File activity monitoring is similar to database activity monitoring in many respects. For instance, a simple vivid example is that in both cases, you discover the sensitive data on your servers and configure policies to create rules about data access and actions to be taken when rules are met.

File activity monitoring may include the following capabilities:

  • Discovery to inventory files and metadata.
  • Classification to crawl through the files to look for potentially sensitive data, such as credit card information or personally identifiable information.
  • Monitoring- which can be used without discovery and classification to monitor access to files based on policy rules, audit and alert on inappropriate access, or even block access to the files to prevent data leakage.

File …

Read More →

Usually, hackers know what they want and where to find it. Crucial dynamic data centres such as file servers are among the most targeted sources of your intellectual property, financial information, deal data, or PII. Most cyber-attacks have become increasingly sophisticated, leveraging multiple tactics and tools, all with one goal: getting in. The role of file firewall for dynamic data masking is to protect sensitive unstructured data where it resides, so that you can prevent data breaches, along with their resulting exposure, costs and brand damage.

Thus file firewall prevent your files from becoming an easy target for internal and external threats. Moving forward you can immediately respond to suspicious file access activity by generating notifications, or in certain situations, …

Read More →

The phrase dynamic data breach notification is rather ambiguous, especially when details such as personal information are introduced into the equation. In general, however, a dynamic data security breach may take place when there is unauthorized access to sensitive Personally Identifiable Information (PII) that could compromise the confidentiality or integrity of data. Dynamic data breach notification involves mandating that the company holding the PII notify those whose PII was compromised.

Just a few specific sectors of the private-sector economy are currently required by federal law to notify consumers when a dynamic data breach may have compromised their personal information, or PII. These include certain financial institutions covered by the Gramm-Leach Bliley Act and certain health care entities covered by the …

Read More →

What happens when a company laptop goes missing? What of when customer payment records are stolen? Paper files are lost. Worse still, suppose online systems are hacked? What next for such a company especially if it is an upcoming company trying to establish itself? Truly speaking, any enterprise that collects or stores sensitive personal information be it electronically or in paper files, is at risk for a dynamic data breach. According to the 2013 Verizon Dynamic data Breach Investigations Report (DBIR), 31% of all data breaches investigated in 2012 occurred in organizations with less than 100 employees.

Counteract Dynamic Data Breaches With Prevention.

The DBIR also revealed that most breaches investigated in 2012 were preventable. As a matter of …

Read More →

Oracle databases have been in existence for quite a while now. To be precise, Oracle released their 9i (9.0.1) version about 2 years ago. Many companies are still using the 8i (8.1.x), 8 (8.0.x) and 7.x database versions. For the most part, everything that is available in a lower version will be available in a higher version as well.

dynamic data masking

There are a few minor exceptions, but the Oracle databases tend to be backwards compatible. When Oracle releases a new version, their documentation contains a list of all the features new to that version. So it is worthwhile for the Database Administrator to read this documentation to discover what is new in the dynamic data masking database.

To give you …

Read More →

For each and every database, there must be at least one database administrator abbreviated as DBA to perform administration duties on it. Since an Oracle dynamic data system may be large and can have multiple users, often this is not a single person’s job. In similar cases, there is a group of Dynamic Data Administrators who share this responsibility.

Dynamic Data Masking

A database administrator’s duties can include the following tasks:

  • Installing and upgrading the Oracle server and application tools
  • Allocating system storage and planning future storage requirements for the database system
  • Creating primary database storage structures (table spaces) after application developers have designed a certain application
  • Creating primary objects (tables, views, indexes) once application developers have designed an application
  • Modifying the database
Read More →