Trustwave AppDetectivePRO is a database and big data store scanner that can immediately uncover configuration mistakes, identification and access control issues, missing patches or any toxic combination of settings that could lead to escalation-of-privilege or denial-of-service attacks, data leakage or unauthorized modification of data.
Because of its simple setup and intuitive interface, you don’t have to be a database expert to use it. Immediately discover, assess and report on the security, risk or compliance posture of any database or big data store within your environment – either on premise or in the cloud – within minutes.
The quality of a database security solution directly correlates with the quality of its checks and tests. And a set of tests and checks is only as good as the research team that keeps it current. Trustwave SpiderLabs® is the leading database vulnerability research team in the industry and discovered 80 percent of the database vulnerabilities patched over the past four years. Our experts have discovered and reported hundreds of vulnerabilities in Oracle databases and dozens in Microsoft SQL Server, IBM DB2, MySQL, Sybase ASE and Hadoop.
What AppDetectivePRO Brings to You
Trustwave AppDetectivePRO allows you to.
Agentless Automated Data Scanning
Discover, assess and report on the security, risk or compliance posture of any database or big data store across your environment – on premises or in the cloud – in minutes.
Complete, Accurate and Intuitive
Automate inventory, testing, information gathering and analysis to empower you with the intelligence needed to harden your data warehouses.
Automated Questionnaire Development
Gain the flexibility to create new data security controls or customize from existing pre-built controls based on industry standards and regulatory requirements.
Auditing and User Rights Review
Acquire insight into your auditors’ findings even before the audit by using the database tool most frequently used by them.
Assessment and Remediation Management
Close the loop on issues, from the initial discovery of databases and big data stores to the fixing of critical vulnerabilities or policy violations.
Data Security Knowledgebase
Access extensive and continuously updated analytics and a knowledgebase of best practices, configuration settings and vulnerabilities