˙Guardium 首次發表針對阻擋特權使用者存取機密敏感資料的解決方案 - 橫跨且支援所有主要的DBMS平台
May 23, 2008
˙Guardium 獲選為「Red Herring北美100強」的殊榮
May 22, 2008
˙Guardium 獲選為「American Business Awards」的決選入圍者
May 21, 2008
Read more
˙資訊安全焦點新聞
˙精選資安知識庫
 
 
 
 
Guardium / Retie Shield /
Guardium為您所有的應用程式及資料庫結構中所需的安全防護,提供了最簡潔有力的解決方案,包括:
˙ Auditing and compliance solutions
稽核與制度方案:使各項資料隱私安全處理方法的導入,能更簡易的符合各項法規,如:SOX(美國沙賓法安 Sarbanes-Oxley),PCI-DSS (支付卡產業之資料安全標準 Payment Card Industry Data Security Standard)
  ˙Compliance Workflow Automation
˙SOX
˙PCI
˙Data Privacy


SOX

Guardium’s SOX Accelerator provides a library of best practices templates for addressing key SOX requirements, such as monitoring the following:

˙ Privileged user activities
˙ Schema changes
˙ Privilege changes
˙ Database logins
˙ Security exceptions such as failed logins and database errors

The SOX Accelerator is based on the standard COBIT (Control Objectives for Information and Related Technology) framework for IT controls, which has become the de facto standard for SOX auditors and compliance.

Guardium’s SOX Accelerator encompasses all four COBIT domains including:

Plan and Organize Manage the planning phase by gathering information about who is touching your critical financial objects in order to quickly identify unauthorized users and applications.? Using advanced auto-discovery capabilities, the system creates a visual access map showing all database servers, applications, clients, and subnets. Interactive drill-downs enable quick understanding of the “who, what, when, where, and how” of all database transactions, organized by access type, content, and frequency.

Certify and Control Enables users to certify that all database access activities are aboveboard and that those that fall outside of SOX parameters can either be rectified or explored further.? Information provided includes a “to do” list of audit tasks, as well as a variety of reports on topics such as financial system exceptions; failed user logins; user activity audit trails; SQL errors on financial data; and access to financial data by unauthorized applications.? Customizable tests, weights, and assessments provide the flexibility you need for continuous, real-time snapshots and tracking continuous improvement metrics over time.

Assess Risk Offers information that can be used to gauge possible risks, with emphasis on those areas referred to in the database-related requirements for SOX.? These reports cover such categories as users sharing database credentials across multiple client IPs to access financial data; after hours activities on financial database servers; access to financial data by unrecognized users; attempts to access financial data by a non-recognized client; and a variety of commands executed on financial databases.

Investigate and Disclose Dig deeper into any possible exceptions to discover their origins, as well as whether or not there are issues that warrant further handling. Includes reports showing the distribution of DDL and DML commands for financial databases; user activity on financial data, organized by client IP and database user; details about all sessions by financial server IP; detailed activity on financial objects; and more.


Full Visibility and Understanding
A visual access map allows you to quickly identify unauthorized users and applications with a graphical representation of all database servers, clients, subnets, and applications. Interactive drill-downs enable quick understanding of the “who, what, when , where and how” of all database transactions.

Guardium’s SOX Accelerator provides pre-configured templates, based on the COBIT standard and from working with Big 4 auditors around the world, to help our customers successfully pass their audits.

 
 
Opportunity 人才聘用 / Partners 合作夥伴 / Privacy Policy 隱私權條款 / Site Map 網站地圖