Guardium -- Best Practices for Database Security & Compliance

Guardium -- Best Practices for Database Security & Compliance
Guardium -- Best Practices for Database Security & Compliance
Click here to register

Guardium -- Best Practices for Database Security & Compliance

SQL injection attacks, malfeasance by insiders and regulatory requirements are driving organizations to find new ways to secure their critical databases and achieve compliance with SOX, PCI-DSS, NIST 800-53 and data protection laws.

In this “10 Minutes On” SC Magazine webcast, Phil Neray, VP of Security Strategy for Guardium, will discuss essential best practices for database security and compliance.

Attendees will learn:

  • Why perimeter defenses are no longer sufficient to protect against database threats.
  • Leveraging database activity monitoring and protection (DAMP) to protect databases from unauthorized changes and access to sensitive data.
  • How a F500 company generated an ROI of 239% by replacing its manual processes, native logs and scripts with automated cross-DBMS controls.

Featured speaker:
Phil Neray –VP, Security Strategy, Guardium

Sponsored by


Guardium, an IBM Company, safeguards critical enterprise information by continuously monitoring access and changes to high-value databases.  The Guardium solution simplifies governance with unified policies for heterogeneous infrastructures; reduces operational costs by automating compliance processes; and enables organizations to use trusted information to drive smarter business outcomes.

Sign up to our newsletters

More in Vendor Webcasts

Why NAC? Why now?

Why are so many enterprises rushing to implement network access control (NAC) now? Watch this webcast to learn about the many uses of NAC.

Security Based on Trust, Not Fear

Security Based on Trust, Not Fear

Trust is essential for building a sustainable business. Security is essential for building trust. To build that trust in electronic networks, security needs to be built into a suitable framework, ...

Unknown Targeted Attacks - Stopping malware at the endpoint

Unknown Targeted Attacks - Stopping malware at the ...

The threat of Targeted Persistent Attacks (TPAs) continues to grow and nearly every day there is another headline about an organization being breached and critical data stolen. Organizations must ask ...