The increasingly sophisticated nature of information theft, and the continued emergence of new data privacy protection regulations worldwide, requires strong data security. Effective information security starts by protecting data at the source - the databases in which it resides. Historically most organizations have relied on network perimeter and application level security to restrict access to sensitive data, leaving their databases and the sensitive information inside exposed.
Publish Date: 9/29/2009