Tuesday, April 20, 2021

8 Steps to Holistic Database Security

Guardium: In the past, IT security efforts focused on the perimeter of networks, but now enterprise IT departments are being asked to secure databases in response to growing threats. Guardium offers eight steps enterprises can take to safeguard databases and comply with regulations:

  1. Discovery
  2. Vulnerability and Configuration Assessment
  3. Hardening
  4. Change Auditing
  5. Database Activity Monitoring (DAM)
  6. Auditing
  7. Authentication, Access Control and Entitlement Management
  8. Encryption

Similar articles

Latest Articles

IT Planning During a...

Without a doubt, 2020 changed everything. I like to compare it to a science fiction movie where time travel is involved. Clearly, we have...

Best Data Quality Tools...

Data quality is a critical issue in today’s data centers. The complexity of the Cloud continues to grow, leading to an increasing need for...

NVIDIA’s New Grace ARM/GPU...

This week is NVIDIA’s GTC, or GPU Technology Conference, and they likely should have changed the name to ATC because this year – it...

What is Data Segmentation?

Definition of Data Segmentation Data segmentation is the process of grouping your data into at least two subsets, although more separations may be necessary on...