Download now Registration not required
Database attacks, rogue insider threats and compliance (SOX, PCI-DSS, NIST 800-53, SAS70) are driving enterprises to take a closer look at how they manage database vulnerabilities, enforce change controls and log database activity. The presenter of this webcast discusses how to protect heterogeneous database infrastructures with automated and centralized controls - without degrading performance, generating massive amounts of unfiltered log events or creating more work for the DBAs. How to automate vulnerability and configuration assessments in order to rapidly identify vulnerable procedures, empty passwords and misconfigured privileges that cybercriminals exploit to compromise the corporate and customer data, is also discussed.
- Format: Webcast
- Size: 0 KB