Reliable Protection for Information in Databases

  • LANGUAGE: English DATE: Tuesday, April 12, 2011 TIME: 4pm CET, 10am ET, 3pm GMT
Upcoming Webinars

The Database as Your Central Layer of Protection

How to best protect data? This is about processes, this is about technology. Whilst Database Governance focuses on the big picture, technology enables the required controls. Amongst them, encryption is a key technology – supporting critical controls to prevent by-passing the access controls mechanisms within databases and in the surrounding system environment. In this webinar, Martin Kuppinger will outline how Database Security solutions fit into the approach of Database Governance, which role encryption technologies play therein, and what it needs for a holistic approach on Database Security. Roxana Bradescu of Oracle will talk more in detail about how to implement encryption in Database Security, with respect to key management, protection of data at rest and in transit, and strong authentication.

Most sensitive information is held in databases – and numerous breaches have been reported for sensitive information held in databases. With an increasing number of privacy and regulatory mandates such as Sarbanes-Oxley, PCI-DSS (Payment Card Industry Data Security Standard), and many others, protecting your databases is a key issue. Database Governance as a structured concept for securing database information and Database Security to technically implement and enforce the security policies and controls are a must for any organization. Within this, encryption and strong authentication for data at rest as well as data in motion are key elements. Encryption is required by an increasing number of regulations and from the overall governance standpoint. The webinar will discuss the consequences of not encrypting data, the regulatory trends, and the approaches for encrypting data without impacting performance and usability.

In this webinar, Martin Kuppinger will outline how Database Security solutions fit into the approach of Database Governance, which role encryption technologies play therein, and what it needs for a holistic approach on Database Security – including the layers surrounding the databases like the applications, the operating system, and the network. He will provide rules for best practices and a structured approach on how to move forward towards and within the field of Database Security. Within that he will also present his view on strong authentication, encryption, and key management issues as specific aspects within this topic.

Roxana Bradescu of Oracle will talk more in detail how Oracle Advanced Security provides a complete solution for transparent database encryption which protects data at rest, in transit, and on backup. She will explain how the built-in key management means there is no need to deploy separate key management infrastructure, and how integration with the Oracle database ensures performance and easy deployment requiring no changes to existing applications.


Speakers


Gold Sponsor

Oracle Identity Management's best-in-class suite of IdM solutions delivers the industry's only hot-pluggable middleware, allowing enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. With Oracle Identity Management, you enjoy:
Comprehensive, best-in-class solution—An integrated offering of highly acclaimed and innovative products, Oracle Identity Management offers the highest return on your investments with improved security, lower administrative costs, high scalability, and the backing of an industry leader.
Security for heterogeneous environments—"Hot-Pluggable" Oracle solutions interoperate with all major systems to ensure enterprise-wide security for all your applications.
Sustainable compliance—Innovative features fully integrated with your identity management infrastructure automate key processes to reduce audit cycles and dramatically lower costs.
In addition, Oracle Identity management is leading the next wave of Identity Management with an Application-Centric approach.

Watch now

Downloads

Presentation, Martin Kuppinger

Presentation, Oracle

Webcast download

Popular Webcasts

Next Webinar

Webinar

Upgrade your IAM with IDaaS IGA

The Identity-as-a-Service (IDaaS) market continues to develop with a significant push from organizations looking to adopt cloud-based delivery of security services including IAM. While IDaaS Access Management solutions, providing SSO (Single Sign-On) for the users and access to a variety of services are already established, IDaaS IGA is not as widely used yet. However, shifting IGA (Identity Governance and Administration) capabilities, e.g. Identity Lifecycle Management and Access Governance, to the cloud might provide significant benefits regarding time and cost of deploying and operating IGA.

Next Conference

Congress

European Identity & Cloud Conference 2020

Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00