Product Report: Oracle Database Vault/Oracle Audit Vault - 70112

Report Details

The market for Database Security involves a number of different technical solution approaches which are not covered by a single product, but instead require a set of different products and features in order to secure content in databases. As a result, there are many different solutions on offer in the market today. In this report we will focus on Oracle Database Vault and Oracle Audit Vault which are two products covering two distinct areas of database security, the first one focusing on preventive controls and the other on detective controls.

Oracle Database Vault deals with privileged access to data by implementing policies which restrict and control access of privileged users and thus mitigate the associated security risks. Oracle tightly integrated Database Vault with the Oracle Database kernel to ensure policies cannot be by-passed and performance overhead is neglible. Privileged users are now considered to be one of the biggest threats to database security for companies, organizations and government agencies. Database administrators (DBAs) are the most prevalent type of privileged users with potential access to all information in databases, besides application/technical users which have frequently somewhat limited access. Having their accounts being abused thus imposes the biggest risk.

Oracle Audit Vault is a second key product in Oracle’s database security portfolio. It also supports da-tabases from different vendors, including Microsoft SQL Server, IBM DB2 UDB, and SAP Sybase. Audit Vault consolidates audit data from different database servers. These can be analyzed in reports through a large number of out-of-the-box reports. The product also supports alerts on security threats.

As a detective control for different databases, Oracle Audit Vault can be used in a pretty straightfor-ward way. Oracle Database Vault, however, requires a good deal of planning. The pre-configured integration with several core business applications can help reduce the effort involved. Nevertheless, adequate organizational policies must be in place for deployment to be successful.

KuppingerCole strongly recommends defining a holistic security strategy in order to identify the necessary database security technologies beforehand. Within their separate technical categories, we consider Oracle Database Vault and Oracle Audit Vault to be products well worthy of further evaluation.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Apr 27, 2011

Product Report: Oracle Database Vault/Oracle Audit Vault - 70112

The market for Database Security involves a number of different technical solution approaches which are not covered by a single product, but instead require a set of different products and features in order to secure content in databases. As a result, there are many different solutions on…

€95.00 Get Access

Latest Related Reports

Leadership Compass

Leadership Compass: Database Security - 70970

Database security is a broad section of information security that concerns itself with protecting databases against compromises of their integrity, confidentiality and availability. It covers various security controls for the information itself stored and processed in database systems,…

Leadership Compass

Leadership Compass: Access Management and Federation - 71102

Leaders in innovation, product features, and market reach for Access Management and Identity Federation. Your compass for finding the right path in the market.

Executive View

Executive View: Knowledge Vault - 71412

Knowledge Vault is a cloud-based compliance platform that provides auditing, alerting, reporting and management functions for analyzing user and administrator activities across multiple data sources including Microsoft Office 365, Microsoft Azure Active Directory and popular file sharing services.

Executive View

Executive View: Oracle Privileged Account Manager - 71057

Oracle Privileged Account Management (OPAM) is a secure password management solution for generating, provisioning and controlling access to privileged account credentials, as well as administrative session management and recording. It is one of the key components of the Oracle Identity…

Executive View

Executive View: Oracle Identity and Access Management Suite Plus 11g R2 - 70917

Oracle Identity and Access Management Suite is a comprehensive suite of products for the core areas of IAM&IAG, i.e. Identity Provisioning and Access Governance. It benefits from a well thought-out architecture and continuous improvements in integration and functionality.

Executive View

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

Die BeyondTrust PowerBroker Auditor Suite ist ein Set aus Auditing-Tools für Windows-Umgebungen. Zusammen bieten diese Tools einen einheitlichen Echtzeiteinblick sowie ein Prüfprotokoll für Zugriffe und Änderungen bezüglich Dateisystemen, SQL Server, Exchange und…

Executive View

Executive View: Oracle Database Vault - 70899

Oracle Database Vault is a specialized Privileged Access control solution for securing Oracle databases. It allows defining of different areas, called “realms”, within a database environment which can be used to protect application data from unauthorized access.  Oracle…

Executive View

Executive View: BeyondTrust PowerBroker Auditor Suite - 70891

BeyondTrust PowerBroker Auditor Suite is a set of auditing tools for Windows environments. Together they provide a unified real-time insight and an audit trail for file system, SQL Server, Exchange and Active Directory access and changes.

Leadership Compass

Leadership Compass: IAM/IAG Suites - 71105

Leaders in innovation, product features, and market reach for IAM/IAG Suites. Integrated, comprehensive solutions for Identity and Access Management and Governance, covering all of the major aspects of this discipline such as Identity Provisioning, Federation, and Privilege Management.…

Executive View

Executive View: SAP Audit Management - 71162

Audits are a must for any organization. The massively growing number of ever-tighter regulations in the past years and the overall growing relevance and enforcement of Corporate Governance and, as part of it, Risk Management, has led to an increase in both the number and complexity of…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Building a Future-proof Intelligent Security Operations Center, Part 2

Security Intelligence Platforms (SIP) are universal and extensible security analytics solutions that offer a holistic approach towards maintaining complete visibility and management of the security posture across the whole organization. Only by correlating both real-time and historical security [...]

Latest Insights

Hot Topics

Spotlight

Learn more

Security Operations Center

Today, the Security Operations Center (SOC) is at the heart of enterprise security management. It is used to monitor and analyze security alerts coming from the various systems across the enterprise and to take actions against detected threats. However, the rapidly growing number and sophistication of modern advanced cyber-attacks make running a SOC an increasingly challenging task even for the largest enterprises with their fat budgets for IT security. The overwhelming number of alerts puts a huge strain even on the best security experts, leaving just minutes for them to decide whether an [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00