Monday, September 20, 2010

Preventing Cyberattacks with Database Activity Monitoring

Most organizations, irrespective of industry or geography, are subject to repeated attacks by hackers seeking to acquire their valuable data. IBM’s Database Activity Monitoring (DAM) technology helps prevent outsider attacks such as SQL injection in several ways, all of which can be used simultaneously to provide a layered defense. This is accomplished by creating and enforcing real-time, proactive policies such as:
IBM’s InfoSphere Guardium solution allows you to easily create real-time policies across the database and file sharing platforms of eight major vendors. Responses to policy violations are fully customizable, with options ranging from real-time transaction blocking to real-time alerts or user quarantine.
InfoSphere Guardium has been deployed by over 400 customers globally, protecting infrastructures ranging from small clusters to tens of thousands of databases.

No comments:

Post a Comment