![]() Users can configure the appliance as an inline database firewall or as a passive monitoring device that is triggered by other actions, such as TCP reset blocking or VPN port shutdowns, among others. Guardium’s access and security exception policies monitor inbound database commands for unauthorized activity such as failed logins or database changes.ĭatabase intrusion/extrusion prevention technology provides real-time enforcement and peremptory blocking of transactions that violate security policies. The rules controlling all these actions are defined and stored on a central server. This traps activities by authorized users that fall outside normal business processes, which could indicate data theft. Users can even be sent into quarantine-mode to temporarily prohibit log-ins. user quarantine and firewall IDs Guardium Data Activity Monitor provides comprehensive protection. ![]() It tags sensitive objects with metadata classifications such as “Privacy-Restricted” or “Regulated Record.” Enterprises can use Guardium’s data mining tools to “analyze a verifiable audit trail of historical transaction information - stored in Guardium’s data warehouse and typically involving tens of millions of sessions - for particular events involving specific classes of data,” the company said in a statement.Īn extrusion policy engine monitors outbound responses from databases and detects suspicious activities based on data patterns and data volumes. audit trail that supports segregation of duties. Guardium DBLP combines three technologies to protect sensitive information:Ī database content classification and policy engine uses a database crawler to find patterns (such as 9-digit Social Security numbers) and issues alerts when it locates such information for the first time. ![]() Guardium DBLP is built upon Version 6.0 of the Guardium platform, a solution that monitors, secures, and audits databases. Demonstrate monitoring of file activity including user name, timestamp, and file location regardless of client type. Guardium DBLP monitors traffic flowing to and from database servers, thus enabling it to spot a database query that returns more credit card numbers than are outside the normal counts of such a query. Due within 30 days, Guardium DBLP automatically finds and tags sensitive information in databases, and prevents unauthorized access using real-time policies and continuous comparisons to “normal” behavior. Guardium Prevents Database Leaks of Sensitive InformationĪutomatically finds and tags sensitive data, assigns access policies, and prevents unauthorized accessĭatabase security company Guardium today announced a comprehensive solution for preventing database leak.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |