RDB Consulting partners with Oracle to offer database security
January 2012, Cyber Security
Information has become the currency of today's world and database security is of the utmost importance when it comes to safeguarding this wealth from theft and data loss. RDB Consulting has stepped up to this need, incorporating Oracle's suite of database security solutions into its database outsource service. RDB Consulting will also monitor and maintain these security solutions for its clients.
"Database security is an area that has been neglected both internationally and within the South African market. One only has to look at the Wikileaks scandal to see just how vulnerable the database can be. It is vital to have the right checks and balances in place to secure the database, because unscrupulous people will always exploit any vulnerability for their own gain," says Jaroslav Cerny, CEO at RDB Consulting."
Oracle's Database Security suite delivers a portfolio of security solutions, combining tools such as: database activity monitoring and blocking; privileged user and multifactor access control; data classification; transparent data encryption; consolidated auditing and reporting; secure configuration management; and data masking, to ensure data privacy, protect against insider threats, and enable regulatory compliance.
Oracle Identity Management allows enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall, enabling organisations to deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. Together, these offerings coupled with RDB Consulting's services will provide a multifaceted, full featured database security offering ongoing maintenance and support.
RDB Consulting will incorporate this new offering through a twofold approach of both consulting services and software licensing. The consulting phase will involve investigations and a health check on existing database security as well as a comprehensive report, which will recommend the ideal products to address vulnerabilities identified during the process.
"This extension of our business opens up avenues to new markets, but is a natural fit, since we are already database specialists and can ensure that security solutions are correctly configured. We are now able to offer a more comprehensive end-to-end offering that includes security, adhering to Oracle Best Practice across the board and delivering ITIL and ISO 20000 compliance in a service that includes maintenance, consulting, on-going support, annual checks and analysis across all aspects of the database," Cerny concludes.
For more information contact, Jennifer Mbesa, RDB Consulting, +27 (0)11 807 7663, email@example.com
- NEC XON talks Industry 4.0 and disruption
November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, Conferences & Events, Training & Education
NEC XON held its seventh annual summit at Sun City in October this year in which it focused on the Fourth Industrial Revolution (IR4) and how it would disrupt the status quo.
- Our dependence on cyber-connectivity
November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Government and Parastatal (Industry)
The health, safety, security, economic well-being of citizens, effective functioning of government and perhaps even the survival of the industrialised world relies heavily upon interconnected critical systems.
- How close has video analytics grown to AI?
November 2018, Technews Publishing, CCTV, Surveillance & Remote Monitoring, Cyber Security, Integrated Solutions
Hi-Tech Security Solutions asks how far artificial intelligence has changed the video analytics market and how it will make an impact in future.
- Digital forensics is crucial to the security chain
November 2018, Cyber Security
Forensics involves the application of forensic tools to recover, scrutinise and analyse masses of data and logs to uncover what has happened.
- The risks of social media
November 2018, AVeS Cyber Security, Cyber Security
Employees, their social media profiles and the devices they use to access a company’s network and resources provide a plethora of gateways into the infrastructure for cyber criminals.
- The need for resilience in national infrastructure
November 2018, Government and Parastatal (Industry), Cyber Security, Security Services & Risk Management
The industries and infrastructure on which so much of our daily lives depend are deep in the midst of mass digitisation.
- Protecting constantly connected users
November 2018, Products, Cyber Security
The latest versions of ESET security products offer multi-layered protection, enhanced IoT protection, product referral and a new security report feature.
- Blockchain explained
November 2018, IT infrastructure, Cyber Security
Blockchain: What is it, how it works and how it is being used in the market? A closer look at the technology that is rapidly growing in popularity.
- J2 launches Home Secure
November 2018, J2 Software, News, Cyber Security
J2 Software has announced the launch of J2 Home Secure, aimed at protecting home/personal users from online fraud and cyber threats.
- Protect your money this festive season
November 2018, Cyber Security, News
The South African Banking Risk Information Centre (SABRIC), on behalf of the banking industry, would like to make the public aware of how they can protect their money this festive season and shared the following modus operandi to enable greater awareness.
- A shared responsibility
November 2018, Axis Communications SA, Cyber Security, CCTV, Surveillance & Remote Monitoring
Cybersecurity is a shared responsibility, none of the stakeholders in the market can fight cybercrime alone, we all need to work together to get ahead in the cyber game.
- Cybersecurity alone is not enough
November 2018, Dallmeier Electronic Southern Africa , Cyber Security, CCTV, Surveillance & Remote Monitoring
Cybersecurity alone is not enough: Dallmeier highlights the components for a total security approach in video technology.