Holistic security for database-centric applications

A database-backed application consists of dozens of loosely coupled components, each of which must be secured independently. Securing such an application requires a holistic approach. Security professionals must layer security controls to compensate for multiple points of attack (internal and external), multiple points of access (via application, via SQL, via underlying OS, via storage system, via physical access) and multiple types of threats (deliberate theft of data, accidental disclosure, deliberate destruction, accidental loss, etc). Furthermore, security is a constantly moving target: patches must be maintained, logs reviewed, accounts enabled and disabled. On top of all that, the application is likely to keep changing with continuous development for new features and bug fixes, all of which make security harder. This video will provide an executive overview of the security issues of securing database-centric applications and the key tactics essential to success.

View All Videos

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.








  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...