Sarbanes-Oxley: Meeting Compliance Requirements for Database Security
Click here to download now
Overview: Is there a gaping hole in your SARBOX strategy? Your most sensitive information is stored in your databases, and yet your DBA’s are likely able to access any of this data undetected to perform their jobs. This paper discusses alternatives for detecting and preventing unauthorized access.