Sunday, July 25, 2021

8 Steps to Holistic Database Security

Guardium: In the past, IT security efforts focused on the perimeter of networks, but now enterprise IT departments are being asked to secure databases in response to growing threats. Guardium offers eight steps enterprises can take to safeguard databases and comply with regulations:

  1. Discovery
  2. Vulnerability and Configuration Assessment
  3. Hardening
  4. Change Auditing
  5. Database Activity Monitoring (DAM)
  6. Auditing
  7. Authentication, Access Control and Entitlement Management
  8. Encryption

Similar articles

Latest Articles

Data Science Market Trends...

When famed mathematician John W. Tukey postulated that advanced computing would have a profound effect on data analysis, he probably didn’t imagine the full...

Data Recovery Market Trends...

Data recovery is more important than ever in this era of constant cyber attacks and ransomware. The Verizon Data Breach Investigations Report (DBIR) looked...

Trends in Data Visualization

In a world of big data, visualization is becoming a key skill set that every business must master.  Digital technology has transformed the way businesses...

Microsoft Data Portfolio Review

With a host of analytics services for almost any situation, Microsoft Azure’s data services have got just about every base covered.   In the world...