PROTECT: Identify and Protect Your Sensitive Data with Seamless Interception

TBC 2017 - Di Giacomo - Identify and Protect Sensitive Data Presentation - thumbnail.jpg
TBC 2017 - Di Giacomo - Identify and Protect Sensitive Data Presentation - thumbnail.jpg

PROTECT: Identify and Protect Your Sensitive Data with Seamless Interception

0.00

 PROTECT: Identify and Protect Your Sensitive Data with Seamless Interception

Speaker:
Jack Di Giacomo
Principal
TANDsoft

 

Interception technology allows a NonStop customer to log or audit database access calls in order to identify who is accessing sensitive data as well as to protect that data via encryption/tokenization algorithms. Seamless interception permits such transactions without the need for any application modifications, of particular importance when the source code is unavailable. The presentation will introduce attendees to the basics of interception technology and the role it plays in identifying and protecting sensitive data written to Enscribe, SQL/MX, and SQL/MP databases. We’ll offer real-world examples of where seamless interception is at work in the security space, and we’ll discuss what NonStop security solutions currently exist from HPE and third-party providers.

Add To Cart