In most DB implementations you: a) know the nodes and b) trust the nodes.
In a permissioned DLT you: a) know the nodes but b) don't trust the nodes.
In an unpermissioned DLT you : a) don't know the nodes and b) don't trust the nodes.
It's a spectrum of what you are trying to accomplish with a DLT. With CULedger for example, hashgraph is being used because the nodes know each other and agree to engage, but they don't necessarily trust each other in the sense that their interests may not be perfectly aligned.
To be clear, hashgraph is a consensus layer right now. There are plenty of features that would still need to be sorted before it would be ready for an unpermissioned implementation: stake issuance/allocation, node mgt (including node reconnect), user/account mgt, etc. As a consensus layer, hashgraph is as "secure" as the application you build on top of it. I put "secure" in quotes only because I understand that means different things to different people. The consensus layer itself is cryptographically sound...it's just a question of how you report and consume transactions (which are just byte arrays).
To take it a step further...could you implement a Cassandra cluster with distributed nodes and permissioning that allowed nodes to play with each other without trusting each other? Maybe. I'll admit I don't know if there is support for untrusted distributed nodes, but I do know that most DLTs were built with that purpose in mind.
Great question btw.