Provides the foundations for a robust risk management process
Use Cases and Deployment Scope
Complete visibility into the database, all privileged activities, as well as comprehensive auditing of any access to sensitive information. It meets the operational scalability demands of the company by consolidating the management, visibility and reporting across the distributed locations. Enforces access policies, sending real-time alerts and enabling users to create follow-on tasks, to ensure proper incident management and response
Pros
- Routinely runs assessments and scans our systems to identify missing patches and configurations
- Enables the company to identify users with excessive rights to sensitive data
- Accelerates incident response and investigation with centralized management and advanced analytics
Cons
- Improve the process of forwarding details about system events and database security events to the company's Security Operations Center through better integration with other systems
Likelihood to Recommend
I have found the solution to be flexible, adaptable and responsive which enables the implementation of risk management principles and security best practices. It provides visibility into cloud application usage, including what data has been accessed, when and by whom that help detect behavioral anomalies with app usage and alert on suspicious events.
