Data infrastructures are highly dynamic, with changes in accounts, configurations and patches occurring regularly. Most organizations lack the centralized control or skilled resources to review changes systematically to determine if they have introduced security gaps. A Database vulnerability assessment is essential, as it identifies threats and security holes in databases or the underlying operating system which could be exploited by intruders and hackers to gain access to sensitive data.
With the average data breach now costing companies more than $5.4 million, is this something your organization can afford?
Mike Martin from BTRG describes how they used the customizable test capabilities in InfoSphere Guardium Vulnerability Assessment to create an assessment offering for PeopleSoft. This is the second of three parts from the original tech talk Making the Most of InfoSphere Guardium Vulnerability Assessment.
Louis Lam from the InfoSphere Guardium development lab takes you step by step through creating a custom security assessment test using the query-based test builder. This is part 3 of 3 from the original tech talk Making the Most of InfoSphere Guardium Vulnerability Assessment.
Ian Schmidt provides an overview of InfoSphere Guardium Vulnerability Assessment, including the business reasons for using it and an overview of capabilities.