This resource is no longer available
Making Effective Use of Database Monitoring/Auditing Tools for Security and Compliance
Spurred by mandates such as PCI and a daily stream of headline-grabbing data breaches, enterprises are scrambling to shore up database access controls and determine where all their critical data resides. This webcast helps you understand how automated data monitoring and auditing tools help meet compliance and security requirements and what you should look for to determine which tools work best for your environment.
Attend this webcast and discover:
- Specific security and access control requirements for regulatory and internal auditing
- Easy to follow steps to determine and demonstrate the ROI potential of automated monitoring and auditing tools
- How these tools work and key differentiators to look for
James C. Foster
Software Security Consultant
James C. Foster is deputy director for Global Security Solution Development at CSC. He has also worked for Guardent (acquired by Verisign), Foundstone (acquired by McAfee) and the Department of Defense. Foster is also a technical editor for Information Security.
- Scentric Inc.
- Oct 12, 2006, 12:00 EDT (16:00 GMT)