sponsored by Guardium, an IBM Company
Posted:  16 Mar 2010
Published:  16 Mar 2010
Format:  PDF
Length:  22  Page(s)
Type:  Presentation Transcript
Language:  English
ABSTRACT:

Privileged insiders such as database administrators pose a significant risk to customer and proprietary data if allowed to act unchecked. In addition, new applications and application services have created a plethora of entry points for outside attackers. Enter database activity monitoring (DAM), technology that tracks and correlates database usage and reports back in the event of an anomaly.

This Presentation Transcript, featuring security expert Nigel Stanley:

  • Introduces you to DAM
  • Covers the basics of how this important technology works
  • Outlines how to demonstrate to business leaders that it can help not only help data protection efforts,  but also augment an organisational compliance program





BROWSE RELATED RESOURCES
Application Security | Data Security | Database Administration | Database Security | Regulatory Compliance | Security

View All Resources sponsored by Guardium, an IBM Company

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement