Presentation is loading. Please wait.

Presentation is loading. Please wait.

Database Activity Monitoring https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html.

Similar presentations


Presentation on theme: "Database Activity Monitoring https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html."— Presentation transcript:

1 Database Activity Monitoring https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

2 Database security - Database activity monitoring (DAM) 1 Another security layer of a more sophisticated nature includes real-time database activity monitoring, either by analyzing protocol traffic (SQL) over the network, or by observing local database activity on each server using software agents, or both https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

3 McAfee - Mergers and acquisitions 1 : On March 23, 2011, McAfee announced its intention to acquire privately owned Sentrigo, a leading provider of database security, including vulnerability management, database activity monitoring, database audit, and virtual patching—which ensure databases are protected without impacting performance or availability. The acquisition enables McAfee to extend its database security portfolio. The acquisition closed on April 6, 2011. https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

4 Database activity monitoring 1 'Database activity monitoring' (DAM) is a database security technology for monitoring and analyzing database activity that operates independently of the database management system (DBMS) and does not rely on any form of native (DBMS-resident) auditing or native logs such as trace or transaction logs. DAM is typically performed continuously and in real-time. https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

5 Database activity monitoring 1 Database activity monitoring and prevention (DAMP) is an extension to DAM that goes beyond monitoring and alerting to also block unauthorized activities. https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

6 Database activity monitoring - Core features of DAM 1 Enterprise DAM requirements are beginning to broaden, extending beyond basic functions, such as the capability to detect malicious activity or inappropriate or unapproved database administrator (DBA) access.” [ http://www.gartner.com/DisplayDocument?id= 873513, Database Activity Monitoring Market Overview, Jeffrey Wheatman, Mark Nicolett, 3 February 2009, Gartner Inc.] https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

7 Database activity monitoring - Core features of DAM 1 * The ability to offer database activity monitoring in virtualized environments, or even in the cloud, where there is no well- defined or consistent network topology https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

8 Database activity monitoring - Additional reading 1 * [http://www.darkreading.com/security/encr yption/showArticle.jhtml?articleID=208803 797 Dark Reading - Tech Insight: Database Activity Monitoring] https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html

9 For More Information, Visit: https://store.theartofservice.co m/the-database-activity- monitoring-toolkit.html https://store.theartofservice.co m/the-database-activity- monitoring-toolkit.html The Art of Service https://store.theartofservice.com


Download ppt "Database Activity Monitoring https://store.theartofservice.com/the-database-activity-monitoring-toolkit.html."

Similar presentations


Ads by Google