Guardium

Displaying 1-14 of 14 results

  • White Papers // Jun 2009

    Implementing Database Security and Auditing

    This paper is about database security and auditing. By reading it one will learn many methods and techniques that will be helpful in securing, monitoring, and auditing database environments. The paper covers diverse topics that include all aspects of database security and auditing, including network security for databases, authentication and...

    Provided By Guardium

  • White Papers // Apr 2009

    8 Steps to Holistic Database Security

    SQL injection attacks, malfeasance by insiders and regulatory requirements are driving organizations to find new ways to secure their corporate and customer data found in commercial database systems such as Oracle, Microsoft SQL Server, IBM DB2 and Sybase. This paper discusses the 8 essential best practices that provide a holistic...

    Provided By Guardium

  • Webcasts // Jan 2009

    On-Demand Webcast: Database Attack Prevention With Change and Vulnerability Management

    Database attacks, rogue insider threats and compliance (SOX, PCI-DSS, NIST 800-53, SAS70) are driving enterprises to take a closer look at how they manage database vulnerabilities, enforce change controls and log database activity. The presenter of this webcast discusses how to protect heterogeneous database infrastructures with automated and centralized controls...

    Provided By Guardium

  • Webcasts // Jan 2009

    On-Demand Webcast: Protecting Against Database Attacks and Insider Threats: Top 5 Scenarios

    The attendee of this webcast will learn the top 5 scenarios and essential best practices for preventing database attacks and insider threats, as well as best practices for reducing compliance complexity by automating and centralizing cross-DBMS controls for key regulations such as SOX/COBIT, PCI-DSS, NIST 800-53, SAS70 and data protection...

    Provided By Guardium

  • Webcasts // Jan 2009

    On-Demand Webcast: Best Practices for Data Privacy & Protection

    The attendee of this webcast will learn best practices for protecting Personally Identifiable Information (PII) and other sensitive data against new and emerging threats such as SQL injection and rogue insiders. Protecting against cyber attacks, breaches, fraud and insider threats has heightened the need for organizations to carefully review their...

    Provided By Guardium

  • Webcasts // Jan 2009

    Best Practices for Database Security & Compliance

    Now, more than ever, enterprises are looking to protect sensitive corporate data while reducing the cost of compliance. The attendee of this webcast will learn best practices for safeguarding enterprise data while addressing compliance requirements such as SOX, PCI and data privacy laws. The attendee will also benefit from Forrester's...

    Provided By Guardium

  • Webcasts // Jan 2009

    Enforce Database Change Controls for SOX, PCI & SAS70

    The attendee of this webcast will learn how Guardium 7 enables to easily automate the time-consuming process of tracking all database changes and reconciling them with authorized work orders in the existing change ticketing system, such as BMC Remedy. The attendee will learn how to generate real-time alerts whenever unauthorized...

    Provided By Guardium

  • Webcasts // Jan 2009

    Application Monitoring & Fraud Detection

    This webcast highlights Guardium 7's powerful capabilities for monitoring multi-tier applications such as Oracle e-Business Suite, PeopleSoft and SAP, in order to immediately identify fraud and unauthorized activities. The attendee will learn how Guardium 7 provides real-time visibility, understanding and control of activity at the data layer across all major...

    Provided By Guardium

  • Webcasts // Jan 2009

    S-GATE: Data-Level Access Control for Heterogeneous DBMS Environments

    The attendee of this webcast will learn why Guardium S-GATE is the only cross-DBMS technology that blocks privileged users from accessing sensitive data - without disrupting applications or changing database configurations. The attendee will learn how S-GATE provides preventive controls that complement "After-the-fact" detective controls such as monitoring and audit...

    Provided By Guardium

  • Webcasts // Jan 2009

    Vulnerability Assessment and Change Audit System

    Identifying database vulnerabilities such as unpatched systems and misconfigured privileges - and preventing unauthorized changes - enables organizations to proactively address a range of internal and external threats, while addressing SOX and PCI compliance requirements. The attendee of this webcast learn about Guardium 7's Vulnerability Assessment (VA) scanning module and...

    Provided By Guardium

  • Webcasts // Jan 2009

    How Dell IT Simplified Database Security for SOX, PCI, SAS 70

    The attendee of this webcast will learn how to simplify database security and compliance - without impacting performance or creating more work for the DBAs and security teams. The attendee will also learn how Dell's IT group replaced its homegrown scripts and native database auditing with Guardium's automated, cross-DBMS platform...

    Provided By Guardium

  • Webcasts // Jan 2009

    Achieve Compliance With OMB Data Security Directive for Securing PII Data

    The attendee of this webcast will learn about best practices for securing Personally Identifiable Information (PII) data in sensitive databases and easily complying with OMB M-06-16. According to the OMB directive, government departments and agencies must log all extracts from sensitive databases and verify that private information has been erased...

    Provided By Guardium

  • Webcasts // Jan 2009

    Webcast: What Every CSO Should Know About Database Security

    Regulations such as SOX and PCI, along with high-profile data breaches, have focused attention on ensuring the integrity of corporate data and preventing information leakage from the data center. As a result, the responsibility for implementing data-centric security is moving from database administrators to the IT security organization, which may...

    Provided By Guardium

  • Webcasts // Jan 2009

    Protect Cardholder Data for PCI - Without Database Encryption

    This webcast shows how to protect cardholder data without database encryption.

    Provided By Guardium

  • Webcasts // Jan 2009

    On-Demand Webcast: Database Attack Prevention With Change and Vulnerability Management

    Database attacks, rogue insider threats and compliance (SOX, PCI-DSS, NIST 800-53, SAS70) are driving enterprises to take a closer look at how they manage database vulnerabilities, enforce change controls and log database activity. The presenter of this webcast discusses how to protect heterogeneous database infrastructures with automated and centralized controls...

    Provided By Guardium

  • Webcasts // Jan 2009

    On-Demand Webcast: Protecting Against Database Attacks and Insider Threats: Top 5 Scenarios

    The attendee of this webcast will learn the top 5 scenarios and essential best practices for preventing database attacks and insider threats, as well as best practices for reducing compliance complexity by automating and centralizing cross-DBMS controls for key regulations such as SOX/COBIT, PCI-DSS, NIST 800-53, SAS70 and data protection...

    Provided By Guardium

  • Webcasts // Jan 2009

    On-Demand Webcast: Best Practices for Data Privacy & Protection

    The attendee of this webcast will learn best practices for protecting Personally Identifiable Information (PII) and other sensitive data against new and emerging threats such as SQL injection and rogue insiders. Protecting against cyber attacks, breaches, fraud and insider threats has heightened the need for organizations to carefully review their...

    Provided By Guardium

  • White Papers // Jun 2009

    Implementing Database Security and Auditing

    This paper is about database security and auditing. By reading it one will learn many methods and techniques that will be helpful in securing, monitoring, and auditing database environments. The paper covers diverse topics that include all aspects of database security and auditing, including network security for databases, authentication and...

    Provided By Guardium

  • Webcasts // Jan 2009

    Best Practices for Database Security & Compliance

    Now, more than ever, enterprises are looking to protect sensitive corporate data while reducing the cost of compliance. The attendee of this webcast will learn best practices for safeguarding enterprise data while addressing compliance requirements such as SOX, PCI and data privacy laws. The attendee will also benefit from Forrester's...

    Provided By Guardium

  • Webcasts // Jan 2009

    Enforce Database Change Controls for SOX, PCI & SAS70

    The attendee of this webcast will learn how Guardium 7 enables to easily automate the time-consuming process of tracking all database changes and reconciling them with authorized work orders in the existing change ticketing system, such as BMC Remedy. The attendee will learn how to generate real-time alerts whenever unauthorized...

    Provided By Guardium

  • Webcasts // Jan 2009

    Application Monitoring & Fraud Detection

    This webcast highlights Guardium 7's powerful capabilities for monitoring multi-tier applications such as Oracle e-Business Suite, PeopleSoft and SAP, in order to immediately identify fraud and unauthorized activities. The attendee will learn how Guardium 7 provides real-time visibility, understanding and control of activity at the data layer across all major...

    Provided By Guardium

  • Webcasts // Jan 2009

    S-GATE: Data-Level Access Control for Heterogeneous DBMS Environments

    The attendee of this webcast will learn why Guardium S-GATE is the only cross-DBMS technology that blocks privileged users from accessing sensitive data - without disrupting applications or changing database configurations. The attendee will learn how S-GATE provides preventive controls that complement "After-the-fact" detective controls such as monitoring and audit...

    Provided By Guardium

  • Webcasts // Jan 2009

    Vulnerability Assessment and Change Audit System

    Identifying database vulnerabilities such as unpatched systems and misconfigured privileges - and preventing unauthorized changes - enables organizations to proactively address a range of internal and external threats, while addressing SOX and PCI compliance requirements. The attendee of this webcast learn about Guardium 7's Vulnerability Assessment (VA) scanning module and...

    Provided By Guardium

  • Webcasts // Jan 2009

    How Dell IT Simplified Database Security for SOX, PCI, SAS 70

    The attendee of this webcast will learn how to simplify database security and compliance - without impacting performance or creating more work for the DBAs and security teams. The attendee will also learn how Dell's IT group replaced its homegrown scripts and native database auditing with Guardium's automated, cross-DBMS platform...

    Provided By Guardium

  • Webcasts // Jan 2009

    Achieve Compliance With OMB Data Security Directive for Securing PII Data

    The attendee of this webcast will learn about best practices for securing Personally Identifiable Information (PII) data in sensitive databases and easily complying with OMB M-06-16. According to the OMB directive, government departments and agencies must log all extracts from sensitive databases and verify that private information has been erased...

    Provided By Guardium

  • Webcasts // Jan 2009

    Webcast: What Every CSO Should Know About Database Security

    Regulations such as SOX and PCI, along with high-profile data breaches, have focused attention on ensuring the integrity of corporate data and preventing information leakage from the data center. As a result, the responsibility for implementing data-centric security is moving from database administrators to the IT security organization, which may...

    Provided By Guardium

  • Webcasts // Jan 2009

    Protect Cardholder Data for PCI - Without Database Encryption

    This webcast shows how to protect cardholder data without database encryption.

    Provided By Guardium

  • White Papers // Apr 2009

    8 Steps to Holistic Database Security

    SQL injection attacks, malfeasance by insiders and regulatory requirements are driving organizations to find new ways to secure their corporate and customer data found in commercial database systems such as Oracle, Microsoft SQL Server, IBM DB2 and Sybase. This paper discusses the 8 essential best practices that provide a holistic...

    Provided By Guardium