dcsimg

8 Steps to Holistic Database Security

SHARE
Share it on Twitter  
Share it on Facebook  
Share it on Google+
Share it on Linked in  
Email  

Guardium: In the past, IT security efforts focused on the perimeter of networks, but now enterprise IT departments are being asked to secure databases in response to growing threats. Guardium offers eight steps enterprises can take to safeguard databases and comply with regulations:

  1. Discovery
  2. Vulnerability and Configuration Assessment
  3. Hardening
  4. Change Auditing
  5. Database Activity Monitoring (DAM)
  6. Auditing
  7. Authentication, Access Control and Entitlement Management
  8. Encryption

Submit a Comment

Loading Comments...

NewsletterDATAMATION DAILY NEWSLETTER

SUBSCRIBE TO OUR IT MANAGEMENT NEWSLETTER