How DAM can help detect and trace attacks

Intrusion Defense School

How DAM can help detect and trace attacks

In this lesson, explore effective deployment techniques and configurations to best detect and trace attacks, explain different use cases, and ensure the data your tool collects is accurate and doesn't drag down database performance.

About the expert:
Adrian Lane is CTO with independent consulting firm, Securosis, LLC.

In this part:

Video: Deploying Database Activity Monitoring

In this video, learn how to determine the best use cases for DAM, what you need to protect and how to select a deployment model.

Tip: Database monitoring best practices: Using DAM tools

To effectively use DAM tools, admins must prioritize which transactions are important, learn how to collect events, and write and implement database security policies.

Podcast: Top five ways to optimize database activity monitoring (DAM) performance

Implementing a Database Activity Monitoring (DAM) product is no easy process, so enterprises want to know that the product will work and work well when the implementation is over.

Quiz: How DAM can help detect and trace attacks

Take this five-question quiz to reinforce your knowledge of how DAM can help enterprises gain new visibility into their databases to help detect and trace potential attacks.

Take the Quiz