Beyond Database Security

This is a joint webinar together with analyst firm KuppingerCole.

Controlling access to databases can be anything between complex, performance-breaking and not fine-grained enough. In this webinar we will explore new approaches to this challenge and how they tackle frequent performance and security issues.

The more information is available to and shared with those who are authorized to access it, the more business value it can create. Reducing barriers to information access therefore offers an immediate business effect, as more information can be made available to more users. However when it comes to information residing in databases, it can be hard to follow this simple business value equation. SQL queries most of the time deliver much more data than the requesting party actually would need, with filtering rules then being inflexibly and often insecurely hard-coded into a performance nightmare.

Where traditional Database security, which is focused on the database and not its contents, doesn’t bring us any further, adaptive and policy based access is proposing a significant step forward in the way how we can share database content to authorized users.

Key takeaways:

  • How to optimize business value by secure information sharing
  • How to reduce business access barriers
  • How to implement dynamic filtering and data masking rules to deliver only the content the requesting party really needs
  • How to deliver adaptive and policy based access
  • How to share database content to authorized users

 

Other Resources

Webinars
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
Webinars
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Webinars
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.