Database Security

Executive View

Executive View: Axiomatics – Beyond Database Security - 71270

Managing access to data held in databases is becoming increasingly important. We need a way to mask sensitive data from those who should not see it and deliver content those who should. We also need to do this dynamically, removing access on a real-time basis as user authorization changes.

Webcast

Beyond Database Security: Adaptive, Policy-Based Access Control for Dynamic Data Filtering and Data Masking

Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.

Congress

May 10 - 13, 2016: European Identity & Cloud Conference 2016

European Identity & Cloud Conference 2016 is the place where identity management, cloud, and information security thought leaders and experts get together to discuss and shape the future of secure, privacy-aware agile, business- and innovation-driven IT.

Webinar

Jun 23, 2015: Beyond Database Security: Adaptive, Policy-Based Access Control for Dynamic Data Filtering and Data Masking

Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.

Executive View

Executive View: Oracle Database Vault - 70899

Oracle Database Vault is a specialized Privileged Access control solution for securing Oracle databases. It allows defining of different areas, called “realms”, within a database environment which can be used to protect application data from unauthorized access.  Oracle…


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Data-Driven Decision Making for Identity Security

Data-Driven Decision Making for Identity Security

Symantec Enterprise: With more informed decisions comes more automated security. In today’s Zero Trust world, where the principle of least privilege is ubiquitous, enterprises are struggling to balance security while simultaneously enabling a highly agile business environment. There has always been friction with security and making highly specific security decisions quickly and efficiently contributes to this. Moreover, decision-making in enterprises exists on a spectrum from completely [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00