Guardium

Displaying 1-4 of 4 results

  • White Papers // Jun 2009

    Implementing Database Security and Auditing

    This paper is about database security and auditing. By reading it one will learn many methods and techniques that will be helpful in securing, monitoring, and auditing database environments. The paper covers diverse topics that include all aspects of database security and auditing, including network security for databases, authentication and...

    Provided By Guardium

  • White Papers // Apr 2009

    8 Steps to Holistic Database Security

    SQL injection attacks, malfeasance by insiders and regulatory requirements are driving organizations to find new ways to secure their corporate and customer data found in commercial database systems such as Oracle, Microsoft SQL Server, IBM DB2 and Sybase. This paper discusses the 8 essential best practices that provide a holistic...

    Provided By Guardium

  • Webcasts // Jan 2009

    Best Practices for Database Security & Compliance

    Now, more than ever, enterprises are looking to protect sensitive corporate data while reducing the cost of compliance. The attendee of this webcast will learn best practices for safeguarding enterprise data while addressing compliance requirements such as SOX, PCI and data privacy laws. The attendee will also benefit from Forrester's...

    Provided By Guardium

  • Webcasts // Jan 2009

    S-GATE: Data-Level Access Control for Heterogeneous DBMS Environments

    The attendee of this webcast will learn why Guardium S-GATE is the only cross-DBMS technology that blocks privileged users from accessing sensitive data - without disrupting applications or changing database configurations. The attendee will learn how S-GATE provides preventive controls that complement "After-the-fact" detective controls such as monitoring and audit...

    Provided By Guardium

  • Webcasts // Jan 2009

    Best Practices for Database Security & Compliance

    Now, more than ever, enterprises are looking to protect sensitive corporate data while reducing the cost of compliance. The attendee of this webcast will learn best practices for safeguarding enterprise data while addressing compliance requirements such as SOX, PCI and data privacy laws. The attendee will also benefit from Forrester's...

    Provided By Guardium

  • Webcasts // Jan 2009

    S-GATE: Data-Level Access Control for Heterogeneous DBMS Environments

    The attendee of this webcast will learn why Guardium S-GATE is the only cross-DBMS technology that blocks privileged users from accessing sensitive data - without disrupting applications or changing database configurations. The attendee will learn how S-GATE provides preventive controls that complement "After-the-fact" detective controls such as monitoring and audit...

    Provided By Guardium

  • White Papers // Apr 2009

    8 Steps to Holistic Database Security

    SQL injection attacks, malfeasance by insiders and regulatory requirements are driving organizations to find new ways to secure their corporate and customer data found in commercial database systems such as Oracle, Microsoft SQL Server, IBM DB2 and Sybase. This paper discusses the 8 essential best practices that provide a holistic...

    Provided By Guardium

  • White Papers // Jun 2009

    Implementing Database Security and Auditing

    This paper is about database security and auditing. By reading it one will learn many methods and techniques that will be helpful in securing, monitoring, and auditing database environments. The paper covers diverse topics that include all aspects of database security and auditing, including network security for databases, authentication and...

    Provided By Guardium