Monitor Database Activities, Prevent Intrusions

Requirements
  • Headquartered In: USA
  • Company Size: 5,000+ Employees
  • Industries: All exclude Government
  • Titles: Information Technology, Database, Data, Security
  • Job Level: Influencers and Decision Makers
Overview

Over the past few years companies have seen major changes in both the threats they face online, and the regulatory compliance landscape they do business in.

Both the bad guys and the regulators understood that the value is in the data and they are focused on the data, not just on the networks and protection of passwords.

The most consequential breaches are the ones where real customer/citizen data is stolen.

But managing this risk is more complicated than simply dropping in a firewall or installing antivirus software. Most critical business data is stored in databases.

Customers understood the need to monitor all activities happening on their databases and want the ability to be alerted if anything suspicious is baking.

A Database Activity Monitoring (DAM) tool can provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications.

DAM products captures and records all Structured Query Language (SQL) activity in real time or near real time, including database administrator activity, across multiple database platforms; and can generate alerts on policy violations.

Top reasons our community cites for adopting or considering this solution:

  • Need to comply to regulations like SOX (Sarbanes-Oxley) that require all database activities to be audited.
  • Need to monitor all activity targeting sensitive data such as credit card numbers, specially when technical reason do not allow for its encryption.
  • Need to detect and prevent data breaches for web facing databases and applications.
  • Need to to protect sensitive internal databases through detection of unusual activity.
  • Need to enforce separation of duties on database administrators for SOX compliance by monitoring all their activity and generating SOX-specific reports for audits.
  • Need to generate an alert if a database client application requests more credit card numbers than a defined threshold. This can indicate that the application has been compromised via SQL injection or some other attack. This need applies to any other sensitive data type.
  • Need to ensure that a service account only accesses a database from a defined source IP address, and only runs a narrow group of authorized queries.
  • Need to alert on compromise of a service account either from the system that normally uses it, or if the account credentials show up in a connection from an unexpected system.
  • Need to monitor against insider abuse and certain forms of external attacks.

You must be directly involved in your company’s evaluation process for solutions like this, or in the management chain for people who do. You must be a hands-on user of the prospective solution or in the management chain of users. Please do not register for programs that are an unlikely fit. Your credibility and ours depend on it.

Appointment Setting Form - Custom Fields

Your Information

Please do not use a personal email (gmail, yahoo, etc.)

Your Organization and Role

Your Interest in this Program

What PAIN POINTS or USE CASES are you currently experiencing?
 

Redircet Links

Register me to the ViB Community!
Check the box above and fill out some additional information to access more learn and earn opportunities from ViB.

Join the ViB Community

cancel1 check1 Eight characters minimum cancel1 check1 One lowercase letter cancel1 check1 One uppercase letter cancel1 check1 One number cancel1 check1 One special character
What Industry Best Describes Your Company?
By submitting this form you agree to receive communications from ViB. You can unsubscribe at any time.

View frequently asked questions here.

View our privacy policy here.

 

NC Widget

Stop Submit

stop submit
Please check the agreement above to apply for this meeting.

Questions? Contact us here.