Download now Registration not required
Monitoring the database applications is a critical component of achieving a strong defense-in-depth around the sensitive data. However, to be efficient and effective one must use the right combination of tools. Monitoring should never replace other layers in the security stack, instead it should complement the existing pieces. Database intrusion detection and security auditing continues to grow in importance because of the rising volume of successful database attacks, and the resulting security legislation and regulations. Clearly, database intrusion detection and security auditing comes with its complexities. Monitoring the databases is a useful tactic, but only if used in conjunction with a well-conceived and balanced security plan.
- Format: PDF
- Size: 174.2 KB