HOME     MENU     SEARCH     NEWSLETTER    
CUSTOMER RELATIONSHIP MANAGEMENT NEWS. UPDATED 10 MINUTES AGO.
You are here: Home / Press Releases / DB Honored for Security Hardware
Expand your opportunites
Obtain an ISACA® certification and accelerate your IS/IT career.
Register for an Exam Today
DB Networks Honored for Intelligent Security Appliance
DB Networks Honored for Intelligent Security Appliance
News as reported by the company Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
JUNE
26
2014



DB Networks honored as Gold winner at the 9th Annual 2014 Hot Companies and Best Products Award Ceremony -- The Information Technology Industry’s Coveted Hot Companies and Best Products Award Nominees from Around the World were Honored by Network Products Guide

SAN DIEGO, June 26, 2014 -- DB Networks, an innovator of behavioral analysis in database security, announced today that Network Products Guide, the industry's leading technology research and advisory guide, has named the IDS-6300 a Gold winner of the 9th Annual 2014 Hot Companies and Best Products Awards for the Best Security Hardware Award.

The IDS-6300 intelligent security appliance is the industry's first next-generation Core Intrusion Detection System (IDS) based on behavioral analysis for advanced SQL injection intrusion detection, database discovery, and application/database mapping.

The annual Hot Companies and Best Products recognition program encompasses the world’s best in organizational performance, products and services, hot technologies, executives and management teams, successful deployments, product management and engineering, customer satisfaction, and public relations in every area of information technology. The achievements and recognition awards program garners active participation from a broad spectrum of industry voices from around the world.

“DB Networks is honored to be recognized by the Network Products Guide for our IDS-6300,“ said Brett Helm, Chairman and CEO of DB Networks. “The IDS-6300 enables organizations to immediately identify advanced SQL injection attacks that have slipped past their perimeter security defenses.“

About Network Products Guide Awards

As industry’s leading technology research and advisory publication, Network Products Guide plays a vital role in keeping decision makers informed of the choices they can make in information technology. You will discover a wealth of information and tools in this guide including the best products and services, roadmaps, industry directions, technology advancements and independent product evaluations that facilitate in making the most pertinent technology decisions impacting business and personal goals. The guide follows conscientious research methodologies developed and enhanced by industry experts. To learn more, visit http://www.networkproductsguide.com.

About DB Networks

DB Networks® is innovating behavioral analysis technology in the field of database security. Developed for organizations that need to protect their data from advanced attacks, including Zero-Day attacks, DB Networks offers effective countermeasures against SQL injection attacks. Database attacks happen rapidly -- in a matter of minutes -- and bypass traditional perimeter security measures. DB Networks’ unique approach uses behavioral analysis technology to automatically learn each application’s proper SQL statement behavior. Any SQL statement dispatched from the application that deviates from the established behavioral model immediately raises an alarm as a possible attack. DB Networks is a privately held company headquartered in San Diego, Calif. For more information, see http://www.dbnetworks.com, or call (800) 598-0450

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY INTEREST YOU
5 Cyber Security Predictions for 2015: Imperva's comprehensive security portfolio has been protecting the high-value applications and data assets at the heart of the enterprise since 2002. Imperva has tremendous knowledge about cyber security and the origins and nature of cyber attacks. Click here to learn their top 5 Cyber Security Predictions for 2015.
MORE IN PRESS RELEASES
Product Information and Resources for Technology You Can Use To Boost Your Business

NETWORK SECURITY SPOTLIGHT
China has laid down some new rules requiring foreign firms to hand over proprietary source code and adhere to its encryption algorithms. U.S. businesses want "urgent discussions" on the new regs.

© Copyright 2015 NewsFactor Network, Inc. All rights reserved. Member of Accuserve Ad Network.