Business Challenges

  • Automating Auditing
  • Separation of Duties
  • Cutting IT Costs
  • Improving Security
  • Regulation Compliance
    • Sarbanes-Oxley
    • HIPAA
    • CA SB 1386/1950
    • GLBA
    • Basel II
    • PCI
    • FDA Regulations
  • Business Process Outsourcing
  • Insider Threats
  • Reputation Management
  • Web Application Anonymity
  • The 4 W's: Who, What, Where, and When
  • Auditing Corporate Information

We can help you meet
these challenges!

Free Resources

New Window: Click to read PDF Article
Free PDF: eWeek Article: IT Pros Say They Can't Stop
Data Breaches
(We can help)

Register for a personal
Web Briefing

PDF Literature
Who is accountable now?
SOX, GLBA, HIPAA, FDA Compliance

DBI Performance Solutions

Data Breaches

Brother-WatchDog logo

Automated Database Auditing for SQL Server and DB2 LUW

Simply stated, Brother-WatchDog® for SQL Server and DB2 LUW automates native database auditing tasks by simplifying audit configuration with a graphical UI, automatically managing space utilized on the audited database server, applying digital signatures to audit data ("tamper evident seals") to harden the audit trails, and by providing dozens of audit activity reports out of the box. Audit data is captured to a separate audit repository database to achieve separation of duties. Smart automated configuration wizards help ensure that necessary audit data is captured while minimizing performance overhead ordinarily associated with business auditing requirements.

The Brother-WatchDog V1.4 Solution: Digital Database Surveillance & Auditing

Watch 21st Century Business with Alexander Haig (4 Minutes)

Brother-WatchDog's patent pending, breakthrough technology tracks access and updates to corporate database data according to your unique Business Challenges. Like a video camera, Brother-WatchDog relentlessly captures and records all configured data activities to create immutable audit trails and hold privileged users accountable. More specifically, web application end user identities and locations can be captured, exposed, and correlated to their database statement activities, giving you the power to hold ALL (DBA's, Decision Analysts, Clients, and Application Users) privileged users accountable and answer tough questions:

  • Who initiated data access or updates (Web Users, Client Users, Decision Analysts, Database Administrators, SYS, SYSDBA, SYSOPER, and SYSADMIN)
  • What data was accessed or updated (XQuery or SQL statement texts, plus bind variable values for prepared statements)
  • Where the activity originated from (IP Address)
  • When the database activity occurred (date and time)
  • How much data was impacted (number of records read, fetched, or written (DB2 LUW only))
  • Whether the access or update succeeded or failed
  • What was the cost of the activity (CPU time used (DB2 LUW only))

Brother-WatchDog does not rely on unreliable network sniffing.   Instead, its US Patent Pending technology utilizes:

  1. An unobtrusive Web Server “zap” that captures end user identity and location “fingerprint” information (no application changes are required), and passes this fingerprint into the database via the existing connection pool where Brother-WatchDog correlates the identity to its statement activities.
  2. The lowest possible overhead audit data capture methods which are automatically configured depending on your Business Challenges and requirements
  3. Tamper evident seals (digital signatures) to assure management and auditors that the audit data accurately reflects genuine database activities
  4. A portfolio of "out-of-the-box" built-in reports to provide immediate value and insight into suspicious and actionable database activities
  5. Easy, flexible, simple, and highly customizable ad hoc reporting capabilities to quickly find "needles in haystacks" or perform forensic research
  6. Configurable email alerts and notifications
  7. Built-in compression minimizes active audit repository storage requirements
  8. Cross database heterogeneous database audit capability enables audit reporting across the organization

Get Started - FREE Proof of Concept (POC)

  • As a software solution (with no extra hardware to buy), Brother-WatchDog's price is much lower than you might expect! We'll beat any competitor's legitimate quote!
  • Typical Proof of Concept installations are completed in 1-2 days. No Charge!
    • Our network sniffing appliance competitor's may try to steer you away from Native Database Auditing methods due to alleged high overhead. This is nonsense. Our business is databases and we know how to make them perform well! Contact DBI for your FREE Proof of Concept to discover the depth and accuracy of Brother-WatchDog's reporting and measure its nominal overhead, if any.

WHO – WHERE – WHAT – WHEN – HOW MUCH – Accountability Achieved!