Netezza Mantra Cutting edge database activity monitoring technology Shehba Shahab ISM 158 Spring 2010 Prakash Mehra.

Slides:



Advertisements
Similar presentations
The Threat Within September Copyright © 2004 Q1 Labs. All Rights Reserved Agenda Customer Pain Industry Solutions Network Behavior Enforcement Example.
Advertisements

Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
What’s Next What We believe Who We Are Cloud Computing Big data Mobility Social Enterprise.
Security & Privacy The changing world of Privacy and the core drivers.
Imperva The Leader in Application Data Security and Compliance Eran Cohen EMEA Sale Engineer
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
Brian Bradley.  Data is any type of stored digital information.  Security is about the protection of assets.  Prevention: measures taken to protect.
By Edith Butler Fall Our Security Ways we protect our valuables: Locks Security Alarm Video Surveillance, etc.
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Electronic Discovery (eDiscovery) Chad Meyer & John Vyhlidal ConAgra Foods.
Cloud Security & Compliance Kenneth Le ISM 158 Spring 2010 Pankaj Mehra.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
A Comprehensive Solution Team Mag 5 Valerie B., Derek C., Jimmy C., Julia M., Mark Z.
Mike Hager Enterprise Security Advisor Unisys Corporation It’s All About The Data.
Data Privacy and Security Prof Sunil Wattal. Consumer Analytics  Analytics with consumer data to derive meaningful insights on actions and behaviors.
Computer Crime and Information Technology Security
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
SafeZone® patent pending 1 Detect. Inform. Prevent. Metcalf Attack #2 August 27, 2014 SafeZone® Detect. Inform. Prevent.
Kevin Casady Hanna Short BJ Rollinson.  Centralized and Structured collection of data stored in a computer system  An electronic filing system  Easy.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Database Activity Monitoring
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Pedigree: Network-wide Protection Against Enterprise Data Leaks Team: Nick Feamster, Assistant Professor, School of CS Anirudh Ramachandran, PhD candidate,
Database Security Outline.. Introduction Security requirement Reliability and Integrity Sensitive data Inference Multilevel databases Multilevel security.
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Identity Assurance Emory University Security Conference March 26, 2008.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
12/23/2015Software Assist Corporation1 “Most companies have little idea how pervasive FTP activity is in their organizations because FTP is no longer just.
PARTNER CAMPAIGN PACK  2015 ObserveIT Campaign Roadmap  Introducing ObserveIT Partner Campaign Packs  Overview of Application User Campaign Pack.
What are the common problems facing Database Security? Presenters: Group 13 Yichen Jiang, Yingxu Liu Ericka Chickowski, “Five Hurdles That Slow Database.
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Part 1: Corporate Operational benefits, Non-technical information for FSOs and ISSMs/ISSOs Part 2: Technical Tips on how to conduct a better audit review.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
ASHRAY PATEL Securing Public Web Servers. Roadmap Web server security problems Steps to secure public web servers Securing web servers and contents Implementing.
Trinity Industries, Inc. FEI Presentation May 31, 2012.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Some Great Open Source Intrusion Detection Systems (IDSs)
SELF-DEFENDING NETWORK. CONTENTS Introduction What is Self Defending Network? Types of Network Attacks Structure of Self Defending Network Conclusion.
White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic.
Data-centric security at Blue Talon
OIT Security Operations
Understanding DATA LOSS PREVENTION
NON-COMPULSORY BRIEFING SESSION REQUEST FOR INFORMATION: ICT SECURITY SOLUTIONS RAF /2015/00019 Date: 29 September 2015 Time: 10:00.
Active, Fundamental Risk Management
Add video notes to lecture
Issues and Protections
Comprehensive Security and Compliance at an Affordable Price.
DSC Assurance Team Reporting
Impact of IT Consumerisation on Enterprise Security
Security. Audit. Compliance
SECURITY INFORMATION AND EVENT MANAGEMENT
Information Security: Risk Management or Business Enablement?
Varonis Overview.
A 5-minute overview of ADAudit Plus
EPTS Sep Henry Chang, Business Informatics,
The MobileIron® Threat Detection difference:
GRC - A Strategic Approach
Improving Data Security & Protection Using Data Provenance Figure 1
Corporate Encryption:
STEALTHbits Technologies, Inc.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Netezza Mantra Cutting edge database activity monitoring technology Shehba Shahab ISM 158 Spring 2010 Prakash Mehra

CRUNCH These Numbers  75%  75% of companies believe that have adequate data protection  58%  58% of these companies have lost sensitive data in the last 2 years  60%  60% admit that the loss of sensitive data is a recurring problem Security is being taken too lightly Companies are not getting to the ROOT of the problem

The Solution: The Solution: Netezza Mantra  Tracks and correlates database usage, and reports back in the event of suspicious activity  Comprehensive enterprise database activity monitoring  Security protection: Intrusion detection  Audit Trail: Collects critical that can be used for audits  Compliance Controls: Analysis, detection and protection against any non-compliance with HIPPA, SOX, PIC, etc. Mantra 3-in-1 solution

Benefits

Limitations Of Traditional Database Security Solutions  Databases seldom include effective security and access controls  Insiders are able to circumvent poor security and gain valuable information  Many entry points for outside attacks  Impose significant performance overhead

References  Ashford, Warwick. "Study Reveals Huge Gap between Businesses’ Security Intentions and Practice." ComputerWeekly.com. 27 Apr Web. 27 Apr  DarkReading. "Tech Insight: Database Activity Monitoring." Dark Reading. 4 Jan Web. 17 Apr  "Gartner Identifies Top 5 Steps to Dramatically Limit Data Loss and Information Leaks." Gartner. 7 Aug Web. 17 Apr  "Mantra Overview." Netezza. Web. 28 Apr  "Netezza Receives Patent for Mantra Appliance Policy Management Frame work." MarketWatch. Web. 29 Apr  Stanley, Nigel. "The Business Case for Database Activity Monitoring?" Weblog ComputerWeekly.com 15 Mar Web. 18 Apr