Oracle Database Vault Helps An Organization Meet Their Security Goals
This course introduces the student to the Database Vault product,including installation, configuration, and how it affects activities in the database. New security concepts are introduced, illustrated, and clearly demonstrated by relevant practices.
Learn To:
How to usethe various features of Oracle Database Vault
How to monitor and maintain an Oracle Database Vault environment
Install and configure Oracle Database Vault to meet your security compliance goals
Howto use the various features of Oracle Database Vault
How to monitor and maintain an Oracle Database Vault environment
Install and configure Oracle Database Vault to meet your security compliance goalsOverview
Accurately detects and blocks unauthorized database activity including SQL injection attacks by monitoring traffic to Oracle and non-Oracle databases
Consolidates audit data and logsgenerated by databases, operating systems, directories, file systems, and custom sources into a secure centralized repository
Provides enterprise security intelligence and efficient compliance reporting bycombining monitoring and audit data
Utilizes a unique SQL grammar analysis engine and easy-to-define whitelists and blacklists to ensure high accuracy and performance
Delivers horizontal and verticalscalability through easy-to-deploy "software appliances"
Benefits
First line of defense: Transparently detect and block SQL injection attacks, privilege escalation, and other threats against Oracle,Microsoft SQL Server, IBM DB2, SAP Sybase, and MySQL databases
Faster response: Automatically detect unauthorized database activities that violate security policies, and thwart perpetrators from...
Regístrate para leer el documento completo.