Database Firewall – Build the first line of protection

  • LANGUAGE: English DATE: Tuesday, May 03, 2011 TIME: 3pm CET, 9am ET, 2pm GMT
Upcoming Webinars

Database Security is one of the key elements within any IT security strategy, given that several of the most severe incidents in IT are related to attacks against databases and that most of the critical and sensitive information in organizations is stored in databases. Database firewalls implement a first line of defense, blocking in real time any suspicious data manipulation without forcing production environment redesign. Thus, companies should consider the value that these tools can add to their security strategy.

In this webinar, KuppingerCole´s Principal Analyst Martin Kuppinger will talk about the role database firewalls can and should play within database security and holistic security across the entire stack from applications down to the network. He will discuss the strengths like the non-intrusiveness of these technologies, as well the golden rules to have a solution which works accurate avoiding traps like for example “false positives”.

Steve Moyle, CTO Database Firewall at Oracle, then will dive deeper into technology and have a look at efficient approaches for deploy a database firewall in practice. He will explain how to write policies to ensure maximum flexibility and high performances. Finally, he will discuss how to address common issues like SQL injection attacks pointing out benefits of database firewalls versus traditional network firewalls.


Speakers


Gold Sponsor

Oracle Identity Management's best-in-class suite of IdM solutions delivers the industry's only hot-pluggable middleware, allowing enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. With Oracle Identity Management, you enjoy:
Comprehensive, best-in-class solution—An integrated offering of highly acclaimed and innovative products, Oracle Identity Management offers the highest return on your investments with improved security, lower administrative costs, high scalability, and the backing of an industry leader.
Security for heterogeneous environments—"Hot-Pluggable" Oracle solutions interoperate with all major systems to ensure enterprise-wide security for all your applications.
Sustainable compliance—Innovative features fully integrated with your identity management infrastructure automate key processes to reduce audit cycles and dramatically lower costs.
In addition, Oracle Identity management is leading the next wave of Identity Management with an Application-Centric approach.

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00