SlideShare a Scribd company logo
Grab
some
coffee and
enjoy the
pre-show
banter
before the
top of the
hour!
H T	Technologies		of	2016
HOST:	
Eric	Kavanagh
THIS	YEAR	is…
THE	LINE	UP	
ANALYST:	
Dez	Blanchfield	
Data	Scientist,		
The	Bloor	Group	
ANALYST:	
Robin	Bloor	
Chief	Analyst,		
The	Bloor	Group	
GUEST:	
Ignacio	Rodriguez	
Senior	Product	Manager,	
IDERA
INTRODUCING	
Robin	Bloor
Securing
Database
Robin Bloor, PhD
Database Security Evolution
It is easy to think of data security as
a static target, but it isn’t
It’s a MOVING TARGET
A Very Brief Overview of Data Security
u  Data theft is nothing new; data that is
valuable is targeted
u  Cyber-theft was born with the Internet
and it exploded around 2005
u  There are many players: governments,
businesses, hacker groups,
individuals…
u  The technologies of attack and
defense evolve
u  Businesses have a duty of care over
their data, whether they own it or not
About the Hackers
u  They can be located anywhere and
thus they may be difficult to bring to
justice, even if identified
u  Many are very skilled; they share
technology and information
u  They have considerable resources
u  Some are profitable businesses
u  There are government groups
–  Economic warfare (stealing secrets)
–  Cyber warfare
u  It’s unlikely that the phenomenon
will ever end
Compliance and Regulations
u  Aside from sector initiatives there
are many official regulations:
HIPAA, SOX, FISMA, FERPA, GLBA
(mainly US legislation)
u  Standards (Global): PCI-DSS, ISO/
IEC 17799 (data should be owned)
u  National regulations differ
country to country (even in
Europe)
u  GDPR being negotiated
Things to Think About
u  DBMS vulnerabilities
u  Identify vulnerable data
u  Security policy particularly
in relation to access
security (who can read,
write, grant permissions,
etc.)
u  Encryption
u  The cost of a security
breach
u  The attack surface
The DBA and Data Security
Data Security is usually part of the
DBA’s role. But it’s collaborative too.
It NEEDS to be subject to corporate
policy.
INTRODUCING	
Dez	Blanchfield
@dez_blanchfield	
YOUR DATA
IS THE
CURRENCY
@dez_blanchfield	
DATA	BREACHES	ARE	RAPIDLY	
BECOMING	NORMAL	!!
@dez_blanchfield
@dez_blanchfield	
THE	SHERE	SCALE	OF	THESE	
BREACHES	IS	STAGGERING
@dez_blanchfield
@dez_blanchfield	
COSTS	ESTIMATED	TO	CLEANUP	
DO	NOT	TAKE	INTO	ACCOUNT	
THE	HUMAN	TOLL
INTRODUCING	
Ignacio	Rodriguez
© 2016 IDERA, Inc. All rights reserved.
Proprietary and confidential.
© 2016 IDERA, Inc. All rights reserved.
THE NEW NORMAL: DEALING WITH THE
REALITY OF AN UNSECURE WORLD
Ignacio Rodriguez, Product Manager
2© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 2© 2016 IDERA, Inc. All rights reserved.
DATABASE SECURITY CHALLENGES
Identify Vulnerabilities
Manage creation of collection rules,
view collection history & analyze
user access rights
Harden Security Policies
Use recommended templates to
define policies with 3 distinct levels
of protection
Assess Security Levels
Identify factors that may allow SQL
Server to be attacked by a
malicious user to reduce risk
Control User Permissions
Analyze and manage user
permissions across all SQL Server
objects
Control Server Security
Review and update SQL Server
security properties across your
environment
Comply with Audits
Use customizable templates for
user accesses to satisfy audits
3© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 3© 2016 IDERA, Inc. All rights reserved.
SQL SECURE
§  Set strong security policies mapped to regulatory guidelines - View a complete
history of SQL Server security settings and designate a baseline to compare
against future changes.
§  Prevent security risks and violations - The security report card identifies top
security vulnerabilities on your servers. Each security check is categorized as
High, Medium, or Low Risk.
§  Identify vulnerabilities - Understand who has access to what and identify each
user’s effective rights across all SQL Server objects.
§  Report on and analyze user, group, or role permissions - Analyze membership to
powerful server roles and groups, such as administrators, systems
administrators, and security administrators to ensure each user’s level of
access is warranted.
4© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 4© 2016 IDERA, Inc. All rights reserved.
SQL SECURE
§  Deliver detailed security risk reports – IDERA SQL Secure provides 23 reports
out of the box, each of which contains flexible parameters to easily create the
types of reports that display the data that auditors, security officers, managers,
or administrators require.
§  Compare security, risk, and configuration changes over time - Reports such as
the snapshot and assessment comparisons provide an easy way for comparing
security, configuration, and risks between different time periods.
§  SQL Secure snapshot alerting - Notifications when SQL configuration changes
are detected that present a new risk.
5© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 5© 2016 IDERA, Inc. All rights reserved.
SQL SECURE ARCHITECTURE
SQL Secure
Repository
Management and
Collection Service
Enterprise
Console
SQL Secure
Monitored
SQL Instances
Agentless capture
of security model
info
MS SQL Server
Reporting
Services
Active Directory
6© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 6© 2016 IDERA, Inc. All rights reserved.
SECURITY REPORT CARD
7© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 7© 2016 IDERA, Inc. All rights reserved.
AUDIT SQL USER PERMISSIONS
8© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 8© 2016 IDERA, Inc. All rights reserved.
COMPARE SECURITY SETTINGS
9© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 9© 2016 IDERA, Inc. All rights reserved.
POLICY TEMPLATES
10© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 10© 2016 IDERA, Inc. All rights reserved.
SQL USER EFFECTIVE RIGHTS
11© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 11© 2016 IDERA, Inc. All rights reserved.
SQL SERVER OBJECT ACCESS RIGHTS
12© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 12© 2016 IDERA, Inc. All rights reserved.
SQL SECURE REPORTING
13© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 13© 2016 IDERA, Inc. All rights reserved.
SNAPSHOT COMPARISONS
14© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 14© 2016 IDERA, Inc. All rights reserved.
ASSESSMENT COMPARISON
15© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 15© 2016 IDERA, Inc. All rights reserved.
SUMMARY
§  Database security is of critical importance
•  Doing it wrong will expose your company to significant risks
•  Doing it well and effectively requires both strategy and process
§  Database professionals need a tool to manage and monitor database
access permissions
§  IDERA SQL Secure provides extensive capabilities to control database
permissions, track access activities, and mitigate breach risks
16© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 16© 2016 IDERA, Inc. All rights reserved.
THANKS!
Any questions?
The New Normal: Dealing with the Reality of an Unsecure World
The	Archive	Trifecta:	
•  Inside	Analysis		www.insideanalysis.com	
•  SlideShare		www.slideshare.net/InsideAnalysis	
•  YouTube		www.youtube.com/user/BloorGroup	
THANK	YOU!

More Related Content

PDF
The Art and Science of Alert Triage
PDF
Sqrrl 2.0 Launch Webinar
PPTX
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
PDF
Leveraging Threat Intelligence to Guide Your Hunts
PPTX
Using Deception to Detect and Profile Hidden Threats
PPTX
SQRRL threat hunting platform
PDF
Sqrrl March Webinar: How to Build a Big App
PPTX
IDERA Live | Have No Fear the DBA is Here: Protecting Data Resources
The Art and Science of Alert Triage
Sqrrl 2.0 Launch Webinar
Threat Hunting vs. UEBA: Similarities, Differences, and How They Work Together
Leveraging Threat Intelligence to Guide Your Hunts
Using Deception to Detect and Profile Hidden Threats
SQRRL threat hunting platform
Sqrrl March Webinar: How to Build a Big App
IDERA Live | Have No Fear the DBA is Here: Protecting Data Resources

What's hot (20)

PPTX
Sqrrl and IBM: Threat Hunting for QRadar Users
PPTX
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
PDF
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
PDF
9i R2 Checklist
PDF
Big Data Analytics to Enhance Security
PDF
SOCIAL MEDIA AS A CYBER WEAPON
PPTX
IDERA Live | Why You Need Data Warehouse Automation Now More Than Ever
PDF
Forrester Emerging MSSP Wave
PDF
(Certificates2019)alireza.ghahrood
PPTX
IDERA Live | Maintaining Data Governance During Rapidly Changing Conditions
PDF
Winning Strategy For Hybrid Cloud Environments
PPTX
These aren't the logs you’re looking for... Learn the Basics of Security Moni...
PPTX
OWASP Nagpur Meet #4
PDF
Netskope Overview
PDF
It's not about you: Mobile security in 2016
PPTX
Add Security Testing Tools to Your Delivery Pipeline
PPTX
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
PDF
Webinar: Stopping evasive malware - how a cloud sandbox array works
PDF
Webinar: A deep dive on ransomware
PPTX
IDERA Live | The Modern Query Optimizer
Sqrrl and IBM: Threat Hunting for QRadar Users
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
User and Entity Behavior Analytics using the Sqrrl Behavior Graph
9i R2 Checklist
Big Data Analytics to Enhance Security
SOCIAL MEDIA AS A CYBER WEAPON
IDERA Live | Why You Need Data Warehouse Automation Now More Than Ever
Forrester Emerging MSSP Wave
(Certificates2019)alireza.ghahrood
IDERA Live | Maintaining Data Governance During Rapidly Changing Conditions
Winning Strategy For Hybrid Cloud Environments
These aren't the logs you’re looking for... Learn the Basics of Security Moni...
OWASP Nagpur Meet #4
Netskope Overview
It's not about you: Mobile security in 2016
Add Security Testing Tools to Your Delivery Pipeline
Rebooting the Enterprise Security Program for Defensibility - ISSA Internatio...
Webinar: Stopping evasive malware - how a cloud sandbox array works
Webinar: A deep dive on ransomware
IDERA Live | The Modern Query Optimizer
Ad

Viewers also liked (20)

PPTX
"Sawares ułatwia życie" - artykuł w miesięczniku Kraków, nr 5 maj 2009
PDF
A Real-Time Version of the Truth
PDF
Application Acceleration: Faster Performance for End Users
KEY
Printmaking and political art
PDF
Heroku-ja Meetup #1 - Salesforce.com
PDF
Summer '12のワイルドな新機能+
PDF
Webエンジニアがラクして企業向けモバイルアプリを作る方法 ~Salesforce1モバイルコンテナを使った開発手法~
PDF
A Product Managers Survival Guide Transition to Agile (Agile 2008)
PDF
Wave : Analytics Cloudとは
PDF
The Central Hub: Defining the Data Lake
PDF
Mind Your Business: Why Privacy Matters to the Successful Enterprise
PDF
Heroku CIを触ってみる
PDF
A Tight Ship: How Containers and SDS Optimize the Enterprise
PDF
紹介 of Anemometer
PDF
SQL 脳から見た Ruby
PDF
地雷職人の朝は早い
PDF
A Bigger Magnifying Glass: Analyzing the Internet of Things
PDF
5.7の次のMySQL
PDF
ペパボ de MySQL
PDF
MySQLアンチパターン
"Sawares ułatwia życie" - artykuł w miesięczniku Kraków, nr 5 maj 2009
A Real-Time Version of the Truth
Application Acceleration: Faster Performance for End Users
Printmaking and political art
Heroku-ja Meetup #1 - Salesforce.com
Summer '12のワイルドな新機能+
Webエンジニアがラクして企業向けモバイルアプリを作る方法 ~Salesforce1モバイルコンテナを使った開発手法~
A Product Managers Survival Guide Transition to Agile (Agile 2008)
Wave : Analytics Cloudとは
The Central Hub: Defining the Data Lake
Mind Your Business: Why Privacy Matters to the Successful Enterprise
Heroku CIを触ってみる
A Tight Ship: How Containers and SDS Optimize the Enterprise
紹介 of Anemometer
SQL 脳から見た Ruby
地雷職人の朝は早い
A Bigger Magnifying Glass: Analyzing the Internet of Things
5.7の次のMySQL
ペパボ de MySQL
MySQLアンチパターン
Ad

Similar to The New Normal: Dealing with the Reality of an Unsecure World (20)

PPTX
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
PPTX
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
PPTX
HP Software Performance Tour 2014 - Guarding against the Data Breach
PDF
Do you know where your databases are?
PDF
A5 cloud security_now_a_reason_to_move_to_the_cloud
PDF
Forcepoint - Analýza chování uživatelů
PDF
Getting Started with Data Governance? Use Process Models!
PPTX
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
PDF
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
PPTX
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
PPTX
Agility, Business Continuity & Security in a Digital World: Can we have it all?
PPTX
IDERA Live | Doing More with Less: Managing Multiple Database Roles and Platf...
PDF
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
PDF
Qubole on Amazon AWS: Security and Compliance
PPTX
Scalar Security Roadshow - Vancouver Presentation
PPTX
Scalar Security Roadshow - Calgary Presentation
PDF
Scalar Security Roadshow - Ottawa Presentation
PPTX
Standing Up an Effective Enterprise Data Hub -- Technology and Beyond
PDF
Who, What, Where and How: Why You Want to Know
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Pre...
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
HP Software Performance Tour 2014 - Guarding against the Data Breach
Do you know where your databases are?
A5 cloud security_now_a_reason_to_move_to_the_cloud
Forcepoint - Analýza chování uživatelů
Getting Started with Data Governance? Use Process Models!
Webinar: Data Classification - Closing the Gap between Enterprise and SAP Data
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
Agility, Business Continuity & Security in a Digital World: Can we have it all?
IDERA Live | Doing More with Less: Managing Multiple Database Roles and Platf...
MySQL Day Paris 2018 - MySQL & GDPR; Privacy and Security requirements
Qubole on Amazon AWS: Security and Compliance
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Ottawa Presentation
Standing Up an Effective Enterprise Data Hub -- Technology and Beyond
Who, What, Where and How: Why You Want to Know
Combating Insider Threats – Protecting Your Agency from the Inside Out

More from Eric Kavanagh (20)

PPTX
The Future of Data Warehousing and Data Integration
PPTX
Best Practices in DataOps: How to Create Agile, Automated Data Pipelines
PPTX
Expediting the Path to Discovery with Multi-Source Analysis
PPTX
Will AI Eliminate Reports and Dashboards
PPTX
Metadata Mastery: A Big Step for BI Modernization
PDF
Horses for Courses: Database Roundtable
PDF
Database Survival Guide: Exploratory Webcast
PDF
Better to Ask Permission? Best Practices for Privacy and Security
PDF
The Model Enterprise: A Blueprint for Enterprise Data Governance
PDF
Best Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
PDF
A Winning Strategy for the Digital Economy
PDF
Discovering Big Data in the Fog: Why Catalogs Matter
PDF
Health Check: Maintaining Enterprise BI
PDF
Rapid Response: Debugging and Profiling to the Rescue
PDF
Solving the Really Big Tech Problems with IoT
PDF
Beyond the Platform: Enabling Fluid Analysis
PDF
Protect Your Database: High Availability for High Demand Data
PDF
A Better Understanding: Solving Business Challenges with Data
PDF
The Key to Effective Analytics: Fast-Returning Queries
PDF
Time's Up! Getting Value from Big Data Now
The Future of Data Warehousing and Data Integration
Best Practices in DataOps: How to Create Agile, Automated Data Pipelines
Expediting the Path to Discovery with Multi-Source Analysis
Will AI Eliminate Reports and Dashboards
Metadata Mastery: A Big Step for BI Modernization
Horses for Courses: Database Roundtable
Database Survival Guide: Exploratory Webcast
Better to Ask Permission? Best Practices for Privacy and Security
The Model Enterprise: A Blueprint for Enterprise Data Governance
Best Laid Plans: Saving Time, Money and Trouble with Optimal Forecasting
A Winning Strategy for the Digital Economy
Discovering Big Data in the Fog: Why Catalogs Matter
Health Check: Maintaining Enterprise BI
Rapid Response: Debugging and Profiling to the Rescue
Solving the Really Big Tech Problems with IoT
Beyond the Platform: Enabling Fluid Analysis
Protect Your Database: High Availability for High Demand Data
A Better Understanding: Solving Business Challenges with Data
The Key to Effective Analytics: Fast-Returning Queries
Time's Up! Getting Value from Big Data Now

Recently uploaded (20)

PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
Design an Analysis of Algorithms I-SECS-1021-03
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
history of c programming in notes for students .pptx
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
Introduction to Artificial Intelligence
PPTX
ai tools demonstartion for schools and inter college
PDF
AI in Product Development-omnex systems
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
medical staffing services at VALiNTRY
PDF
Digital Strategies for Manufacturing Companies
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PPTX
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
PDF
Understanding Forklifts - TECH EHS Solution
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
2025 Textile ERP Trends: SAP, Odoo & Oracle
CHAPTER 2 - PM Management and IT Context
Design an Analysis of Algorithms I-SECS-1021-03
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
Upgrade and Innovation Strategies for SAP ERP Customers
history of c programming in notes for students .pptx
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Introduction to Artificial Intelligence
ai tools demonstartion for schools and inter college
AI in Product Development-omnex systems
Operating system designcfffgfgggggggvggggggggg
Odoo POS Development Services by CandidRoot Solutions
medical staffing services at VALiNTRY
Digital Strategies for Manufacturing Companies
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
How to Migrate SBCGlobal Email to Yahoo Easily
Lecture 3: Operating Systems Introduction to Computer Hardware Systems
Understanding Forklifts - TECH EHS Solution

The New Normal: Dealing with the Reality of an Unsecure World

  • 8. Database Security Evolution It is easy to think of data security as a static target, but it isn’t It’s a MOVING TARGET
  • 9. A Very Brief Overview of Data Security u  Data theft is nothing new; data that is valuable is targeted u  Cyber-theft was born with the Internet and it exploded around 2005 u  There are many players: governments, businesses, hacker groups, individuals… u  The technologies of attack and defense evolve u  Businesses have a duty of care over their data, whether they own it or not
  • 10. About the Hackers u  They can be located anywhere and thus they may be difficult to bring to justice, even if identified u  Many are very skilled; they share technology and information u  They have considerable resources u  Some are profitable businesses u  There are government groups –  Economic warfare (stealing secrets) –  Cyber warfare u  It’s unlikely that the phenomenon will ever end
  • 11. Compliance and Regulations u  Aside from sector initiatives there are many official regulations: HIPAA, SOX, FISMA, FERPA, GLBA (mainly US legislation) u  Standards (Global): PCI-DSS, ISO/ IEC 17799 (data should be owned) u  National regulations differ country to country (even in Europe) u  GDPR being negotiated
  • 12. Things to Think About u  DBMS vulnerabilities u  Identify vulnerable data u  Security policy particularly in relation to access security (who can read, write, grant permissions, etc.) u  Encryption u  The cost of a security breach u  The attack surface
  • 13. The DBA and Data Security Data Security is usually part of the DBA’s role. But it’s collaborative too. It NEEDS to be subject to corporate policy.
  • 22. © 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. © 2016 IDERA, Inc. All rights reserved. THE NEW NORMAL: DEALING WITH THE REALITY OF AN UNSECURE WORLD Ignacio Rodriguez, Product Manager
  • 23. 2© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 2© 2016 IDERA, Inc. All rights reserved. DATABASE SECURITY CHALLENGES Identify Vulnerabilities Manage creation of collection rules, view collection history & analyze user access rights Harden Security Policies Use recommended templates to define policies with 3 distinct levels of protection Assess Security Levels Identify factors that may allow SQL Server to be attacked by a malicious user to reduce risk Control User Permissions Analyze and manage user permissions across all SQL Server objects Control Server Security Review and update SQL Server security properties across your environment Comply with Audits Use customizable templates for user accesses to satisfy audits
  • 24. 3© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 3© 2016 IDERA, Inc. All rights reserved. SQL SECURE §  Set strong security policies mapped to regulatory guidelines - View a complete history of SQL Server security settings and designate a baseline to compare against future changes. §  Prevent security risks and violations - The security report card identifies top security vulnerabilities on your servers. Each security check is categorized as High, Medium, or Low Risk. §  Identify vulnerabilities - Understand who has access to what and identify each user’s effective rights across all SQL Server objects. §  Report on and analyze user, group, or role permissions - Analyze membership to powerful server roles and groups, such as administrators, systems administrators, and security administrators to ensure each user’s level of access is warranted.
  • 25. 4© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 4© 2016 IDERA, Inc. All rights reserved. SQL SECURE §  Deliver detailed security risk reports – IDERA SQL Secure provides 23 reports out of the box, each of which contains flexible parameters to easily create the types of reports that display the data that auditors, security officers, managers, or administrators require. §  Compare security, risk, and configuration changes over time - Reports such as the snapshot and assessment comparisons provide an easy way for comparing security, configuration, and risks between different time periods. §  SQL Secure snapshot alerting - Notifications when SQL configuration changes are detected that present a new risk.
  • 26. 5© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 5© 2016 IDERA, Inc. All rights reserved. SQL SECURE ARCHITECTURE SQL Secure Repository Management and Collection Service Enterprise Console SQL Secure Monitored SQL Instances Agentless capture of security model info MS SQL Server Reporting Services Active Directory
  • 27. 6© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 6© 2016 IDERA, Inc. All rights reserved. SECURITY REPORT CARD
  • 28. 7© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 7© 2016 IDERA, Inc. All rights reserved. AUDIT SQL USER PERMISSIONS
  • 29. 8© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 8© 2016 IDERA, Inc. All rights reserved. COMPARE SECURITY SETTINGS
  • 30. 9© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 9© 2016 IDERA, Inc. All rights reserved. POLICY TEMPLATES
  • 31. 10© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 10© 2016 IDERA, Inc. All rights reserved. SQL USER EFFECTIVE RIGHTS
  • 32. 11© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 11© 2016 IDERA, Inc. All rights reserved. SQL SERVER OBJECT ACCESS RIGHTS
  • 33. 12© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 12© 2016 IDERA, Inc. All rights reserved. SQL SECURE REPORTING
  • 34. 13© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 13© 2016 IDERA, Inc. All rights reserved. SNAPSHOT COMPARISONS
  • 35. 14© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 14© 2016 IDERA, Inc. All rights reserved. ASSESSMENT COMPARISON
  • 36. 15© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 15© 2016 IDERA, Inc. All rights reserved. SUMMARY §  Database security is of critical importance •  Doing it wrong will expose your company to significant risks •  Doing it well and effectively requires both strategy and process §  Database professionals need a tool to manage and monitor database access permissions §  IDERA SQL Secure provides extensive capabilities to control database permissions, track access activities, and mitigate breach risks
  • 37. 16© 2016 IDERA, Inc. All rights reserved. Proprietary and confidential. 16© 2016 IDERA, Inc. All rights reserved. THANKS! Any questions?