Extending Data Governance Beyond the Database
- LANGUAGE: English DATE: Thursday, March 21, 2013 TIME: 16:00 CET, 11:00am EDT, 8:00am PDT
By monitoring traffic to all their enterprise databases, organizations can now detect unauthorized activity before it reaches the database, and can take appropriate measures to block that activity. In addition, these solutions can consolidate database logs and analyze them in real-time to generate alerts as well as provide a secure centralized repository for audit data for regulatory purposes.
Conceptually similar to network intrusion detection and prevention systems (IDS/IPS) or security information and event management (SIEM) that are part of every organization’s network, KuppingerCole believes adoption of this new technology will become just as widespread at the database layer and will help strengthen existing controls within database management systems. You will also hear from database leader, Oracle, about their new Oracle Audit Vault and Database Firewall solution and some of the organizations that have already adopted this solution as part of a database security defense in depth strategy.
In this webinar, Martin Kuppinger will outline how Database Security solutions fit into the approach of Database Governance, which role encryption technologies play therein, and what it needs for a holistic approach on Database Security – including the layers surrounding the databases like the applications, the operating system, and the network.
In the second part, Roxana Bradescu of Oracle will talk more in detail about the new Oracle Audit Vault and Database Firewall.
Riesstraße 25 • 80992 München • Deutschland
Phone: +49 89 1 4300
The security landscape has changed in the recent decade, and the methods we used to protect our enterprise networks are no longer working. The network perimeter has dissipated, the adversary has become increasingly skilled at alternative methods to gain entry, and enterprise applications and data are spread across multiple environments, on-premises and in the cloud. With more sensitive information getting out of our control every day, a data breach is just waiting to occur, and the consequences, if successful, can be disastrous for your business.
The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.