Organizations across the globe continue to experience compromised data caused by malicious attacks, web application vulnerabilities or unauthorized changes. Did you know that database servers are the primary source of breached data? How can organizations accurately conduct a database audit, ensure compliance and protect themselves against rogue insiders and external attacks in this new era of computing?
A high percentage of data breaches often emanate from internal weaknesses from employees, who may misuse payment card numbers and other sensitive information – the very same individuals responsible for database audit and other critical protection processes. To protect sensitive data, organizations have developed formal policies that govern how and when users including privileged users—such as DBAs, developers and outsourced personnel—can access sensitive data. In addition, frequent database audits are conducted.
However, most organizations lack effective mechanisms for monitoring, controlling, and auditing insiders. Since privileged users often enjoy unfettered access to sensitive corporate data, hackers typically seek to elevate their privileges once they have compromised a system; often successfully avoiding a database audit or other mechanisms designed to protect information. Internal and external auditors are now demanding monitoring of all users for security best practices, as well as compliance to a wide range of regulatory mandates.
Many organizations rely on enterprise applications to execute core business processes and manage significant amounts of data which are both mission critical and highly sensitive (e.g. Financial data, personnel data and customer data). These multi-tier enterprise applications are often difficult to secure for a variety of reasons. They are designed to be easily accessible via web, making them susceptible to attack. They also typically mask the identity of application end-users at the data transaction level and moreover, the data associated with enterprise applications can also be accessed directly by privileged users bypassing controls within the application.
It is therefore not surprising that compliance requirements and database audits often involve data managed by enterprise applications.
Since data is a critical component of daily business operations, it is essential to ensure privacy and protect both structured and unstructured data by continuously monitoring access to sensitive data, no matter where the data resides.
IBM can help:
The IBM InfoSphere Guardium solution provides a simple, robust solution for preventing unauthorized data access, changes and leaks, helping ensure the integrity of information in the data center and automating compliance controls, like the database audit.
Infosphere Guardium continuously monitors access to data in enterprise databases, data warehouses, file shares, document-sharing solutions, and big data environments such as Hadoop. It helps prevent unauthorized or suspicious activities by privileged insiders and potential hackers and automates governance controls in heterogeneous enterprises. InfoSphere Guardium can help you eliminate costly and high-risk manual and silo approaches to data security and compliance by unifying and automating regulatory compliance tasks, thereby reducing operational costs while dramatically reducing security risks.