Archive for Juli 26th, 2009

Device Lock – Protecting Your Sensitive Data by Managing Peripheral Device Access

Sonntag, Juli 26th, 2009

devicelock_logo.jpg   The data you are striving to protect behind firewalls and passwords is likely still slipping through your fingers. For every lost or stolen laptop or backup tape that makes it into the headlines, consider the many unreported, undocumented data leaks that occur when proprietary information is copied by either unwitting employees or users with malicious intent from their PCs to flash memory sticks, cell phones, cameras, PDA’s, or other convenient forms of portable storage
devicelock_01.jpg

Ingres Database 9.2 – Row Level Security Auditing

Sonntag, Juli 26th, 2009

ingres_logo.jpg   Ingres already provides a way for security administrators to do table-level monitoring to account for all queries by authorized users for compliance purposes, as well as raising alarms on certain events. Row-level security of updates and deletes has also been possible

            ingres_rowlevelaudit_01.jpg