Advanced Search

Save Or Share This Report

For Application Development & Delivery Professionals

Your Enterprise Database Security Strategy 2010

Stronger Measures Have Become Essential To Defend Against Growing Attacks

September 28, 2009

Primary author headshot

Authors

Why Read This Report

With increasingly sophisticated attacks and rising internal data theft, database security merits a stronger focus that goes beyond traditional authentication, authorization, and access control (AAA). A single intrusion that compromises private data such as credit card numbers, social security numbers, or other financial data can cause immense damage to an enterprise's reputation, not to mention initiating lawsuits and regulatory fines that can have long-term impact. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Database security professionals and information security and risk management professionals crafting a security strategy should: 1) align database security policies with information security policies; 2) ensure well-defined and formalized database security procedures; 3) enforce role separation; and 4) apply advanced security measures such as database auditing, monitoring, database encryption, data masking, and vulnerability assessment to all critical databases that store private data.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Timely and relevant, Forrester's RoleView research aligns to 13 leadership roles across business and technology management. Our expertise in customer experience, mobile, digital business, and big data will help your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($499 USD).

Purchase

Table of Contents

  • Databases Need Tighter Security To Protect Against Threats
  • Enterprises Must Establish A Comprehensive Database Security Strategy
  • Don't Forget Security Policies, Standards, Role Separation, And Availability
  • RECOMMENDATIONS

  • All Enterprises Need A Database Security Strategy
  • Related Research Documents

Recommended Research