A Practical Guide to Database Security

by McAfee

Mar 26, 2013

Download A serious data breach brings monetary damage in its many forms: business disruption, bad publicity, stiff ones for noncompliance, and undermined customer confidence. But most damaging of all is the trouble that it creates when it comes to signing up new customers. A tarnished reputation is a big objection for sales and business development to overcome. That's why data security in general and database security in particular are a crucial part of any company's overall corporate health.

� Understand the operational, financial, and regulatory costs associated with identity theft and credit card fraud, when customer records are compromised, including names, passwords, birth dates, and credit card information.

� Learn how the threat landscape is constantly evolving and becoming more sophisticated and specialized with external threats now including members of organized crime syndicates, and insider threats from malicious individuals, or those who unknowingly cause damage.

• See why traditional perimeter defenses such as firewalls and intrusion detection systems/intrusion prevention systems (IDS/IPS) are grossly inadequate, and incapable of detecting sophisticated attacks that exploit vulnerabilities specific to database software.

� Walk away with five key principles for protecting your database environment, and practical first steps to perform on your databases without getting into lengthy projects, vulnerability assessments, or the use of expensive tools and third-party services.