English   Deutsch
21.03.2013
16:00 CET, 11:00am EDT, 8:00am PDT

Extending Data Governance Beyond the Database

Traditionally, enterprise data governance started within your database management system by establishing the appropriate access control and auditing policies to prevent unauthorized access and demonstrate those controls. Now a new generation of database security solutions allow organizations to extend database security policies beyond the database management system and across the enterprise.

By monitoring traffic to all their enterprise databases, organizations can now detect unauthorized activity before it reaches the database, and can take appropriate measures to block that activity. In addition, these solutions can consolidate database logs and analyze them in real-time to generate alerts as well as provide a secure centralized repository for audit data for regulatory purposes.

Conceptually similar to network intrusion detection and prevention systems (IDS/IPS) or security information and event management (SIEM) that are part of every organization’s network, KuppingerCole believes adoption of this new technology will become just as widespread at the database layer and will help strengthen existing controls within database management systems. You will also hear from database leader, Oracle, about their new Oracle Audit Vault and Database Firewall solution and some of the organizations that have already adopted this solution as part of a database security defense in depth strategy.

In this webinar, Martin Kuppinger will outline how Database Security solutions fit into the approach of Database Governance, which role encryption technologies play therein, and what it needs for a holistic approach on Database Security – including the layers surrounding the databases like the applications, the operating system, and the network.

In the second part, Roxana Bradescu of Oracle will talk more in detail about the new Oracle Audit Vault and Database Firewall.

Speakers

Roxana Bradescu Roxana Bradescu
Director of Product Management & Strategy, Database Security
Oracle

Roxana is responsible for Oracle’s database security product strategy. Roxana has over 20 years of industry experience working on commercially successful consumer and enterprise security solutions. She has held senior product management/marketing and development positions at VeriSign,... MORE 
Martin Kuppinger Martin Kuppinger
Principal Analyst
KuppingerCole

Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to KuppingerCole, Martin wrote more than 50 IT-related books and is known  as a widely-read columnist... MORE 


Platinum Sponsor

ORACLE Deutschland ORACLE Deutschland
Riesstraße 25 • 80992 München
Phone: +49 89 1 4300
Internet: http://www.oracle.com/de

Oracle Identity Management's best-in-class suite of IdM solutions delivers the industry's only hot-pluggable middleware, allowing enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. With Oracle Identity Management, you enjoy:
Comprehensive, best-in-class solution—An integrated offering of highly acclaimed and innovative products, Oracle Identity Management offers the highest return on your investments with improved security, lower administrative costs, high scalability, and the backing of an industry leader.
Security for heterogeneous environments—"Hot-Pluggable" Oracle solutions interoperate with all major systems to ensure enterprise-wide security for all your applications.
Sustainable compliance—Innovative features fully integrated with your identity management infrastructure automate key processes to reduce audit cycles and dramatically lower costs.
In addition, Oracle Identity management is leading the next wave of Identity Management with an Application-Centric approach.

top
Download
Webinar Presentation, KuppingerCole
Information
Language
English

Date
21.03.2013
16:00 CET, 11:00am EDT, 8:00am PDT

Contact person
Mr. Levent Kara
+49 211 23707710
lk@kuppingercole.com
Partners
More events
Identity and Access Management: Where to start?
Many organizations – of all sizes – still have no or only a rudimentary IAM in place. When looking at IAM, it quickly turns out that this is about...
Extend your existing AD to the Cloud. How to enable the new ABC: the Agile Business - Connected
Most organizations use Microsoft Active Directory as a strategic element of their on-premise network infrastructure. However, handling external...
How to stop the Insider Threat: Protect yourself from Privileged Users
The attack landscape is changing. Targeted, advanced and persistent external attacks are increasing. However, despite all discussions about...
All current events
Imprint       General Terms and Conditions       Terms of Use       Privacy policy
© 2003-2014 KuppingerCole