Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

CA today announced CA Encryption Key Manager (CA EKM), a z/OS-based solution that unifies and automates the management, storage, distribution, and documentation of encryption keys for multi-vendor mainframe and distributed environments such as Linux, Unix, Windows and Solaris.

Posted November 09, 2009

Altova, a data integration vendor, has included Health Level Seven (HL7) and Extensible Business Reporting Language (XBRL) standards support within MapForce Version 2009, an integrated suite of XML, database, and UML tools.

Posted October 28, 2009

EnterpriseDB, the commercial software company supporting the PostgreSQL open source database, said on Tuesday that Red Hat has made a financial investment in EnterpriseDB. With this new partnership, EnterpriseDB and Red Hat said they will continue to promote open source infrastructure solutions that emphasize the advantages of using Red Hat Enterprise Linux, JBoss and Postgres Plus to deliver lower total-cost-of-ownership.

Posted October 27, 2009

CA, Inc. has announced new products designed to help strengthen IT security, lower costs of managing compliance, and improve enterprise-wide IT risk management.

Posted October 26, 2009

Fortinet, a provider of unified threat management (UTM) software solutions, recently announced a major upgrade of its database security and compliance product, FortiDB. FortiDB is a broad solution designed to secure databases and applications for both virtualized and non-virtualized environments. The product performs vulnerability assessments (along with providing remediation advice), database activity monitoring, data loss prevention, automation of auditing and compliance, and change control to keep track of changes related to database structures and end users. FortiDB supports heterogeneous environments including Oracle, DB2, Sybase and MS SQL Server.

Posted October 20, 2009

Varonis Systems Inc., a vendor that provides software for unstructured data governance, has announced the availability of its Intelligent Data Use (IDU) Data Classification Framework for discovering sensitive information. The Framework produces rapid actionable results by uniting data classification technology with a unique meta-data layer to guide searches for files containing sensitive information.

Posted October 13, 2009

Dataguise, a provider of security solutions for protecting sensitive data across the enterprise, has announced a new version of its dataguise security suite—dgdiscover 3.0 and dgmasker 3.0. Version 3.0 is an integrated solution for comprehensive sensitive data discovery and masking, designed for file and structured database repository search across the network, discovery of sensitive data within those repositories and masking or de-identification of the data to protect against exposure and risk. With dataguise, organizations now have the ability to create corporate masking policies that allow faster adherence to compliance regulations, lower risk of a data breach, and reduced reliance on cumbersome single-database masking solutions.

Posted October 13, 2009

Ashwood Computer, Inc., a full-service VAR and preferred systems integrator for companies utilizing MultiValue database technology, has announced version 3.2 of FastBac DR, its disk-based backup tool.

Posted October 13, 2009

As my regular readers know, I am an avid reader, especially of technology books. And every now and then I review some of the more interesting database-related books in the DBA Corner column.

Posted October 13, 2009

The Sarbanes-Oxley Act of 2002 (SOX) can be considered the most significant compliance standard of our time. Since the passing of the legislation 7 years ago, companies have had to rethink the way they use technology to store company data. This transformation has been anything but an easy ride for companies today, and has significantly impacted the role of the CIO within an organization.

Posted October 13, 2009

High-profile data breaches at major corporations and the usual assortment of state government agencies and educational institutions have highlighted the value of encrypting data. Yet, breach numbers continue to spike and big losses are becoming more common; according to Verizon's 2009 Data Breach Investigations Report, which looks only at breaches that resulted in stolen data being used in a crime, the total number of records breached in Verizon's 2008 caseload—more than 285 million—exceeded the combined total from 2004 to 2007. Apparently the market is now so saturated with stolen data that the price of each record has dropped from a high of $16 in 2007 to less than 50 cents today. But the intensifying number of successful attacks isn't the most distressing part of data breach reports: the Identity Theft Resource Center reports that only 2.4% of the companies involved in all reported breaches utilized encryption.

Posted October 13, 2009

Compuware Corporation has announced the release of Hiperstation 7.8, which the vendor considers to be the centerpiece of its Application Auditing solution. This latest version expands Hiperstation's capabilities with the integration of Vantage, Compuware's application performance management solution, and the addition of WebSphere MQ and TCP/IP protocols. The new functionality enables organizations to more effectively protect against internal data breaches-across platforms-averting monetary losses and meeting regulations such as PCI DSS and HIPAA.

Posted October 12, 2009

Bus-Tech, Inc., a provider of modular, scalable Virtual Tape Library (VTL) controllers for IBM and compatible mainframes, announced it has partnered with Hitachi Data Systems to provide support for IBM's Transaction Processing Facility (TPF). When coupled with Bus-Tech's Mainframe Data Library (MDL), the Hitachi Adaptable Modular Storage 2000 family and Hitachi High-Performance Network Attached Storage (NAS) Platform, powered by BlueArc, will provide high-capacity storage systems for the virtual tape volumes.

Posted October 12, 2009

Economic pressures are resulting in tighter funding for data security, according to a webinar presented Tuesday by Ian Abramson, IOUG president; Roxana Bradescu, senior director of database security, product marketing, Oracle; and Joe McKendrick, Unisphere Research analyst.

Posted October 08, 2009

Extending the Oracle Enterprise Sign-On Suite, Oracle announced Enterprise Single Sign-On (ESSO) Anywhere, a comprehensive offering that lets enterprises host single tenant ESSO in a private cloud to provide users with secure access to heterogeneous enterprise resources from anywhere, anytime.

Posted October 08, 2009

Extending the Oracle Enterprise Sign-On Suite, Oracle announced Enterprise Single Sign-On (ESSO) Anywhere, a comprehensive offering that lets enterprises host single tenant ESSO in a private cloud to provide users with secure access to heterogeneous enterprise resources from anywhere, anytime.

Posted October 07, 2009

Idera, a Microsoft Gold Certified Partner and provider of management and administration solutions for Microsoft SQL Server, has introduced two new products, both of which are available as public betas through October 30.

Posted October 07, 2009

Melissa Data, a provider of data quality and data enrichment solutions, in partnership with SpeedTrack Inc., has announced the availability of SpeedTrack, a technology offering a new approach to storage, access, and analysis of data. Powered by SpeedTrack's Guided Information Access Platform (GIA), users are guided to what they are looking for simply by selecting from the unique words, characters, and values contained in the data in order to provide more accurate search results and give contextually relevant search answers. SpeedTrack applications work with any type of stored data including relational databases, text, email, PDF, Microsoft Office documents, and legacy databases.

Posted September 22, 2009

Sentrigo, Inc., a provider of database security software, has announced it is partnering with Hitachi Data Systems to integrate Hitachi IT Operations Analyzer version 1.2 into Sentrigo's Hedgehog suite of products. Hedgehog software provides full-visibility database activity monitoring and real-time protection to defend mission-critical data against insider misuse as well as outsider intrusion, and also enables compliance with regulatory requirements such as PCI DSS, Sarbanes-Oxley and HIPAA. The integrated solution will enable IT administrators to centrally monitor these activities from right within the IT Operations Analyzer console, and will provide users with a single view into their company's database security posture.

Posted September 22, 2009

NetIQ, a systems and security management software vendor recently released new versions of two key products that enable IT organizations to more efficiently manage and secure Microsoft Active Directory environments. These new products are NetIQ Directory and Resource Administrator 8.5 and NetIQ Group Policy Administrator 6.1. Both products are designed to help IT organizations solve the challenges they face when tasked with the native management, administration and security of Microsoft Active Directory. As they push the limits of this technology, ensuring security and internal controls becomes most critical to not only manage user access, but to eliminate human error, demonstrate compliance, and improve service delivery.

Posted September 22, 2009

Centrify Corporation, a provider of Microsoft Active Directory-based, identity and access management and auditing solutions for non-Microsoft platforms, has announced the availability of support for Red Hat Enterprise Linux in Centrify Suite 2008 for Linux on IBM System z.

Posted September 09, 2009

Sentrigo, Inc., a database security software vendor, has announced a substantial expansion of its Hedgehog database activity monitoring and intrusion prevention suite. The Hedgehog software provides full-visibility database activity monitoring and real-time protection and has been adopted by numerous Global 2000 companies to defend mission-critical data against insider misuse as well as outsider intrusion. With this release, Hedgehog 3.0 now supports Microsoft SQL Server 2008 running on Windows Server 2008, in addition to already supported SQL Server 2005 and SQL Server 2000 running on earlier Windows platforms. Additionally, Hedgehog vPatch, Sentrigo's virtual patching solution, now includes dozens of additional protections specific to SQL Server. Hedgehog 3.0 also provides several enhancements based on customer input, specifically to meet the accelerating demand for database monitoring to satisfy regulatory requirements.

Posted September 01, 2009

IBM announced the availability of the IBM System Storage DS5020 Express, a new storage disk offering that delivers enterprise-class storage capabilities for midrange businesses.

Posted August 31, 2009

Guardium, a database security company, has announced enhanced support for Sybase's enterprise data management platforms. Guardium provides fine-grained auditing, real-time monitoring and automated vulnerability assessment for Sybase's core Database Management System (DBMS) platforms, including: Sybase ASE 15, for high-performance, mission-critical applications, and Sybase IQ, a column-based analytics server, for business reporting and analytics requirements. Support for Sybase IQ 12 is currently shipping in Guardium 7, with support for Sybase IQ 15 available in Guardium's next major release.

Posted August 26, 2009

HiT Software, Inc., a provider of products for database access, integration and replication, announced the availability of the HiT JDBC/DB2 v3.70 high-performance JDBC driver, featuring added support for IBM DB2 native data encryption. HiT JDBC/DB2 is now optimized to take advantage of IBM DB2's DES standard, and combined with HiT Software's HiT SSL Server, provides end-to-end 256-bit encryption for data traveling between Java applications and IBM DB2 LUW or z/OS databases

Posted August 24, 2009

InterSystems Corporation yesterday introduced technology additions to its InterSystems CACHÉ high-performance object database. Available now in CACHÉ 2009, the new features provide enhanced web services security, reporting, and system management and monitoring.

Posted August 18, 2009

IBM has announced the release of solutions designed to help combat Web application attacks, and secure the integrity of data processed by those applications. "The hackers around the world have been really beefing up their efforts going against the web applications for customers. They have found exposures, they have found holes that have not been patched by the vendors," Dan Powers, vice president of business strategy at IBM Internet Security Systems, tells 5 Minute Briefing.

Posted August 17, 2009

Insiders, by virtue of their easy access to organizations' information, systems, and networks, pose a significant risk to employers. Every day, there's a new shocking headline concerning a major network security breach caused (knowingly or unknowingly) by a corporate insider. And the number of security breaches that start from within keep growing—particularly in this down economy, as the number of disgruntled employees escalates. You'd think that large organizations in particular would be rushing to protect themselves from such headlines and liability, but they just aren't getting the message. Nor are they taking the necessary steps to protect themselves from a policy and technical standpoint.

Posted August 14, 2009

As the U.S. markets strive for a recovery in 2009, many IT managers are cringing at the thought of managing their data through what may be a record year of mergers and acquisitions. Managing an ever-increasing mountain of data is not a simple task in the best of times, but doing so while combining formerly separate entities during an economic slowdown can be a monumental challenge.

Posted August 14, 2009

Quest Software, Inc. has unveiled the newest version of SharePlex for Oracle, a real-time Oracle-Oracle database replication solution that supports high availability, reporting, data synchronization/integration, and load balancing on Oracle databases. Key features introduced in the new version include wildcard support, batch processing, and configuration management enhancements to SharePlex's monitoring and management dashboard, SharePlex Manager. These new features bring benefits in the areas of ease-of-use, improved performance, task automation, and managing complex replication environments

Posted August 11, 2009

Cloakware, a provider of privileged password management solutions, has announced that it is working with Oracle to extend Oracle's suite of Identity Management solutions with Cloakware's flagship product, Password Authority. By combining these two products, Oracle is now able to enhance its customers' security management, with a comprehensive solution to manage, protect and monitor access to vital data.

Posted August 11, 2009

To further protect sensitive application data residing in an Oracle Database from unauthorized access by any database user, Oracle Database Vault now includes extensible policies for use with Oracle's JD Edwards EnterpriseOne. Oracle Database Vault enables JD Edwards EnterpriseOne customers to restrict access to application data by highly privileged users, enforce separation-of-duty within the Oracle Database, prevent application bypass and enforce enterprise security policies with multi-factor authorization.

Posted August 05, 2009

Varonis Systems Inc., a leader in unstructured data governance, has announced the availability of Version 5.0 of its DatAdvantage and DataPrivilege software products, which together provide a robust platform for integrated problem discovery, enhanced data protection, and entitlement management for data owners. Version 5.0 automates the implementation of file system protection best practices via its integrated problem discovery reports, which give guidance on reducing excessive access and maintaining optimal access controls.

Posted July 28, 2009

Application Security, Inc., a provider of database security, risk, and compliance solutions for the enterprise, has announced that it will support Oracle's July 2009 CPU (critical patch update) for Oracle databases. The latest CPU contains 33 new security vulnerability fixes.

Posted July 21, 2009

IBM announced enhancements to its information infrastructure portfolio of high-end enterprise storage products designed to help businesses manage the explosive growth in data and information.

Posted July 20, 2009

Protecting the data in our enterprise databases is extremely important. But what exactly does that mean? Oh, at one level we have the database authorization and roles built directly into the DBMS products. You know what I'm talking about: GRANT and REVOKE statements that can be used to authorize access to database objects, resources and statements. Many organizations have adopted policies and products to migrate this type of security out of the DBMS and into their operating system security software.

Posted July 13, 2009

Data encryption performs two purposes: it protects data against internal prying eyes, and it protects data against external threats (hacking, theft of backup tapes, etc.) Encryption in the database tier offers the advantage of database-caliber performance and protection of encryption keys without incurring the overhead and additional cost of using a third-party encryption tool in an application tier.

Posted July 13, 2009

Idera, a provider of management and administration software tools for the Microsoft SQL Server database, has introduced SQLsafe 5.0, the latest version of its high performance backup and recovery solution for Microsoft SQL Server databases. SQLsafe 5.0 makes it easy to setup and monitor an entire log shipping environment, with the added advantage of compressing database log backup files, saving a tremendous amount of network bandwidth and disk space.

Posted July 07, 2009

Oracle Corporation announced availability of Oracle Fusion Middleware 11g, the next generation of the vendors' leading middleware product suite designed for service oriented architecture-based environments. Oracle Fusion Middleware 11g is an application infrastructure that now includes the WebLogic application server, originally offered by BEA Systems before the company was acquired by Oracle in 2008. The suite also includes a number of integrated and hot-pluggable components, including new capabilities in Oracle SOA Suite, Oracle WebLogic Suite, Oracle WebCenter Suite and Oracle Identity Management.

Posted July 07, 2009

Embarcadero Technologies has released a new version of its database change management software. Change Manager 5.1 helps DBAs and developers by automating complex database change management tasks, resulting in more streamlined development cycles and fewer errors. Change Manager, which supports Oracle, IBM DB2 for LUW, Microsoft SQL Server, and Sybase from a single user interface, is available as a standalone tool or as part of All-Access, a cost-effective tool chest that includes all of Embarcadero's multi-platform application development and database tools.

Posted June 30, 2009

IBM has announced a new version of Tivoli Identity Manager security software that tackles the fragmented state of the identity and access governance market with a single solution that helps organizations administer, secure, monitor and certify user identities and their access to applications, information and systems. Critical business information no longer resides solely in the data center. Organizations must be able to control who has access to what information across entire IT and data center environments including systems, devices, data and applications, while also reporting compliance with industry and government regulations.

Posted June 30, 2009

Application Security, Inc., a provider of database security, risk, and compliance solutions for the enterprise, has announced AppDetectivePro 6.0, featuring powerful user rights review capabilities. The AppDetectivePro solution consists of three distinct modules for database discovery, database vulnerability assessment, and user rights review, and the User Rights Review (URR) module is the key new feature of the version 6.0 product release.

Posted June 24, 2009

Oracle has announced expanded capabilities for Oracle Identity Manager to help enterprises significantly improve compliance and reduce potential for fraud. The enhancements to Oracle Identity Manager, Oracle's user provisioning and identity administration solution, allow enterprises to enforce more granular segregation of duties (SoD) in enterprise applications, including the Oracle E-Business Suite, Oracle's PeopleSoft Enterprise and SAP ERP applications.

Posted June 17, 2009

Application Security, Inc., a provider of database security, risk, and compliance solutions for the enterprise, has announced AppDetectivePro 6.0, featuring powerful user rights review capabilities. The AppDetectivePro solution consists of three distinct modules for database discovery, database vulnerability assessment, and user rights review, and the User Rights Review (URR) module is the key new feature of the version 6.0 product release.

Posted June 17, 2009

SSH Communications Security, a provider of enterprise security solutions and end-to-end communications security, has introduced SSH Tectia Managed File Transfer (MFT) Events and SSH Tectia MFT Auditor. These new MFT solutions enable enterprise and government customers aim to help customers easily and cost-effectively manage, monitor, and secure file and data transfers of sensitive information.

Posted June 16, 2009

Application Security, Inc., a provider of database security, risk, and compliance solutions for the enterprise, has announced AppDetectivePro 6.0, featuring powerful user rights review capabilities. The AppDetectivePro solution consists of three distinct modules for database discovery, database vulnerability assessment, and user rights review, and the User Rights Review (URR) module is the key new feature of the version 6.0 product release. URR can be purchased separately or as part of the comprehensive AppDetectivePro 6.0 database scanning solution and provides auditors, IT advisors, and consultants with a detailed view of an organization's data ownership, access controls, and rights to sensitive information.

Posted June 02, 2009

CA announced CA Compliance Manager for z/OS, a platform-resident solution to provide real-time automated policy management of security and compliance events across the IBM z/OS environment and mainframe security subsystems-including CA ACF2, CA Top Secret and IBM RACF.

Posted June 01, 2009

Setting up a replication configuration is a fairly standard way to enable disaster recovery (DR) for business-critical databases. In such a configuration, changes from a production or primary system are propagated to a standby or secondary system. One of the important technology decisions that organizations make upfront is the choice of the replication architecture.

Posted May 15, 2009

IT GRC—or, IT governance, risk and compliance—is rapidly gaining the attention of CIOs and CISOs in businesses across the country. After all, the objective of IT GRC is to more efficiently strike an appropriate balance between business reward and business risk, an essential equation that these executives must attain. How does IT GRC help? By replacing traditional, siloed approaches to addressing individual components with a more unified approach that takes advantage of the many commonalities and interrelationships that exist among governance, compliance and risk management.

Posted May 15, 2009

Guardium, a provider of database security solutions, has announced that it has joined the partner ecosystem supporting Microsoft Forefront. Currently in public beta testing, Forefront is an integrated security suite that delivers comprehensive protection across endpoint, application servers and edge solutions with a central management console for easy administration and enterprise-wide multi product visibility. Forefront enables software, hardware, and services vendors to share and use security event information across its environment and the broader partner ecosystem. As a result, partners can enhance the effectiveness of their security technologies and better protect customer IT environments.

Posted May 05, 2009

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102

Sponsors