Database Activity Monitoring .

9
• Database Activity Monitoring https://store.theartofservice.com/the-database-activity- monitoring-toolkit.html

Transcript of Database Activity Monitoring .

Page 1: Database Activity Monitoring .

• Database Activity Monitoring

https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

Page 2: Database Activity Monitoring .

Database security - Database activity monitoring (DAM)

1 Another security layer of a more sophisticated nature includes real-time database activity monitoring, either by analyzing protocol traffic

(SQL) over the network, or by observing local database activity on

each server using software agents, or both

https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

Page 3: Database Activity Monitoring .

McAfee - Mergers and acquisitions

1 : On March 23, 2011, McAfee announced its intention to acquire privately owned

Sentrigo, a leading provider of database security, including vulnerability

management, database activity monitoring, database audit, and virtual patching—which

ensure databases are protected without impacting performance or availability. The acquisition enables McAfee to extend its

database security portfolio. The acquisition closed on April 6, 2011.

https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

Page 4: Database Activity Monitoring .

Database activity monitoring

1 'Database activity monitoring' (DAM) is a database security

technology for monitoring and analyzing database activity that operates independently of the database management system

(DBMS) and does not rely on any form of native (DBMS-resident)

auditing or native logs such as trace or transaction logs. DAM is typically performed continuously and in real-

time.

https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

Page 5: Database Activity Monitoring .

Database activity monitoring

1 Database activity monitoring and prevention (DAMP) is an extension to

DAM that goes beyond monitoring and alerting to also block unauthorized activities.

https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

Page 6: Database Activity Monitoring .

Database activity monitoring - Core features of DAM

1 Enterprise DAM requirements are beginning to broaden, extending beyond basic functions, such as the capability to detect malicious activity or inappropriate

or unapproved database administrator (DBA) access.” [

http://www.gartner.com/DisplayDocument?id=873513, Database Activity Monitoring Market Overview, Jeffrey Wheatman, Mark

Nicolett, 3 February 2009, Gartner Inc.]

https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

Page 7: Database Activity Monitoring .

Database activity monitoring - Core features of DAM

1 * The ability to offer database activity monitoring in virtualized

environments, or even in the cloud, where there is no well-defined or

consistent network topology

https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

Page 8: Database Activity Monitoring .

Database activity monitoring - Additional reading

1 * [http://www.darkreading.com/securit

y/encryption/showArticle.jhtml?articleID=208803797 Dark Reading -

Tech Insight: Database Activity Monitoring]

https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html