Topic: 2013 AU
Subtopic: DB2 for z/OS
Databases contain an organization’s most valuable assets; that’s where customer data, financial records, payment card data and other sensitive information is stored. Databases have become a primary target of attacks by hackers and insiders with malicious intent. Investigations of actual data breaches over the last several years show that 96% of compromised records involve database servers. While DB2 for z/OS may hold the vast majority of your data, there may also be data held in other vendors databases - even proprietary data stores - across multiple platform. In this session you will learn how IBM solutions like InfoSphere Guardium can find out what data exists, help secure it to help prevent breaches from occurring in the first place, and streamline compliance activities to reduce operational costs.
Click Here to Download
NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.