˙Guardium 首次發表針對阻擋特權使用者存取機密敏感資料的解決方案 - 橫跨且支援所有主要的DBMS平台
May 23, 2008
˙Guardium 獲選為「Red Herring北美100強」的殊榮
May 22, 2008
˙Guardium 獲選為「American Business Awards」的決選入圍者
May 21, 2008
Read more
˙資訊安全焦點新聞
˙精選資安知識庫
 
 
 
 
Guardium / Retie Shield /
Guardium為您所有的應用程式及資料庫結構中所需的安全防護,提供了最簡潔有力的解決方案,包括:
˙ Auditing and compliance solutions
稽核與制度方案:使各項資料隱私安全處理方法的導入,能更簡易的符合各項法規,如:SOX(美國沙賓法安 Sarbanes-Oxley),PCI-DSS (支付卡產業之資料安全標準 Payment Card Industry Data Security Standard)
  ˙Compliance Workflow Automation
˙SOX
˙PCI
˙Data Privacy


Compliance Workflow Automation
Automate the Entire Database Security, Risk Management, and Governance Lifecycle

Unique in the industry, Guardium’s Compliance Workflow Automation application streamlines the entire compliance workflow process, from asset discovery, vulnerability assessment, and hardening to real-time activity monitoring and audit reporting, report distribution, sign-off by key stakeholders, and escalations.

This technology transforms database security lifecycle management from an error-prone, time-consuming activity that is performed periodically to a continuous, automated process that efficiently supports your privacy and governance goals without requiring additional staff.
˙ Manages the regular distribution of compliance reports across your organization
˙ Tracks the results of electronic sign-offs and escalations
˙ Stores both the audit trail and the results of your oversight process in a secure, tamper-proof repository that cannot be modified by anyone (even privileged users)
˙ Can be used to automate any repetitive activity in the system. For example, you can schedule periodic scans of your environment to auto-discover sensitive objects that may have been added by developers or moved from their previous location.? You can then use this information to automatically update all appropriate policy groups for these objects


With Guardium’s Compliance Workflow Automation system, you can easily create scheduled tasks for any activity including distribution and sign-off of audit reports, vulnerability assessments, database scans to discover sensitive data, and data feeds to external systems.
 
 
Opportunity 人才聘用 / Partners 合作夥伴 / Privacy Policy 隱私權條款 / Site Map 網站地圖