Reliable Protection for Information in Databases
- LANGUAGE: English DATE: Tuesday, April 12, 2011 TIME: 4pm CET, 10am ET, 3pm GMT
The Database as Your Central Layer of Protection
How to best protect data? This is about processes, this is about technology. Whilst Database Governance focuses on the big picture, technology enables the required controls. Amongst them, encryption is a key technology – supporting critical controls to prevent by-passing the access controls mechanisms within databases and in the surrounding system environment. In this webinar, Martin Kuppinger will outline how Database Security solutions fit into the approach of Database Governance, which role encryption technologies play therein, and what it needs for a holistic approach on Database Security. Roxana Bradescu of Oracle will talk more in detail about how to implement encryption in Database Security, with respect to key management, protection of data at rest and in transit, and strong authentication.
Most sensitive information is held in databases – and numerous breaches have been reported for sensitive information held in databases. With an increasing number of privacy and regulatory mandates such as Sarbanes-Oxley, PCI-DSS (Payment Card Industry Data Security Standard), and many others, protecting your databases is a key issue. Database Governance as a structured concept for securing database information and Database Security to technically implement and enforce the security policies and controls are a must for any organization. Within this, encryption and strong authentication for data at rest as well as data in motion are key elements. Encryption is required by an increasing number of regulations and from the overall governance standpoint. The webinar will discuss the consequences of not encrypting data, the regulatory trends, and the approaches for encrypting data without impacting performance and usability.
In this webinar, Martin Kuppinger will outline how Database Security solutions fit into the approach of Database Governance, which role encryption technologies play therein, and what it needs for a holistic approach on Database Security – including the layers surrounding the databases like the applications, the operating system, and the network. He will provide rules for best practices and a structured approach on how to move forward towards and within the field of Database Security. Within that he will also present his view on strong authentication, encryption, and key management issues as specific aspects within this topic.
Roxana Bradescu of Oracle will talk more in detail how Oracle Advanced Security provides a complete solution for transparent database encryption which protects data at rest, in transit, and on backup. She will explain how the built-in key management means there is no need to deploy separate key management infrastructure, and how integration with the Oracle database ensures performance and easy deployment requiring no changes to existing applications.
The Identity-as-a-Service (IDaaS) market continues to develop with a significant push from organizations looking to adopt cloud-based delivery of security services including IAM. While IDaaS Access Management solutions, providing SSO (Single Sign-On) for the users and access to a variety of services are already established, IDaaS IGA is not as widely used yet. However, shifting IGA (Identity Governance and Administration) capabilities, e.g. Identity Lifecycle Management and Access Governance, to the cloud might provide significant benefits regarding time and cost of deploying and operating IGA.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.