Articles & Content


How to Capture Data Breaches - Brother-WatchDog Auditing Solution (J08)

Topic: 2007 NA

Subtopic: DB2 for LUW

DATE: 2007-5-8 (04:20 PM - 05:20 PM)
SPEAKERS: Alex Choice (Database Brothers Inc)

Brother-WatchDog is a DB2 UDB database auditing solution available for making everyone accountable! With the Brother-WatchDog tool, see who was ‘looking’ or ‘touching' the corporate databases. Anonymous users are unmasked, tracked and securely captured. You now know who ‘looked’, who ‘touched’, when, from where, how much data was exposed, and the CPU cost. Think of Brother-WatchDog as a traffic camera for all of the valuable corporate databases watching your customers and fellow employee SSN's, credit card, and personal health information. Learn about TCP/IP addressing, finding idle tables, capturing read-only table traffic, logon and security failures, performance tracking, chargeback of CPU usage, and compliance reporting techniques for SOX & HIPAA.

EXP. LEVEL: Beginner


Identifying Anonymous Users in the Database ---Process ID, Application ID, WebID, DBA's Admin ID accessing DB2 Database

Learn about access methods, connection pooling, direct logging, TCP/IP addressing, and logon and security failures

Finding idle tables and capturing read-only table traffic

Performance tracking, chargeback, and CPU usage techniques

Product demo and compliance reporting techniques for SOX & HIPAA

This file is being provided by IDUG. We would encourage you to join IDUG to get full access to all of our files and resources. Joining IDUG is FREE and signing up is simple. Click here to join! or login!

Download File
Click to Download

NOTE: These are only open to members of IDUG. If you are not a member, please CLICK HERE for more information.