Access "Product review: Symantec Database Security 3.1"
This article is part of the May 2008 issue of Seven questions to ask before committing to SaaS
DATABASE SECURITY Symantec Database Security 3.1 REVIEWED BY JAMES C. FOSTER Symantec Price: $49,995 for Enterprise Edition Nearly every interactive application and true "Web 2.0" application on the Internet is leveraging a backend database. These applications enable users to purchase cars, check bank balances, bid on used toys, and download music. But, regualtory requirements and the persistent fear of security breaches put severe pressure on the businesses providing those services. Symantec Database Security (SDS) helps alleviate the operational and technical challenges associated with auditing, assessing, and monitoring database traffic in real-time. Policies can be utilized to catch internal application and database abuse in combination with additional policies to monitor external attacks and malicious use SDS 3.1 supports Microsoft SQL Server 2000 and 2005, Oracle 8, 9, and 10g, Sybase ASE 12, ASE 15, and IQ 12, and IBM DB2 8 and 9; 32- and 64-bit operating platforms are supported for each. Surprisingly, MySQL (acquired by Sun Microsystems earlier this ... Access >>>
Premium Content for Free.
SaaS Offering Handles SSO
TechFocus: New Password Hell?
- Viewpoint: Let's add policy to GRC
Product review: CodeArmor 2.2 for Microsoft .NET
by Steven Weil, Contributor
The configuration, policy control and reporting capabilities of V.i. Labs' CodeArmor 2.2 for Microsoft .NET are reviewed.
Security Services: Webroot Email Security SaaS
At Your Service
Identity Management Suites Enable Integration, Interoperability
IDENTITY MANAGEMENT Feature-rich product suites are putting a face on integration and interoperability.
- SaaS Offering Handles SSO
Secure Computing SafeWord 2008 product review
Secure Computing SafeWord 2008 delivers identity management and access control for Windows systems using tokens that generate secure single-use passcodes. Information Security magazine reviews these capabilities.
7 Security Questions to Ask Your SaaS Provider
Outsourcing software as a service (SaaS) puts control over an organization's applications in the hands of others. Learn what questions to ask your provider, how to define security policies, how to understand how service providers handle security and ensure enforcement of policies.
Product review: Symantec Database Security 3.1
5 Steps for Developing Strong Change Management Program Best Practices
Poor change control and configuration management can affect the security of your systems and networks. Follow these five steps for a strong change management program.
Product review: Mandiant Intelligent Response 1.0
- Secure Computing SafeWord 2008 product review
Interview: Jim Kirkhope of NCR
PING: Jim Kirkhope
Face-Off: Is vulnerability research ethical?
Bruce Schneier and Marcus Ranum debate the ethics of vulnerability research
Reasearch on Coding Backdoors Presents Ugly Picture
Editor's Desk: Backdoor Bedlam
Security, Privacy Offices Must Combine Resources
Perspectives: Nowhere to Hide
- Interview: Jim Kirkhope of NCR
More Premium Content Accessible For Free
For many security teams, "continuous monitoring" is a vague concept associated with FISMA compliance. A continuous monitoring program can be simple ...
The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...
Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...