Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/28/2009
03:10 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Oracle Broadens Database Auditing And Monitoring Capabilities

Oracle Audit Vault now collects audit data from IBM DB2 and Sybase ASE to help customers meet regulatory mandates and secure against insider threats

Redwood Shores, Calif. - January 28, 2009 News Facts To assist organizations seeking to further mitigate security risks, satisfy compliance regulations, and protect their enterprise databases, Oracle' Audit Vault has introduced support for collecting audit data from IBM DB2 for Linux, UNIX and Windows (IBM DB2) and Sybase Adaptive Server Enterprise (ASE) database servers.

Oracle Audit Vault offers organizations a centralized auditing and activity monitoring solution for their Oracle and third party databases. Comprehensive Database Auditing and Activity Monitoring Solution

Oracle Audit Vault now captures audit data from IBM DB2 versions 8.2 and 9.5 and Sybase ASE versions 12.5 and 15.0, in addition to Microsoft SQL Server 2000 and 2005 and Oracle Database 11g.

Oracle Audit Vault addresses the lack of IBM, Microsoft and Sybase solutions for enterprise database auditing and activity monitoring.

With Oracle Audit Vault, audit data is consolidated automatically into a secure, centralized repository built using Oracle's proven data warehousing software, and analyzed in real-time against enterprise-defined policies. Any unauthorized activities can be detected immediately using Oracle Audit Vault's alerts dashboard.

In addition, Oracle Audit Vault delivers pre-built, customizable reports to help address the need for comprehensive compliance reporting for regulations such as the Payment Card Industry (PCI) Data Security Standard (DSS), Health Insurance Portability and Accountability Act (HIPAA), and the Sarbanes-Oxley (SOX) Act. Oracle Audit Vault's reports can be saved and shared within the enterprise as well as with external auditors.

Oracle Audit Vault can be used to monitor privileged user activities as well as privileged user controls enforced by Oracle Database Vault, the industry's only native solution for real-time enforcement of preventive database controls. By using Oracle Audit Vault, Oracle Database Vault customers are further assured of the integrity of their preventive controls.

Oracle leads the industry in native database auditing with fine-grained auditing at the user, statement and object levels that provide organizations the capabilities to effectively monitor all database activities.

Supporting Quotes "Customers can further improve the security of their enterprise databases with Oracle Audit Vault," said Vipin Samar, vice president of Database Security, Oracle. "Oracle Audit Vault's database activity monitoring and reporting capabilities turn real-time audit data generated natively by heterogeneous databases into a key security resource for detecting unauthorized activity as well as automating time-consuming regulatory compliance reporting functions."

"Automating the collection of audit data needed to generate compliance reports can save organizations significant costs," said PricewaterhouseCoopers' Oracle Technology practice leader, Sohail Siddiqi. "Products such as Oracle Audit Vault that collect audit data from diverse databases can help organizations increase enterprise security and meet regulatory mandates more efficiently."

"Clients often look for monitoring tools that support more than a single platform," said Trent Henry, Senior Analyst, Burton Group. "When a database vendor provides a tool that offers heterogeneous support, it fundamentally changes the game and removes a serious obstacle to adoption."

Supporting Resources Oracle Security Inside Out Blog Oracle Audit Vault Data Sheet Oracle Audit Vault Online Demo Analyst webcast on Database Activity and Configuration Monitoring Download a free, evaluation version of Oracle Audit Vault. Terms, conditions and restrictions apply.

About Oracle Database Security For more than 30 years, Oracle has led the industry in securing sensitive data. Oracle Database 11g addresses today's data security challenges from data encryption, access control, and data classification, to audit and compliance reporting, as well as secure deployments and data masking. The comprehensive portfolio of security options for Oracle Database 11g, including Oracle Advanced Security, Oracle Database Vault, Oracle Label Security, Oracle Data Masking, and Oracle Audit Vault, helps organizations to transparently safeguard against data breaches and to achieve regulatory compliance without requiring changes to existing applications. To learn more about how to protect data with Oracle Database 11g today, please visit: http://www.oracle.com/database/security.

About Oracle Oracle (NASDAQ: ORCL) is the world's largest enterprise software company. For more information about Oracle, please visit our Web site at http://www.oracle.com. dfsdfdsfsdf

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/23/2020
Russian Military Officers Unmasked, Indicted for High-Profile Cyberattack Campaigns
Kelly Jackson Higgins, Executive Editor at Dark Reading,  10/19/2020
Modern Day Insider Threat: Network Bugs That Are Stealing Your Data
David Pearson, Principal Threat Researcher,  10/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13100
PUBLISHED: 2020-10-26
Arista’s CloudVision eXchange (CVX) server before 4.21.12M, 4.22.x before 4.22.7M, 4.23.x before 4.23.5M, and 4.24.x before 4.24.2F allows remote attackers to cause a denial of service (crash and restart) in the ControllerOob agent via a malformed control-plane packet.
CVE-2020-25470
PUBLISHED: 2020-10-26
AntSword 2.1.8.1 contains a cross-site scripting (XSS) vulnerability in the View Site funtion. When viewing an added site, an XSS payload can be injected in cookies view which can lead to remote code execution.
CVE-2020-7751
PUBLISHED: 2020-10-26
This affects all versions of package pathval.
CVE-2020-27678
PUBLISHED: 2020-10-26
An issue was discovered in illumos before 2020-10-22, as used in OmniOS before r151030by, r151032ay, and r151034y and SmartOS before 20201022. There is a buffer overflow in parse_user_name in lib/libpam/pam_framework.c.
CVE-2020-27388
PUBLISHED: 2020-10-23
Multiple Stored Cross Site Scripting (XSS) vulnerabilities exist in the YOURLS Admin Panel, Versions 1.5 - 1.7.10. An authenticated user must modify a PHP plugin with a malicious payload and upload it, resulting in multiple stored XSS issues.