Extending Data Governance Beyond the Database

  • LANGUAGE: English DATE: Thursday, March 21, 2013 TIME: 16:00 CET, 11:00am EDT, 8:00am PDT
Upcoming Webinars
Traditionally, enterprise data governance started within your database management system by establishing the appropriate access control and auditing policies to prevent unauthorized access and demonstrate those controls. Now a new generation of database security solutions allow organizations to extend database security policies beyond the database management system and across the enterprise.

By monitoring traffic to all their enterprise databases, organizations can now detect unauthorized activity before it reaches the database, and can take appropriate measures to block that activity. In addition, these solutions can consolidate database logs and analyze them in real-time to generate alerts as well as provide a secure centralized repository for audit data for regulatory purposes.

Conceptually similar to network intrusion detection and prevention systems (IDS/IPS) or security information and event management (SIEM) that are part of every organization’s network, KuppingerCole believes adoption of this new technology will become just as widespread at the database layer and will help strengthen existing controls within database management systems. You will also hear from database leader, Oracle, about their new Oracle Audit Vault and Database Firewall solution and some of the organizations that have already adopted this solution as part of a database security defense in depth strategy.

In this webinar, Martin Kuppinger will outline how Database Security solutions fit into the approach of Database Governance, which role encryption technologies play therein, and what it needs for a holistic approach on Database Security – including the layers surrounding the databases like the applications, the operating system, and the network.

In the second part, Roxana Bradescu of Oracle will talk more in detail about the new Oracle Audit Vault and Database Firewall.


Platinum Sponsors

Speakers

Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist...


Platinum Sponsor

Oracle Identity Management's best-in-class suite of IdM solutions delivers the industry's only hot-pluggable middleware, allowing enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. With Oracle Identity Management, you enjoy:
Comprehensive, best-in-class solution—An integrated offering of highly acclaimed and innovative products, Oracle Identity Management offers the highest return on your investments with improved security, lower administrative costs, high scalability, and the backing of an industry leader.
Security for heterogeneous environments—"Hot-Pluggable" Oracle solutions interoperate with all major systems to ensure enterprise-wide security for all your applications.
Sustainable compliance—Innovative features fully integrated with your identity management infrastructure automate key processes to reduce audit cycles and dramatically lower costs.
In addition, Oracle Identity management is leading the next wave of Identity Management with an Application-Centric approach.

Watch now

Downloads

Webinar Presentation, KuppingerCole

Webcast download

Popular Webcast

Next Webinar

Webinar

Cloud Access Security and Enterprise Mobility – better together

Let’s face it: cloud services have already become an integral part of every company’s IT infrastructure. They provide immense benefits, helping adopt new business models and emerging technologies quickly, addressing constantly changing customer demands and reducing costs and administration burden. More and more of corporate information assets are now kept and managed outside of the company’s digital perimeter.

Next Conference

Conference

Consumer Identity Summit

Paving the way for a truly customer-centric organization, which is focused on solving the customer's problems and needs in an authentic and transparent way, without messing with customer data, instantly and 24/7 – this is what Digital Transformation is all about. Consumer Identity & Access Management (CIAM) is at the heart of Digital Transformation. The Consumer Identity Summit is here to get you kickstarted into the world of CIAM, where you learn from your customers while respecting their privacy needs and securing their personal information against cyber risks.

Next Seminar

Workshop

Mastering the Operational Impacts of the EU General Data Protection Regulation (GDPR)

This 1-day intense training will provide you with a solid foundation on the new European Union Data Protection Regulation, improving your understanding on the legal requirements of processing and transferring personal information to and from the EU. The trainer of this GDPR-class is an experienced European lawyer and privacy expert, offering a practical approach on how to implement the EU General Data Protection Regulation (GDPR) into your everyday business.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00