Reliable Protection for Information in Databases
- LANGUAGE: English DATE: Tuesday, April 12, 2011 TIME: 4pm CET, 10am ET, 3pm GMT
How to best protect data? This is about processes, this is about technology. Whilst Database Governance focuses on the big picture, technology enables the required controls. Amongst them, encryption is a key technology – supporting critical controls to prevent by-passing the access controls mechanisms within databases and in the surrounding system environment. In this webinar, Martin Kuppinger will outline how Database Security solutions fit into the approach of Database Governance, which role encryption technologies play therein, and what it needs for a holistic approach on Database Security. Roxana Bradescu of Oracle will talk more in detail about how to implement encryption in Database Security, with respect to key management, protection of data at rest and in transit, and strong authentication.
Most sensitive information is held in databases – and numerous breaches have been reported for sensitive information held in databases. With an increasing number of privacy and regulatory mandates such as Sarbanes-Oxley, PCI-DSS (Payment Card Industry Data Security Standard), and many others, protecting your databases is a key issue. Database Governance as a structured concept for securing database information and Database Security to technically implement and enforce the security policies and controls are a must for any organization. Within this, encryption and strong authentication for data at rest as well as data in motion are key elements. Encryption is required by an increasing number of regulations and from the overall governance standpoint. The webinar will discuss the consequences of not encrypting data, the regulatory trends, and the approaches for encrypting data without impacting performance and usability.
In this webinar, Martin Kuppinger will outline how Database Security solutions fit into the approach of Database Governance, which role encryption technologies play therein, and what it needs for a holistic approach on Database Security – including the layers surrounding the databases like the applications, the operating system, and the network. He will provide rules for best practices and a structured approach on how to move forward towards and within the field of Database Security. Within that he will also present his view on strong authentication, encryption, and key management issues as specific aspects within this topic.
Roxana Bradescu of Oracle will talk more in detail how Oracle Advanced Security provides a complete solution for transparent database encryption which protects data at rest, in transit, and on backup. She will explain how the built-in key management means there is no need to deploy separate key management infrastructure, and how integration with the Oracle database ensures performance and easy deployment requiring no changes to existing applications.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.