HOME

TheInfoList



OR:

DB Networks is a privately held
Information Security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
company founded in the United States The company is headquartered in
San Diego San Diego ( , ) is a city on the Pacific coast of Southern California, adjacent to the Mexico–United States border. With a population of over 1.4 million, it is the List of United States cities by population, eighth-most populous city in t ...
,
California California () is a U.S. state, state in the Western United States that lies on the West Coast of the United States, Pacific Coast. It borders Oregon to the north, Nevada and Arizona to the east, and shares Mexico–United States border, an ...
, and its regional offices are located in
Palo Alto Palo Alto ( ; Spanish language, Spanish for ) is a charter city in northwestern Santa Clara County, California, United States, in the San Francisco Bay Area, named after a Sequoia sempervirens, coastal redwood tree known as El Palo Alto. Th ...
,
California California () is a U.S. state, state in the Western United States that lies on the West Coast of the United States, Pacific Coast. It borders Oregon to the north, Nevada and Arizona to the east, and shares Mexico–United States border, an ...
and
Seattle Seattle ( ) is the most populous city in the U.S. state of Washington and in the Pacific Northwest region of North America. With a population of 780,995 in 2024, it is the 18th-most populous city in the United States. The city is the cou ...
, Washington. In May 2018, DB Networks announced that it will change its company name to DB CyberTech.


History

DB Networks was founded in United States in 2009 to provide
database security Database security concerns the use of a broad range of information security controls to protect databases against compromises of their confidentiality, integrity and availability. It involves various types or categories of controls, such as tech ...
including database infrastructure assessment, compromised credential identification, and
SQL injection In computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injec ...
defense, predominantly to the financial services industry and federal government. The company was initially financed by
Angel investors An angel investor (also known as a business angel, informal investor, angel funder, private investor, or seed investor) is an individual who provides capital to a business or businesses, including startups, usually in exchange for convertible debt ...
. In 2012 the company raised $4.5M in
venture capital Venture capital (VC) is a form of private equity financing provided by firms or funds to start-up company, startup, early-stage, and emerging companies, that have been deemed to have high growth potential or that have demonstrated high growth in ...
from
Khosla Ventures Khosla Ventures is a private American venture capital firm based in Menlo Park, California. It was founded by entrepreneur Vinod Khosla in 2004. The firm works with early-stage companies in the Internet, computing, mobile technology, artifici ...
. In 2014 the company closed a $17 Million round of funding led by Khosla Ventures and Grotech Ventures. The company's first product, the ADF-4200, was launched in February 2013. Also in February 2013 the company announced a partnership with Alamo City Engineering Services (ACES) to offer its products to the
US Military The United States Armed Forces are the military forces of the United States. U.S. federal law names six armed forces: the Army, Marine Corps, Navy, Air Force, Space Force, and the Coast Guard. Since 1949, all of the armed forces, except th ...
and civilian federal agencies. In October 2013 the company announced the IDS-6300, later renamed DBN-6300, originally as a
SQL injection In computing, SQL injection is a code injection technique used to attack data-driven applications, in which malicious SQL statements are inserted into an entry field for execution (e.g. to dump the database contents to the attacker). SQL injec ...
defense and database infrastructure security product. In 2013 DB Networks was invited to join the Cync
cybersecurity Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
technology program under the direction of
Northrop Grumman Northrop Grumman Corporation is an American multinational Aerospace manufacturer, aerospace and Arms industry, defense company. With 97,000 employees and an annual revenue in excess of $40 billion, it is one of the world's largest Arms industry ...
and the
University of Maryland, Baltimore County The University of Maryland, Baltimore County (UMBC) is a Public university, public research university in Catonsville, Maryland named after Baltimore County, Maryland, Baltimore County. It had a fall 2022 enrollment of 13,991 students, 61 un ...
Research Park Corporation. The Cync program identifies innovative technologies to combat cybersecurity threats. In 2014 AMP Tech Solutions was announced as a channel partner to offer DB Network products through the NASA Solutions for Enterprise-Wide Procurement (SEWP) IV contract to the United States federal agencies. In 2015 DB Networks was awarded two United States patents for their database security technologies. DB Networks began licensing their database security software and technologies to original equipment manufacturers ( OEMs) in February 2016 coinciding with the launch of their Layer 7 Database Sensor. Partnerships have been announced with
FireEye Trellix (formerly FireEye and McAfee Enterprise) is a privately held cybersecurity company that was founded in 2022. It provides hardware, software, and services to investigate cybersecurity attacks, protect against malicious software, and ana ...
, Cyphort, and Security On-Demand.


Technology

DB Networks database security technology is based on
machine learning Machine learning (ML) is a field of study in artificial intelligence concerned with the development and study of Computational statistics, statistical algorithms that can learn from data and generalise to unseen data, and thus perform Task ( ...
and behavioral analysis as opposed to the traditional information security approach requiring human generated blacklists or
whitelist A whitelist or allowlist is a list or register of entities that are being provided a particular privilege, service, mobility, access or recognition. Entities on the list will be accepted, approved and/or recognized. Whitelisting is the reverse of ...
s. The machine learning and behavioral analysis platform learns each applications' proper SQL transaction behavior. Compromised credentials and rogue SQL statements, such as a SQL injection attack, will deviate from the established model and will raise an alarm as a database attack. Machine learning and behavioral analysis technologies have the ability to prevent advanced and zero-day database attacks without prior threat intelligence or the need to establish and maintain signature files of known attack strings.


Products

DB Networks DBN-6300 was announced in October 2013 (originally referred to as the IDS-6300). The DBN-6300 is a 2U purpose-built database security appliance. It uses machine learning and behavioral analysis to identify database attacks in real-time. A
virtual appliance A virtual appliance is a pre-configured virtual machine image, ready to run on a hypervisor; virtual appliances are a subset of the broader class of software appliances. Installation of a software appliance on a virtual machine and packaging that ...
version of the DBN-6300 was launched in February 2014, now referred to as the DBN-6300v. The Layer 7 Database Sensor was launched in February 2016. The Layer 7 Database Sensor enables other information security product manufactures to integrate DB Networks database security technology into their products. In March 2016, "insider threat" protection capabilities were added to the DBN-6300 and Layer 7 Database Sensor products.


See also

*
SQL Structured Query Language (SQL) (pronounced ''S-Q-L''; or alternatively as "sequel") is a domain-specific language used to manage data, especially in a relational database management system (RDBMS). It is particularly useful in handling s ...
*
Relational database A relational database (RDB) is a database based on the relational model of data, as proposed by E. F. Codd in 1970. A Relational Database Management System (RDBMS) is a type of database management system that stores data in a structured for ...
*
Information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
*
Digital forensics Digital forensics (sometimes known as digital forensic science) is a branch of forensic science encompassing the recovery, investigation, examination, and analysis of material found in digital devices, often in relation to mobile devices and com ...
* Code injection *
Cyberwarfare Cyberwarfare is the use of cyberattack, cyber attacks against an enemy State (polity), state, causing comparable harm to actual warfare and/or disrupting vital computer systems. Some intended outcomes could be espionage, sabotage, propaganda, ...


References


External links

* {{Official website, http://www.dbnetworks.com Computer security software companies Networking companies Server appliance Software companies established in 2009 Companies based in San Diego Networking companies of the United States Technology companies of the United States