Articles & Content


Data Governance for DBAs – Securing Production Data Assets (C07)

Topic: 2011 EMEA

Subtopic: DB2 for LUW

Your first line of defense to protect your sensitive data is to obviously lock the front door. That is, have authentication and authorization so you know who is getting into your database and what they are allowed to do. But there is more you can do. Many people have home alarms and video surveillance in addition to putting their valuables in a safe. You can do the same with your DB2 database. This session will cover not only the basics of data governance and security but also cover advanced topics like intrusion detection, activity monitoring, auditing and encryption.

Click Here to Download

NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.