Database Activity Monitoring: Intrusion Detection and Security Auditing

At its core, security is all about risk reduction. One of the most effective database security practices, “defense in depth,” employs multiple layers of protection to reduce the risk of intrusion. No single level of defense is infallible, and even multiple layers cannot ensure your organization will be 100 percent impenetrable. However, they can make you far less vulnerable.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

Comparing the Total Cost of Ownership of Business Intelligence Solutions

For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions.
  • Written By:
  • Published On:

11 Criteria for Selecting the Best ERP System Replacement

An enterprise resource planning (ERP) system is your information backbone, reaching into all areas of your business and value chain. That’s why replacing it can open unlimited business opportunities. The cornerstone of this effort is finding the right partner. And since your long-term business strategy will shape your selection, it’s critical that your ERP provider be part of your vision.
  • Written By:
  • Published On:

Customer Analytics in the Age of Social Media

This TDWI Best Practices Report examines organizations’ current practices and future plans for customer analytics technology implementations, with a special focus on how organizations are adapting to the knowledge potential as well as challenges of social media networks. The report offers recommendations for achieving greater return on investment (ROI) from customer analytics processes.
  • Written By:
  • Published On:

You may also be interested in these related documents:

The Benefits of 3-way Auditing

Whatever your reasons for needing to capture a complete audit trail for all database activity, you want to make sure your system allows you to support three accepted approaches. This three-way auditing ability can provide auditing for all activity in your database, including monitoring, reporting, and alerting on all critical data activity across your company. Learn more about these approaches, and their many benefits.
  • Written By:
  • Published On:

Intrusion Detection and Security Auditing In Oracle

Database intrusion detection and security auditing continues to grow in importance. Thus, monitoring your database applications is a critical component of achieving a strong defense-in-depth around your sensitive data. However, to be efficient and effective, you must use the right combination of tools. Monitoring should never replace other layers in the security stack—it should complement the existing pieces instead.
  • Written By:
  • Published On:

NetBIOS Firewall

How many times do you hear network administrators scream at the top of their voice, "I have spent millions of dollars buying expensive and the best antivirus software solutions and yet every two months, when a new virus strikes, I have my entire network go down!" This is a common complaint you will get to hear from one and all network administrators, primarily because most security vendors today concentrate more on a "reactive" approach to stop virus attacks, than a “preventive” approach!
  • Written By:
  • Published On: