BLOCKS THE SOURCE OF INTERNAL FILE LEAKAGE
OS ACCESS CONTROL


____


On top of access and permission management features for users, processes, and directories, DB SAFER also performs additional security activities such as auditing task history. It also complies with key Korean personal information regulations.

Complies with key Korean regulations

Act on External Audit
of Stock Companies, etc.
Personal Information Protection
Commission 's Personal Information
Safeguard and security Standard
Financial Services Commission's
regulations on Supervision
of Electronic Financial Transaction
Korea Communications Commission's
Standards for Technical Management
and Protection of Personal Information

Recommends integrated access management
to enhance 
corporate security


Companies can more effectively and strongly manage security by integrating the system access management solution and the DB access management solution

Simplified internal security management
__

DBSAFER OS prevents internal security threats by integrating the policy management process and the location of audit log collection to minimize the repetition in the administrators' tasks so that they can apply security policies consistently.

Quick response to issues through better visibility
__

DBSAFER OS allows administrators to swiftly check activities, abnormalities, and risks of all users in servers, systems, and DB via a single UI and respond at once.


BLOCKS THE SOURCE OF INTERNAL FILE LEAKAGE
OS ACCESS CONTROL

____

On top of access and permission management features for users, processes, and directories, 

DBSAFER OS also performs additional security activities such as auditing task history.

It also complies with key Korean personal information regulations.


Complies with key Korean regulations


Act on External Audit
of Stock Companies etc.







Personal Information
Protection Commission 's Personal Information Safeguard and Security Standard





Financial Services
Commission's regulations
on Supervision of
Electronic Financial Transaction





Korea Communications Commission's Standards
for Technical Management
and Protection of
Personal Information 


Key Features

File access management
·  Can set policies for each file and directory
·  Access management for each type of control
(READ, WRITE, CREATE, DELETE, EXECUTE etc.)
·  Access management for each user
(IP address, login account, security account, access permission, etc.)
·  Access management for each process
(can set policies for each user)
·  Access control for privilege escalation files
(can control access for files configured with  setuid, setgid)
·  Access control for removable disk unit files
(Windows only, can set policies for each user)

Host-based firewall
·  Port-based TCP/UDP (in/outbound) management 
(can control bypassing users and externally connected ports)
·  Port binding management
(can set policies for each TCP/UDP port and user)
·  Access management for each user IP address
·  Access management for each process

Monitoring
·  Access management for files & lookup of user access and activity history based on host-based firewall logs
·  Provides detailed session view on users who passed through DBSAFER
·  File integrity scan
(can set periodic scans for individual or grouped files)
·  Process monitoring and management 
(manages forced termination of processes, can notify the user or restart the process upon termination)
·  System management
(manages server system termination and change of time)
·  Monitors/manages Windows service startup and termination
(Windows only, can set policies for each user)
mobile background
Recommends integrated access management
to enhance corporate security

Companies can more effectively and strongly manage security

by integrating the system access management solution and the DB access management solution

Simplified internal
security management

____

DBSAFER OS prevents internal security threats 

by integrating the policy management process

and the location of audit log collection, to minimize the repetition in the administrators' tasks so that they can apply security policies consistently.

Quick response to issues
through better visibility

____

DBSAFER OS allows administrators to swiftly check activities, abnormalities, and risks of all users

in servers, systems, and DB via a single UI 

and respond at once.


Key Features

File access control


·  Can set policies for each 
   file and  directory

  

·  Access management for 
   each type of control

   (READ, WRITE, CREATE, DELETE, EXECUTE etc.)

 

·  Access management for each user
   (IP address, login account, security     

   account, access permission, etc.)

 

·  Access control for each process
   (can set policies for each user)

 

·  Access control for privilege
   escalation files
   (can control access for files configured
   with setuid, setgid)

 

·  Access control for removable disk 
   unit files
   (Windows only, can set policies

   for each user)

Host-based firewall


·  Port-based TCP/UDP (in/outbound)
   control
   (can control bypassing users and 

   externally connected ports)

 

·  Port binding control
   (can set policies for each TCP/UDP port
   and user)

 

·  Access management for 
   each user IP address

 

·  Access control for each process








Monitoring


·  Access management for files & lookup of
   user  access and activity history based on
   host-based firewall logs

 

·  Provides detailed session view on users
   who passed through DBSAFER

 

·  File integrity scan
   (can set periodic scans for individual or  
   grouped files)

 

·  Process monitoring and management
   (manages forced termination of processes, 
   can notify the user or restart the process   
   upon termination)

 

·  System management
   (manages server system termination 
    and  change of time)

 

·  Monitor/control Windows service
   startup and termination
   (Windows only, can set policies for
   each user)


Related Products

Database Access Management

DBSAFER DB



System Access Management

DBSAFER AM



Integrated Account Management

DBSAFER IM


Encryption Of Unstructured Data

DATACRYPTO



PNPSECURE | 107-86-44093

CEO Cheon-Oh, Park

Tel. 1670-9295 |E-mail sales@pnpsecure.com 

182, Magokseo-ro, Gangseo-gu, Seoul, Republic of Korea (Magok-dong) 


Privacy Policy

Copyright ⓒ 2023 pnpsecure All rights reserved.


PNPSECURE | 107-86-44093

CEO Cheon-Oh, Park

Tel.   1670-9295          E-mail sales@pnpsecure.com

182, Magokseo-ro, Gangseo-gu, Seoul, Republic of Korea (Magok-dong) 


Copyright ⓒ 2023 pnpsecure All rights reserved. |Privacy Policy