DOC PREVIEW
UCSC ISM 158 - Netezza Mantra Cutting edge database activity monitoring technology

This preview shows page 1-2 out of 7 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 7 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1CRUNCH These NumbersThe Solution: Netezza MantraSlide 4BenefitsLimitations Of Traditional Database Security SolutionsReferencesNetezza MantraCutting edge database activity monitoring technologyShehba ShahabISM 158Spring 2010Prakash MehraCRUNCH These Numbers75% of companies believe that have adequate data protection58% of these companies have lost sensitive data in the last 2 years60% admit that the loss of sensitive data is a recurring problemSecurity is being taken too lightlyCompanies are not getting to the ROOT of the problemThe Solution: Netezza MantraTracks and correlates database usage, and reports back in the event of suspicious activityComprehensive enterprise database activity monitoringSecurity protection: Intrusion detectionAudit Trail: Collects critical that can be used for auditsCompliance Controls: Analysis, detection and protection against any non-compliance with HIPPA, SOX, PIC, etc.Mantra 3-in-1 solutionBenefitsNo performance overheadWorks independently of the database systemStops unauthorized behavior in real timeDrives down total cost of ownership for database activity monitoringRapid DeploymentHighly customizableUser friendlys = $Limitations Of Traditional Database Security SolutionsDatabases seldom include effective security and access controlsInsiders are able to circumvent poor security and gain valuable informationMany entry points for outside attacksImpose significant performance overheadReferencesAshford, Warwick. "Study Reveals Huge Gap between Businesses’ Security Intentions and Practice." ComputerWeekly.com. 27 Apr. 2010. Web. 27 Apr. 2010. <http://www.computerweekly.com/Articles/2010/04/27/24 1058/Study-reveals-huge-gap-between-businesses-security-intentions-and.htm>.DarkReading. "Tech Insight: Database Activity Monitoring." Dark Reading. 4 Jan. 2008. Web. 17 Apr. 2010. <Tech Insight: Database Activity Monitoring>."Gartner Identifies Top 5 Steps to Dramatically Limit Data Loss and Information Leaks." Gartner. 7 Aug. 2006. Web. 17 Apr. 2010. <http://www.gartner.com/it/page.jsp?id=495173>."Mantra Overview." Netezza. Web. 28 Apr. 2010. <http://netezza.com>."Netezza Receives Patent for Mantra Appliance Policy Management Frame work." MarketWatch. Web. 29 Apr. 2010. <http://www.marketwatch.com/story/netezza-receives-patent-for-mantra-appliance-policy-management-framework-2010-04-27?reflink=MW_news_stmp>Stanley, Nigel. "The Business Case for Database Activity Monitoring?" Weblog ComputerWeekly.com 15 Mar. 2010. Web. 18 Apr. 2010.


View Full Document

UCSC ISM 158 - Netezza Mantra Cutting edge database activity monitoring technology

Documents in this Course
NOTES

NOTES

2 pages

NOTES

NOTES

22 pages

Load more
Download Netezza Mantra Cutting edge database activity monitoring technology
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Netezza Mantra Cutting edge database activity monitoring technology and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Netezza Mantra Cutting edge database activity monitoring technology 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?