Database Activity Monitoring .
-
Upload
tracy-fleming -
Category
Documents
-
view
215 -
download
0
Transcript of Database Activity Monitoring .
• Database Activity Monitoring
https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html
Database security - Database activity monitoring (DAM)
1 Another security layer of a more sophisticated nature includes real-time database activity monitoring, either by analyzing protocol traffic
(SQL) over the network, or by observing local database activity on
each server using software agents, or both
https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html
McAfee - Mergers and acquisitions
1 : On March 23, 2011, McAfee announced its intention to acquire privately owned
Sentrigo, a leading provider of database security, including vulnerability
management, database activity monitoring, database audit, and virtual patching—which
ensure databases are protected without impacting performance or availability. The acquisition enables McAfee to extend its
database security portfolio. The acquisition closed on April 6, 2011.
https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html
Database activity monitoring
1 'Database activity monitoring' (DAM) is a database security
technology for monitoring and analyzing database activity that operates independently of the database management system
(DBMS) and does not rely on any form of native (DBMS-resident)
auditing or native logs such as trace or transaction logs. DAM is typically performed continuously and in real-
time.
https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html
Database activity monitoring
1 Database activity monitoring and prevention (DAMP) is an extension to
DAM that goes beyond monitoring and alerting to also block unauthorized activities.
https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html
Database activity monitoring - Core features of DAM
1 Enterprise DAM requirements are beginning to broaden, extending beyond basic functions, such as the capability to detect malicious activity or inappropriate
or unapproved database administrator (DBA) access.” [
http://www.gartner.com/DisplayDocument?id=873513, Database Activity Monitoring Market Overview, Jeffrey Wheatman, Mark
Nicolett, 3 February 2009, Gartner Inc.]
https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html
Database activity monitoring - Core features of DAM
1 * The ability to offer database activity monitoring in virtualized
environments, or even in the cloud, where there is no well-defined or
consistent network topology
https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html
Database activity monitoring - Additional reading
1 * [http://www.darkreading.com/securit
y/encryption/showArticle.jhtml?articleID=208803797 Dark Reading -
Tech Insight: Database Activity Monitoring]
https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html
For More Information, Visit:
• https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html
The Art of Servicehttps://store.theartofservice.com