Network Security Solution Provider
AppDetectivePro
Trustwave AppDetectivePro
Trustwave AppDetectivePRO is a database and big data store scanner that can immediately uncover configuration mistakes, identification and access control issues, missing patches or any toxic combination of settings that could lead to escalation-of-privilege or denial-of-service attacks, data leakage or unauthorized modification of data.
​
Because of its simple setup and intuitive interface, you don't have to be a database expert to use it. Immediately discover, assess and report on the security, risk or compliance posture of any database or big data store within your environment – either on premise or in the cloud – within minutes.
​
The quality of a database security solution directly correlates with the quality of its checks and tests. And a set of tests and checks is only as good as the research team that keeps it current. Trustwave SpiderLabs® is the leading database vulnerability research team in the industry and discovered 80 percent of the database vulnerabilities patched over the past four years. Our experts have discovered and reported hundreds of vulnerabilities in Oracle databases and dozens in Microsoft SQL Server, IBM DB2, MySQL, Sybase ASE and Hadoop.
Features
Discover
Assess and Monitor
Report
-
Review: Seamlessly survey your environment's accessible assets, user access levels and security feature usage.
-
Inventory: Identify and highlight recently added, rogue or missing data store installations and objections.
-
Verification: Quickly ascertain the configuration state of all of your data stores (relational or big data).
-
Flexibility: Obtain an agentless assessment approach with no impact on the target data store.
-
Reference Center: Access a comprehensive and continuously updated library of relational database and big data store vulnerability and security configuration issues – backed by our elite SpiderLabs research team.
-
Customization: Examine data stores for issues related to vulnerabilities, misconfigurations and user rights, thanks to built-in, personal policies.
-
Visibility: Gain a consolidated view of vulnerabilities, threats, risks and compliance efforts across varied data store environments – through reports and dashboards.
-
Empowerment: Document your current status, and demonstrate progress, effectiveness and operational efficiency.
-
Granular: Evaluate trends and drill down for a comprehensive view of each individual database or group of databases.