sponsored by Guardium, an IBM Company
Premiered:  Feb 13, 2008, 14:00 EST (19:00 GMT)
Format:  Multimedia
Type:  Webcast
Language:  English
ABSTRACT:
According to Forrester, "Database auditing and real-time protection have become necessities ... to meet regulatory compliance requirements and mitigate risk against various types of threats to enterprise databases."

Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.

Register now for "Best Practices for Database Security and Auditing" on Feb. 13th at 2PM EST and 11AM PST, and you'll gain practical insight on how to:

  • Recognize the most common insider threats and how to prevent them
  • Implement granular access controls to prevent unauthorized access to sensitive data
  • Implement best practices for database auditing and real-time protection
  • Deploy automated controls for SOX, PCI and data privacy
  • Evaluate vendor solutions



Speakers

Phil Neray
VP of Marketing ,  Guardium
Phil is vice-president of marketing with Guardium, developers of the most widely-deployed solution for database activity monitoring, security and auditing as well as a sponsor of today's webcast. Phil was previously with Symantec, which he joined as a result of its acquisition of ON Technology, a developer of security and configuration management solutions. Phil has over 20 years experience in the computer industry and has a BSEE from McGill University.

Noel Yuhanna
Principal Analyst ,  Forrester Research
Noel covers database management systems (DBMSes), information-as-a-service, data replication and integration, data security, data management tools, and related online transaction processing issues. His current primary research focus is on customer usage experiences and broad industry trends of DBMS, information-as-a-service, data security, enterprise data grids, outsourcing, information life-cycle management, open source databases, and other emerging database technologies.



BROWSE RELATED WEBCASTS
Best Practices | Data Management | Database Security | Hackers | PCI Bus | Regulatory Compliance | Sarbanes-Oxley Act of 2002

View All Resources sponsored by Guardium, an IBM Company

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement