2015-10-25 12:49:43 UTC

When evaluating Database Security, what aspect do you think is the most important to look for?

Let the community know what you think. Share your opinions now!

66 Answers

author avatar
Top 20Real User

Sufficient database security prevents data from being lost or compromised, which may have serious ramifications for the company both in terms of finances and reputation. In terms of finances and reputation, database security helps companies block attacks, including ransomware and breached firewalls, which in turn keeps sensitive information safe.

2020-01-08 17:05:47 UTC
author avatar

After the 2017 data breaches, we are mainly interested in a Database Firewall & Data/File Activity Monitoring. Our industry deals with SSAE-18 SOC logical access compliance rules, and GDPR Article 32 data privacy/protection legislation. I am mostly interested whether the vendor provides security updates, and has roll-back features. Data Masking & Row & Table based Database Encryption. Automated data classification for databases with with changing data models. With GDPR in mind I want agents that can intercept the traffic after DIME decryption and before data processing.

2018-01-04 12:04:29 UTC
author avatar

Database activity monitoring
Compliance check/audit
User and application audit
Tracking user account changes
Tracking system activities (monitoring sys and admin users)

2017-02-09 20:43:15 UTC
author avatar

A lot will depend on the types of DB, the number of servers and whether you are looking for just compliance or true security. There are really only three vendors in the space:
Oracle Audit Vault which is ok for basic compliance auditing in small Oracle-only environments.
IBM Guardium
Imperva SecureSphere
These last two have some significant differences, but I work for Imperva so in fairness, I will just say real-time database security at scale is different than compliance done on a post-event basis.

You should also consider user accounts and how you can monitor their database activity on a per account basis. This will tell you a lot about where you can close excess privilege gaps, peer groups and who within the group may be doing funky things. It is a great way to detect compromised accounts and abuse of service or privileged accounts.

2017-02-08 16:41:39 UTC
author avatar

Another man said this a long time ago: "A man's got to know his limitations". 
The key starting point is to know your current configuration and all it's weaknesses. 

2017-02-08 14:51:45 UTC
author avatar

Compliance and DB auditing.
Activity monitoring
DB masking and protection

2016-01-19 21:24:57 UTC
Find out what your peers are saying about Imperva, IBM, Oracle and others in Database Security. Updated: June 2020.
426,265 professionals have used our research since 2012.