Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Compliance

BeyondTrust Acquires Lumigent, Launches New Database Security Solution

BeyondTrust today announced the acquisition of Lumigent Technologies, a Massachusetts-based provider of database security and activity monitoring solutions.

As a result of the acquisition, BeyondTrust today announced PowerBroker Database, a solution that provides IT security departments with the ability to closely monitor database activity of privileged users, assess system configurations, and capture, alert, and report on changes to critical system configuration and business data.

BeyondTrust today announced the acquisition of Lumigent Technologies, a Massachusetts-based provider of database security and activity monitoring solutions.

As a result of the acquisition, BeyondTrust today announced PowerBroker Database, a solution that provides IT security departments with the ability to closely monitor database activity of privileged users, assess system configurations, and capture, alert, and report on changes to critical system configuration and business data.

PowerBroker Database, Monitor & Audit is the first solution in BeyondTrust’s new PowerBroker family of products to offer core database log reading technology that enables total transparency of how data is accessed, edited and tracked and how changes to these data elements critically impact business operations, control and security.

With visibility into this data, security teams are able to more effectively monitor for potentially threatening changes to database controls. Administrators may view how data assets are accessed (and by whom), monitor changes to application controls that secure and protect the integrity of assets, and even assess the impact of changes to business and security objectives by providing a data record level audit with full field level before and after values.

“The difficulty in capturing audit data without impacting database performance, particularly when compounded by heterogeneous database environments, make Database Activity Monitoring (DAM) solutions too labor intensive to build and manage without third-party support,” said Adrian Lane, Security Analyst and CTO for Securosis. “Enterprises will do best by leveraging existing platforms, management tools and reports – which address the majority of security and compliance requirements out of the box – so they can focus on the handful of custom policies specific to their organization.”

Key Benefits of PowerBroker Database, Monitor & Audit:

• Privileged user activity monitoring, access reporting and failed logins reporting

• Compliance with internal and external IT control requirements

Advertisement. Scroll to continue reading.

• Reduced cost of compliance

• Increased integrity of business data, system configurations and security controls

• Detailed audit trail of all activity supporting forensic activities

• Segregation of operational and security / compliance activities

By automating entitlement, IT activity reviews and security policy review processes, PowerBroker Database Monitor & Audit simplifies the ability of its customers to implement privilege user monitoring solutions as part of their larger enterprise data and application security processes – while meeting regulatory mandates such as SOX, HIPAA, PCI DSS, GLBA, PCI, FDCC and FISMA. PowerBroker Database is available immediately.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Cyber Insurance

Cyberinsurance and protection firm Boxx Insurance raises $14.4 million in a Series B funding round led by Zurich Insurance.

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...