Database Security: Protecting Your Company’s Core Competence in the Age of Digital Transformation
- LANGUAGE: English DATE: Tuesday, September 19, 2017 TIME: 4:00pm CEST, 10:00am ET, 7:00am PT
Relational databases are still the most widespread technology for storing and managing business-critical digital information. Manufacturing process parameters, sensitive financial transactions or confidential customer records - all this most valuable corporate data must be protected against compromises of their integrity and confidentiality without affecting their availability for business processes. The number of security risks databases are open to is also substantial, covering the information itself stored and processed in databases, underlying computing and network infrastructures, as well as applications accessing the data. Needless to say, databases remain a prime target for cybercriminals, especially in case of sophisticated targeted attacks.
Multiple solutions are available on the market to defend against such attacks, as well as to provide threat detection, activity monitoring, privacy protection, compliance and other aspects of data protection. Combining those individual building blocks into a comprehensive, layered and integrated security architecture is not an easy task. Many companies, especially small and medium businesses, simply have neither resources nor skills to design and deploy a complex suite of security products for protecting their databases from multiple threats across multiple environments.
Moving databases to the cloud introduces additional challenges, since organizations no longer have complete control over the database infrastructures and their underlying operating systems, while still retaining full responsibility for protecting their data. Embracing modern data storage technologies like NoSQL for flexible and scalable data processing and Big Data for real-time analysis of huge data sets increases the number of potential security risks even further. Thus, disconnected point solutions even combined with generic security tools like firewalls or antiviruses no longer constitute a viable approach towards database security. Only fully integrated and, for lack of a better word, “holistic” database security products can efficiently protect a company’s most valuable intellectual property. Recently, KuppingerCole has published a Leadership Compass on Database Security that analyzed and compared database security solutions from leading vendors according to a broad range of criteria and identified the leaders in product maturity, market presence and innovativeness.
In this webinar, we will talk about:
- Wide range of security risks databases are subjected to in a modern connected enterprise
- Challenges organizations face as they move databases to cloud environments
- Combining security technologies into an integrated multilayered database security architecture
- Key functional areas of database security solutions used for rating vendors
In the first part of the webinar, Alexei Balaganski, Lead Analyst at KuppingerCole, will talk about addressing the security challenges for databases in the age of Digital Transformation and will present the results of KuppingerCole’s Leadership Compass on Database Security.
In the second part, Desiree Amirgholi, Offering Manager, IBM Data Security, will present an overview of IBM Security Guardium, he company’s data security solution and will talk about security best practices to make the journey to the cloud as safe as possible.
Traditional security defenses are no match for today’s well-funded attackers, while disruptive technologies, like Cloud and IoT, introduce new vulnerabilities to exploit. IBM Security, with 8,000 professionals in 133 countries, delivers an immune system of security technology to detect and prevent threats and respond quickly and completely to breaches. During the past decade, IBM has invested more than $2 billion on security research and development, resulting in 3,700+ security-related patents, and acquired 20 security companies to build out its portfolio. Today, IBM Security addresses the evolving security landscape and 17,000 clients’ most critical needs with AI innovation in the cloud and intelligent orchestration. To learn how, please visit ibm.com/security.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.