Access your Pro+ Content below.
Database activity monitoring keeps watch over your data
This article is part of the May 2010 issue of Information Security magazine
Database activity monitoring (DAM) has emerged as a powerful and effective tool for security and compliance. By design, DAM technologies have the ability to monitor all database activity, including administrators, and alert on policy violations. These features enable compliance controls, operations monitoring and data protection not otherwise possible, and does so without interfering with business processes. While the promise to advance security and compliance is significant, not all tools are created equal, with fundamental differences in architectures, database support, blocking capabilities and performance. We'll discuss the business use cases, explore the inner workings of these tools, and make recommendations on evaluating, purchasing, and deploying database activity monitoring. We'll provide a definition for DAM that explains how it differs from database auditing and intrusion prevention systems, and then illustrate these difference in applied use cases for compliance and security tasks. We will then drill into the ...
Access this PRO+ Content for Free!
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Features in this issue
Database activity monitoring can help with security and compliance by tracking everything going on in the database.
Microsoft Windows 7 security aims to improve security without the headaches of Vista.
OWASP Top 10 vulnerabilities list adds risk to methodology used to categorize coding errors.
Criminals are using the Zeus banking Trojan and other malware to hijack online business banking accounts.
Columns in this issue
Having a long-term goal for a career in information security isn't enough. Here are four key steps for planning for a career in information security.
A simplified information security risk equation helps translate information security risk to users.
The Rockefeller-Snowe cybersecurity bill has potential but raises a lot of questions.