한국정보통신 로고

sub visual sub visual sub visual sub visual sub visual sub visual sub visual sub visual sub visual sub visual

DB Vulnerability Analysis

Database Vulnerability
Assessment Software

As a database vulnerability assessment solution, Cyclone helps to improvement of the whole security level for database.

As a database vulnerability assessment solution, Cyclone suggests improvement measures that scan the hidden DBMS’s vulnerabilities and remove detected the vulnerabilities by Penetrations Test and Security Auditing.

[TTA – GS Certificate & VeriTest Performance Test certified]
· Cyclone provides Online Upgrade for upgrading the latest database vulnerabilities & application features.
· The urgent vulnerabilities are upgraded through the internet time to time, and a bug fix or feature upgrading is automatically performed quarterly one time/ yearly four times.
DB Information Gathering on the network
• Vulnerability Scan via Penetration Test
   - Protocol vulnerabilities and possibility of password attack
  - Buffer Overflow and possibility of DDoS
•Vulnerability Scan via Security Auditing
  - Vulnerabilities of authentication and authority, integrity of OS and Application
  - Backup & Patch mismanagement
Detect vulnerable database accounts by checking password cracking
• Automatically gather confidential information via Personal Information Scan feature
• Remove vulnerabilities
  - Generate (Fix Script)
  - DBMS Patch Guide
• Report
  - Summary/ vulnerability details/ comparison of before and after
Online Update for recent vulnerabilities

DBMS supported
by Cyclone
Oracle IBM DB2 MS SQL Sybase Mysql
Version 7,8,8i,9i, 9i R2, 10g, 10 R2, 11g UDB V8, V9 V6.5, V7, V2000, V2005,  V2008 Over ASE V12.x V4, V5

Cyclone Installation Environment Windows DBMS Installation as target for Vulnerability Analysis
Desktop Software 2000, XP, Vista No additional SW required in the DBMS server

Cyclone Operation Environment OS & H/W recommended
  OS : Windows all version
Process : Pentium4 1.5 GHz or higher
Memory : 512 MB or higher, Recommended Disk : 1GB or higher
Network : 100Mbps or higher

• Automatic scan of DB server existing in the Network
• Various vulnerability collection, including Penetration Test, Auditing Tests, Password Attack and Personal Information Scan
• Provide Fix Script & Patch guide to remove vulnerabilities
• Collection and check of new vulnerabilities via Online Update
• Easy to identify the DBMS assets
• Provide the guide to ensure that the latest patches are always maintained so to help operate DBMS more safely
• Inspect safety with Penetration Testing that detects vulnerabilities for risks from outside as simulated attacks of invasion to the database.
• Provide data to meet requirements for various kinds of IT Compliance by providing well-organized vulnerability reports with Cyclone’s "Report" feature

한국정보시스템 로고

22, Gukhoe-daero 70-gil, Yeongdeungpo-gu, Seoul(150-871 Geumgang Bldg. 8F, Yeouido-gu)  TEL : +82-2-2162-1000  FAX : +82-2-2162-1009
Branch Address : 66,210 Dunsanjung-ro, Seo-gu, Daejeon  Branch Tel : +82-42-485-0788  Branch Fax : +82-42-485-0784
www.kis.co.kr  CEO : Won Bae Jeon   Main Businessman registered number: 107-88-02893  Branch Businessman registered number : 314-85-51763
Copyright (C) 2014 KIS All Right Reserved.