ContentDebateMax RaynerJuly 10, 2007Is monitoring traffic before it enters the database the best approach to database security?