Enterprise Technology IT
By Tim Jennings 06 Jul 2020
How Trutex used Priority Software to improve stock control and business processes
Database security complements and enhances perimeter security tools, IAM platforms, DLP, and log management/SIEM
In a previous white paper we highlighted the importance of data security, of which database security is a component part. We noted that securing data is often overlooked as companies focus on perimeter security technologies and identity and access management (IAM) tools.
In this white paper we consider why it is important to protect databases. We also define some of the core capabilities of data and database security. We then look at a range of technologies designed to detect and or/prevent breaches, outline their various shortcomings, and discuss how database security complements each of them.
Download Rik Turner's latest whitepaper to find out more.