Live Online Events in January
By Roxana Bradescu on Jan 06, 2009
We are offering two live online events in January:
Concerns over data breaches as well as regulatory compliance require every organization to consider encrypting sensitive information stored in their databases. With Oracle Advanced Security, customers can now transparently encrypt data at rest inside their production databases in a matter of hours without any changes to their existing applications. But if you regularly copy production databases for testing, development and other purposes, you may be exposing sensitive customer and employee information in the process. Oracle Data Masking complements the encryption capabilities in Oracle Advanced Security by substituting sensitive data with realistic values in order to maintain data privacy and regulatory compliance in non-production environments. During this presentation, you'll learn how you can use two of the options in Oracle’s comprehensive portfolio of database security solutions to cost-effectively address your data privacy and regulatory requirements.
Databases are the most valuable assets in your IT infrastructure, and hence the most targeted by hackers and auditors alike. A comprehensive strategy for database security and compliance must include preventing unauthorized activities as well as auditing and monitoring to detect any failure of preventive controls or policies. With Oracle Database Vault, you can enforce security policies inside the Oracle Database, preventing any user - even a privileged user – from bypassing application security policies or performing unauthorized database operations. Oracle Audit Vault complements Oracle Database Vault by providing a reliable enterprise-wide solution for demonstrating the effectiveness of preventive controls as well as detecting and alerting on unauthorized or suspicious activities. In this session, learn how Oracle Database Vault and Oracle Audit Vault work together to provide a complete cost-effective solution for preventing and detecting security and regulatory breaches.
We will have ample time for Q&A at the end of each presentation so hope you make it to one of them.