ContentDebateGuatam VijJanuary 12, 2007Is the best approach to database security monitoring traffic before it enters the database?