classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2017


RDB Consulting partners with Oracle to offer database security
January 2012, Cyber Security

Information has become the currency of today's world and database security is of the utmost importance when it comes to safeguarding this wealth from theft and data loss. RDB Consulting has stepped up to this need, incorporating Oracle's suite of database security solutions into its database outsource service. RDB Consulting will also monitor and maintain these security solutions for its clients.

"Database security is an area that has been neglected both internationally and within the South African market. One only has to look at the Wikileaks scandal to see just how vulnerable the database can be. It is vital to have the right checks and balances in place to secure the database, because unscrupulous people will always exploit any vulnerability for their own gain," says Jaroslav Cerny, CEO at RDB Consulting."

Oracle's Database Security suite delivers a portfolio of security solutions, combining tools such as: database activity monitoring and blocking; privileged user and multifactor access control; data classification; transparent data encryption; consolidated auditing and reporting; secure configuration management; and data masking, to ensure data privacy, protect against insider threats, and enable regulatory compliance.

Oracle Identity Management allows enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall, enabling organisations to deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. Together, these offerings coupled with RDB Consulting's services will provide a multifaceted, full featured database security offering ongoing maintenance and support.

RDB Consulting will incorporate this new offering through a twofold approach of both consulting services and software licensing. The consulting phase will involve investigations and a health check on existing database security as well as a comprehensive report, which will recommend the ideal products to address vulnerabilities identified during the process.

"This extension of our business opens up avenues to new markets, but is a natural fit, since we are already database specialists and can ensure that security solutions are correctly configured. We are now able to offer a more comprehensive end-to-end offering that includes security, adhering to Oracle Best Practice across the board and delivering ITIL and ISO 20000 compliance in a service that includes maintenance, consulting, on-going support, annual checks and analysis across all aspects of the database," Cerny concludes.

For more information contact, Jennifer Mbesa, RDB Consulting, +27 (0)11 807 7663, info@rdbconsulting.com


  Share via Twitter   Share via LinkedIn      

Further reading:

  • The most important features of a management platform
    September 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Cyber Security, Integrated Solutions
    Hi-Tech Security Solutions asks the industry for the top three features you should be looking for in a security management platform.
  • Nearly every third corporate data breach gets employees fired
    September 2018, Cyber Security, News
    According to a new report from Kaspersky Lab and B2B International, 25% of data breaches in the Middle East, Turkey and Africa (META) region in the past year have led to people losing their jobs.
  • IoT in your home: what are the risks?
    September 2018, Cyber Security
    Put security in place before investing in IoT smart home devices.
  • Threats to control rooms
    September 2018, Contract Surveillance Services, CCTV, Surveillance & Remote Monitoring, Cyber Security
    CSS offers advice for protecting remote control rooms from criminal attacks and interference.
  • The link between passwords and sextortion
    September 2018, J2 Software, This Week's Editor's Pick, Cyber Security
    John Mc Loughlin, CEO of J2 Software, says the company is being engaged to consult with victims of what is becoming an alarming increase in incidents of sextortion.
  • Modern KPIs for effective cybersecurity
    September 2018, Nclose, Cyber Security
    Faced with increasingly frequent and sophisticated cyber-attacks, enterprises are scrambling to put technologies and processes in place to effectively detect and combat cyber risks.
  • Ten cybersecurity smart home tips from Ben-Gurion University
    September 2018, Cyber Security
    According to cyber researchers at Ben-Gurion University of the Negev, Cyber Security Awareness Month is an excellent time to make a few simple changes that will result in a far greater level of safety and security.
  • Facing the cybersecurity challenge
    August 2018, Technews Publishing, Cyber Security
    There are many cybersecurity products and solutions out there, but what do they offer and how will they protect you and strengthen your cybersecurity posture?
  • Visibility is security
    August 2018, Cyber Security
    Andrew Wilson, CEO at LucidView says effective threat detection boils down to one thing – visibility.
  • 5 steps to integrating business continuity and cyber resilience
    August 2018, ContinuitySA, Cyber Security, Security Services & Risk Management
    It is imperative that cyber resilience is integrated into organisations’ business continuity management plans.
  • Knowledge and visibility leads to security
    August 2018, J2 Software, Cyber Security
    John Mc Loughlin highlights some key areas an organisation needs to take note of in effectively securing their systems from cyber-attacks in all their different forms.
  • The cyber-skills conundrum
    August 2018, Cyber Security
    A lack of skilled resources is not the only factor behind the cybersecurity workforce shortage, says Rick Rogers, area manager for Africa at Check Point Technologies.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.