Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Oracle Updates Database Firewall, Adds MySQL Support

Less than a year after its previous release, Oracle today announced a new release of Oracle Database Firewall, the database giant’s solution to improve enterprise database security and help enterprises prevent internal and external attacks from reaching their databases.

Less than a year after its previous release, Oracle today announced a new release of Oracle Database Firewall, the database giant’s solution to improve enterprise database security and help enterprises prevent internal and external attacks from reaching their databases.

OracleThe latest edition of Oracle Database Firewall introduces support for MySQL Enterprise Edition, adding to previous support for Oracle Database 11g and earlier releases, IBM DB2 Linux Unix Windows, Microsoft SQL Server, Sybase Adaptive Server Enterprise (ASE) and Sybase SQL Anywhere.

This new release also brings new reporting capabilities, including reports that help organizations more efficiently address regulatory compliance.

So how does the Database Firewall work? To address database threats, Oracle Database Firewall establishes a defensive perimeter around databases, while monitoring and enforcing regular application behavior.

“Oracle Database Firewall examines SQL traffic, creating a specific perimeter around databases,” explained Martin Kuppinger, Founder and Principal Analyst, KuppingerCole. “Based on its grammar-based analytical approach and a well thought out and efficiently manageable policy approach, organizations can relatively quickly implement Oracle Database Firewall while minimizing the risk of disruption to database applications.”

Oracle Database Firewall

SQL Injection or “SQLi” attacks, are a common technique used by attackers that exploit a Web application vulnerability in order to access and extract data from a database. According to a 2011 Web Application Attack Report from Imperva, SQLi attacks represented of 23% of all overall attacks.

Despite the fact that SQL Injection attacks are so prevalent, and by no means new, organizations are still surprisingly vulnerable. In fact, according to a recent Independent Oracle Users Group survey, only 36 percent of respondents said that they have taken steps to ensure their applications are not susceptible to SQL injection attacks.

With protection being extended to MySQL databases, Oracle Database Firewall can help protect against data breaches without requiring any changes to existing applications, database infrastructure, or the operating system of the target database.

Oracle inherited MySQL as part of its acquisition of Sun Microsystems in a deal that closed in January 2010. Sun originally acquired MySQL AB, the open source developer of MySQL, for approximately $1 billion in 2008.

Advertisement. Scroll to continue reading.

“Since most customers are at risk of SQL injection attacks, the Oracle Database Firewall provides much needed security,” said Andy Flower, President of the Independent Oracle User Group. “Oracle Database Firewall is an example of the necessary first line of defense for large and small customers that can monitor database activity and block threats before they even reach the database.

Oracle Database Firewall ScreenshotTo enhance reporting capabilities, Oracle Database Firewall introduces a new reporting infrastructure for running and modifying the layout of existing reports. For customers that use Oracle Business Intelligence Publisher, they can take advantage of all capabilities offered for authoring, managing, and delivering highly formatted documents that can be designed using familiar desktop products, the company said.

The new release introduces 10 new out-of-the-box reports to further help organizations comply with privacy and regulatory mandates such as Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry (PCI) Data Security Standard (DSS) and Sarbanes-Oxley (SOX).

In addition, the new release of the Oracle Database Firewall offers a new “proxy operating mode” that brings increased flexibility in deploying it on the network. New ‘multi-core’ management capabilities offer administrators fine-grained control over the resources allocated to protect specific databases for even greater scalability, Oracle said.

In an effort to help customers adopt a “defense-in-depth strategy”, Oracle Database Firewall is now also integrated with Oracle Advanced Security allowing encrypted traffic to Oracle Databases to be monitored for potential threats.

Oracle Database Firewall complements Oracle Advanced Security, Oracle Audit Vault and Oracle Database Vault.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Artificial Intelligence

ChatGPT is increasingly integrated into cybersecurity products and services as the industry is testing its capabilities and limitations.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Compliance

Government agencies in the United States have made progress in the implementation of the DMARC standard in response to a Department of Homeland Security...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...