbnetworks.com
Computer security software companies
Networking companies
Server appliance
Software companies established in 2009
Companies based in San Diego
Networking companies of the United States
Technology companies of the United States