Tag Archives: remote

Effective database activity monitoring (Page 1 of 2)

There are a number of reasons for organisations to deploy Database Activity Monitoring or DAM solutions, which can range anywhere from compliance to cover overall security.

DAM is a data centre technology, which monitors how the data that is stored in core databases and file servers is being accessed; it works on analyzing access behaviour to detect data breaches, if any; and takes action accordingly to mitigate them.

Various rules and regulations, compliance laws, etc also are increasingly forcing organisations to tighten their control over sensitive data they store, and have a verifiable audit trail that can be signed off, if required, by the appropriate organisational executives.

Database Activity Monitoring Architecture

Different DAM vendors have different ways of tracking activities in a database and therefore implementation of architecture is also slightly different.

A DAM with single appliance or single server architecture provides 1-to-1 mapping of a database server with a monitoring appliance; thus it acts both as a sensor and a collector of appropriate data. DAM with this configuration is good for a small database; however, for larger databases it might not be enough effective. Then there is DAM with 2-tier architecture, consisting of a centralised management server; this server collects information from a set of remote sensors or collection points. With this architecture there is a better degree of system scalability.

DAM with hierarchical architecture builds further onto the 2-tier architecture; this system is best suited for larger organizations; these DAMs are capable of supporting a larger number of sensors and collectors, distributed across a large enterprise.

Advanced Database Activity Monitoring Techniques

The process through which all SQL traffic to a database is monitored is called Network monitoring. Network monitoring allows monitoring multiple databases simultaneously; all the commands that are sent across to databases under scrutiny, are kept track of. The activities of users that are logged directly into the server via a local console are not recorded. Performance of a database is not affected by network monitoring, as no overhead is placed over the database directly.

In remote monitoring, a SQL collector is placed on the database with administrative privileges; the native database auditing is also enabled. The collector aggregates all activity collected by the auditing tools. This type of monitoring imposes an overhead on the database as logging is enabled on the database server, causing it to work more. The advantage of remote monitoring is that all database activities are collected, including that of a user who is logged directly into the server.

One can install local agents on each database that is being monitored, but it is not necessary that they would be successful in detecting all database activity; it would depend on how these agents have been configured, and how much closer to the database they are allowed to sit.

Should You be Using a VPN?

You may already know what a VPN, or Virtual Private Network, is but are you using one? If you’re not using one, there’s a high likelihood that you really should be using a VPN. When it comes to the reasons why there are a number of them. But before we get into those it would probably be beneficial to review exactly what a VPN is for those of you out there that don’t know.

A VPN, according to Wikipedia, is “a technology for using the Internet or another intermediate network to connect computers to isolated remote computer networks that would otherwise be inaccessible.” Utilizing a VPN will give a user varying levels of security so that the traffic sent through the connection stays isolated from other computers on the immediate network. They can be used to connect individual users to a remote network or even to connect multiple networks together, depending upon the needs of the user. In doing so it gives users the ability to access resources on remote networks, such as databases, files, or printers. Also, due to the way VPN’s function it gives users the impression that they are directly connected to the central network.

One of the most significant things to know about a VPN though is that it secures your computer’s Internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes. This very reason is why VPN’s should probably be utilized more often by businesses and their employees. Also, a VPN alone is just a way to reinforce your security and access resources on a network you’re not physically connected to.

So why does all this matter? It matters because there is a growing trend within today’s workforce for employees to work remotely or while on the road. As a result, there are many times when that employee is using a public wifi connection to perform their work which can pose a major security risk depending upon the data being transferred. This security risk occurs because many people don’t realize that it isn’t too terribly difficult for snoopers to capture that data. So whether it’s what you’re writing in your email messages, posting to your Facebook page, or even buying on-line they are able to capture that with any of the readily accessible and easy-to-use programs that are out there.

Meaning that if the employee is sending sensitive and confidential emails at a local cafe shop those emails have a possibility of being intercepted and the sensitive information contained within them being exposed. Thereby potentially putting your business at risk. Which is definitely not a good thing.

Although there are many more good examples for why you should be using a VPN, for the sake of brevity, we won’t get into them. The main purpose or intent, if you will, in discussing the issue of VPN’s is to inform you as an employee or you as a business owner of the potential security risks that could already be occurring within your business on a day-to-day level and to make sure that you are fully aware of those risks so that you can take the necessary actions to ensure your business isn’t unnecessarily vulnerable.

Should You be Using a VPN?

You may already know what a VPN, or Virtual Private Network, is but are you using one? If you’re not using one, there’s a high likelihood that you really should be using a VPN. When it comes to the reasons why there are a number of them. But before we get into those it would probably be beneficial to review exactly what a VPN is for those of you out there that don’t know.

A VPN, according to Wikipedia, is “a technology for using the Internet or another intermediate network to connect computers to isolated remote computer networks that would otherwise be inaccessible.” Utilizing a VPN will give a user varying levels of security so that the traffic sent through the connection stays isolated from other computers on the immediate network. They can be used to connect individual users to a remote network or even to connect multiple networks together, depending upon the needs of the user. In doing so it gives users the ability to access resources on remote networks, such as databases, files, or printers. Also, due to the way VPN’s function it gives users the impression that they are directly connected to the central network.

One of the most significant things to know about a VPN though is that it secures your computer’s Internet connection to guarantee that all of the data you’re sending and receiving is encrypted and secured from prying eyes. This very reason is why VPN’s should probably be utilized more often by businesses and their employees. Also, a VPN alone is just a way to reinforce your security and access resources on a network you’re not physically connected to.

So why does all this matter? It matters because there is a growing trend within today’s workforce for employees to work remotely or while on the road. As a result, there are many times when that employee is using a public wifi connection to perform their work which can pose a major security risk depending upon the data being transferred. This security risk occurs because many people don’t realize that it isn’t too terribly difficult for snoopers to capture that data. So whether it’s what you’re writing in your email messages, posting to your Facebook page, or even buying on-line they are able to capture that with any of the readily accessible and easy-to-use programs that are out there.

Meaning that if the employee is sending sensitive and confidential emails at a local cafe shop those emails have a possibility of being intercepted and the sensitive information contained within them being exposed. Thereby potentially putting your business at risk. Which is definitely not a good thing.

Although there are many more good examples for why you should be using a VPN, for the sake of brevity, we won’t get into them. The main purpose or intent, if you will, in discussing the issue of VPN’s is to inform you as an employee or you as a business owner of the potential security risks that could already be occurring within your business on a day-to-day level and to make sure that you are fully aware of those risks so that you can take the necessary actions to ensure your business isn’t unnecessarily vulnerable.