Security

Vulnerability Assessment and Change Audit System

Watch Now Registration not required

Executive Summary

Identifying database vulnerabilities such as unpatched systems and misconfigured privileges - and preventing unauthorized changes - enables organizations to proactively address a range of internal and external threats, while addressing SOX and PCI compliance requirements. The attendee of this webcast learn about Guardium 7's Vulnerability Assessment (VA) scanning module and the hundreds of DBMS-specific tests based on industry best practices such as the Center for Internet Security (CIS) benchmarks and the DoD's Security Technical Implementation Guide (STIG).

  • Format: Webcast
  • Size: 0 KB