Contact us:

 

SQL SERVER SECURITY AND

PERMISSIONS

 

 

IDERA SQL SECURE OVERVIEW

 

Idera SQL Secure is a security analysis solution that identifies SQL Server security violations and ensures security policies are enforced. Find out who has access to what and identify each user’s effective rights across all SQL Server objects. Alert on violations of your corporate policies, monitor changes made to security settings, and provide security audit reports as well as recommendations on how to improve your security model.

 

  • ✔ Identify vulnerabilities and harden security across your SQL Server

  • ✔ Diagnose and protect against violations of your security policies and security best practices

  • ✔ Analyze and manage user permissions across all SQL Server objects with our powerful security model analysis

  • ✔ Provides customizable templates for CIS, DISA STIG, and regulatory standards such as PCI and HIPAA

 

Identify Vulnerabilities

Understand who has access to what and identify each user’s effective rights across all SQL Server objects. Drill down by user or group to shed light on areas where security vulnerabilities may exist or have a chance of developing. Use the report catalog to track vul­nerabilities, security changes, and user entitlement over time.

 

Set Strong Security Policies

View a complete history of SQL Server security set­tings and designate a baseline to compare against future changes, providing a valuable audit trail for forensic analysis.

 

Prevent Security Violations

SQL secure provides an Idera defined Level 2 security check for balanced intrusion protection that leverages MSBPA and CIS guidelines, and more. The security report card identifies top security vulnerabilities on your servers. Each security check is categorized as High, Medium, or Low Risk. You can drill into each security check to get more detail.

 

Analyze User Permissions

Analyze membership to powerful server roles and groups such as administrators, systems administrators, and security administrators to ensure the level of access is warranted. From a group, see the list of group members and select a member for further analysis. From a user, see the group memberships and drill upwards to view inherited permissions.

 

Security Templates

We’ve taken the security standards most companies are held accountable to and developed customizable templates to extract the information needed to satisfy security auditor’s requirements. Choose from templates for PCI, HIPAA, and FERPA which leverage guidelines from STIG and CIS.

 

FEATURES

 

SECURITY ANALYSIS

 

Effective Rights Analysis

Analysis of users’ effective rights shows you how and where each right is granted, making it easy to pinpoint exactly what changes need to be made in order to close security holes.

 

Database Roles Permissions

View SQL Server role members and sub-roles assigned and their effective permissions.

 

Server Object Settings

Browse and analyze all files, directories and registry settings associated with SQL Server and determine ownership as well as explicit and inherited security rights.

 

Weak password detection

Analyzes password health of SQL Server logins and reports on when passwords are weak or blank which would cause a susceptible to intrusion situation.

 

Surface area and protocols

Identify services, ports, protocols and API's that may allow SQL Server to be attacked by a malicious user. Enables you to understand and standardize which services you really need started or activated in your environment in order to reduce risk.

 

SECURITY REPORTING

 

Pre-defined Policy Templates

Combines the most well known industry standards into 3 distinct levels, (Basic-Balanced-Strong) that define realistic guidelines for protecting SQL Server from the most common intrusion attacks.

 

Reporting Services

Shows details of services such as log-on and configuration.

 

Security Scorecard

Lists potential security concerns on your SQL Servers such as cross-database chaining and allows you to drilldown to view the full details of the diagrammed relationships.

 

History and Base-lining

The SQL Secure repository keeps a complete history of SQL Server security settings, providing the ability to designate a baseline to compare against future snapshots to detect changes. This also provides a valuable audit trail for forensic analysis.

 

Powerful Reporting

Built-in standard reports provide detailed information for security auditing and compliance purposes. Produce custom reports detailing the specific information required for SLA’s or perform custom analysis via the data stored on the SQL Secure repository. Data can be extracted and imported to Excel.

 

ENTERPRISE MANAGEMENT

 

Central Console

Provides an easy-to-use single point of control to manage the creation of collection rules and policies, view risks and assessments, monitor collection history, analyze user access rights and much more.

 

Configurable Data Collection

Define exactly what SQL Server security information you want to gather and when. Gathers from SQL Server, OS, File System, Registry and Active Directory.

 

Central Repository

All security data collected by SQL Secure is stored in a central repository for easy reporting and forensic analysis.

 

Flexible Views

Use the flexible grid view to audit and analyze user permissions. Sort, group, or export all SQL Server logins in your enterprise. View all users' assigned and effective rights and permissions at the server, database and object level.

 

 

 

Go to IDERA SQL Secure | Datasheet | The Word on the Streets

 

Request for pricing quotation email us at  Idera@ensbn.com