Automated Database Auditing for Oracle and DB2 LUW
Simply stated, Brother-WatchDog® for Oracle and DB2 LUW automates native
database auditing tasks by simplifying audit configuration with a
graphical UI, automatically managing space utilized on the audited
database server, applying digital signatures to audit data
("tamper evident seals") to harden the audit trails, and by
providing dozens of audit activity reports out of the box. Audit data is
captured to a separate audit repository database to achieve separation of
duties. Smart automated configuration wizards help ensure that necessary
audit data is captured while minimizing performance overhead ordinarily
associated with business auditing requirements.
The Brother-WatchDog V1.4 Solution: Digital Database Surveillance & Auditing
Watch 21st Century Business with Alexander Haig (4 Minutes)
Brother-WatchDog's patent pending, breakthrough technology tracks access and updates to corporate database data according to your unique Business Challenges. Like a video camera, Brother-WatchDog relentlessly captures and records all configured data activities to create immutable audit trails and hold privileged users accountable. More specifically, web application end user identities and
locations can be captured, exposed, and correlated to their database statement activities, giving you the power to hold ALL (DBA's, Decision Analysts, Clients, and Application Users) privileged users accountable and answer tough questions:
Who initiated data access or updates (Web Users, Client Users, Decision Analysts, Database Administrators, SYS, SYSDBA, SYSOPER, and SYSADMIN)
What data was accessed or updated (XQuery or SQL statement texts, plus bind variable values for prepared statements (Oracle only))
Where the activity originated from (IP Address)
When the database activity occurred (date and time)
How much data was impacted (number of records read, fetched, or written (DB2 LUW only))
Whether the access or updatesucceeded or failed
What was the cost of the activity (CPU time used (DB2 LUW only))
Brother-WatchDog does not rely on unreliable network sniffing. Instead, its US Patent Pending technology utilizes:
An unobtrusive Web Server “zap” that captures end user identity and location “fingerprint” information (no application changes are required), and passes this fingerprint into the database via the existing connection pool where Brother-WatchDog correlates the identity to its statement activities.
The lowest possible overhead audit data capture methods which are automatically configured depending on your Business Challenges and requirements
Tamper evident seals (digital signatures) to assure management and auditors that the audit data accurately reflects genuine database activities
A portfolio of "out-of-the-box" built-in reports to provide immediate value and insight into suspicious and actionable database activities
Easy, flexible, simple, and highly customizable ad hoc reporting capabilities to quickly find "needles in haystacks" or perform forensic research
Configurable email alerts and notifications
Built-in compression minimizes active audit repository storage requirements
Cross database heterogeneous database audit capability enables audit reporting across the organization
Get Started - FREE Proof of Concept (POC)
As a software solution (with no extra hardware to buy), Brother-WatchDog's price is much lower than you might expect!
We'll beat any competitor's legitimate quote!
Typical Proof of Concept installations are completed in 1-2 days. No Charge!
Our network sniffing appliance competitor's may try to steer you away from Native Database Auditing methods due to
alleged high overhead. This is nonsense. Our business is databases and we know how to make them perform well!
Contact DBI for your FREE Proof of Concept to discover
the depth and accuracy of Brother-WatchDog's reporting and measure its nominal overhead, if any.
WHO – WHERE – WHAT – WHEN – HOW MUCH – Accountability Achieved!