RDB Consulting partners with Oracle to offer database security
January 2012, Cyber Security
Information has become the currency of today's world and database security is of the utmost importance when it comes to safeguarding this wealth from theft and data loss. RDB Consulting has stepped up to this need, incorporating Oracle's suite of database security solutions into its database outsource service. RDB Consulting will also monitor and maintain these security solutions for its clients.
"Database security is an area that has been neglected both internationally and within the South African market. One only has to look at the Wikileaks scandal to see just how vulnerable the database can be. It is vital to have the right checks and balances in place to secure the database, because unscrupulous people will always exploit any vulnerability for their own gain," says Jaroslav Cerny, CEO at RDB Consulting."
Oracle's Database Security suite delivers a portfolio of security solutions, combining tools such as: database activity monitoring and blocking; privileged user and multifactor access control; data classification; transparent data encryption; consolidated auditing and reporting; secure configuration management; and data masking, to ensure data privacy, protect against insider threats, and enable regulatory compliance.
Oracle Identity Management allows enterprises to manage the end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall, enabling organisations to deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. Together, these offerings coupled with RDB Consulting's services will provide a multifaceted, full featured database security offering ongoing maintenance and support.
RDB Consulting will incorporate this new offering through a twofold approach of both consulting services and software licensing. The consulting phase will involve investigations and a health check on existing database security as well as a comprehensive report, which will recommend the ideal products to address vulnerabilities identified during the process.
"This extension of our business opens up avenues to new markets, but is a natural fit, since we are already database specialists and can ensure that security solutions are correctly configured. We are now able to offer a more comprehensive end-to-end offering that includes security, adhering to Oracle Best Practice across the board and delivering ITIL and ISO 20000 compliance in a service that includes maintenance, consulting, on-going support, annual checks and analysis across all aspects of the database," Cerny concludes.
For more information contact, Jennifer Mbesa, RDB Consulting, +27 (0)11 807 7663, email@example.com
- The most important features of a management platform
September 2018, Technews Publishing, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, Cyber Security, Integrated Solutions
Hi-Tech Security Solutions asks the industry for the top three features you should be looking for in a security management platform.
- Nearly every third corporate data breach gets employees fired
September 2018, Cyber Security, News
According to a new report from Kaspersky Lab and B2B International, 25% of data breaches in the Middle East, Turkey and Africa (META) region in the past year have led to people losing their jobs.
- IoT in your home: what are the risks?
September 2018, Cyber Security
Put security in place before investing in IoT smart home devices.
- Threats to control rooms
September 2018, Contract Surveillance Services, CCTV, Surveillance & Remote Monitoring, Cyber Security
CSS offers advice for protecting remote control rooms from criminal attacks and interference.
- The link between passwords and sextortion
September 2018, J2 Software, This Week's Editor's Pick, Cyber Security
John Mc Loughlin, CEO of J2 Software, says the company is being engaged to consult with victims of what is becoming an alarming increase in incidents of sextortion.
- Modern KPIs for effective cybersecurity
September 2018, Nclose, Cyber Security
Faced with increasingly frequent and sophisticated cyber-attacks, enterprises are scrambling to put technologies and processes in place to effectively detect and combat cyber risks.
- Ten cybersecurity smart home tips from Ben-Gurion University
September 2018, Cyber Security
According to cyber researchers at Ben-Gurion University of the Negev, Cyber Security Awareness Month is an excellent time to make a few simple changes that will result in a far greater level of safety and security.
- Facing the cybersecurity challenge
August 2018, Technews Publishing, Cyber Security
There are many cybersecurity products and solutions out there, but what do they offer and how will they protect you and strengthen your cybersecurity posture?
- Visibility is security
August 2018, Cyber Security
Andrew Wilson, CEO at LucidView says effective threat detection boils down to one thing – visibility.
- 5 steps to integrating business continuity and cyber resilience
August 2018, ContinuitySA, Cyber Security, Security Services & Risk Management
It is imperative that cyber resilience is integrated into organisations’ business continuity management plans.
- Knowledge and visibility leads to security
August 2018, J2 Software, Cyber Security
John Mc Loughlin highlights some key areas an organisation needs to take note of in effectively securing their systems from cyber-attacks in all their different forms.
- The cyber-skills conundrum
August 2018, Cyber Security
A lack of skilled resources is not the only factor behind the cybersecurity workforce shortage, says Rick Rogers, area manager for Africa at Check Point Technologies.