How to Protect Access to Your Critical Databases
Database access has always been a sensitive issue for organizations, with most companies traditionally restricting it to a handful of admins and relying on human trust for things to not go wrong. With investments in data analytics and cloud, however, large swaths of employees end up getting access to these critical assets via Jupyter, Looker, DBeaver, and other tools. Should human trust still be the only security control? In this talk with Michael Barrett, Cyber Security Strategist, we will dive into famous data loss cases, take you through the challenges with database access controls, then examine how database leaks can be prevented.
- The history of database controls and challenges with secure access
- What’s required to overcome the challenges and have defense in depth
- How to control access and apply things like least privilege to better secure your sensitive data
Watch How to Protect Access to Your Critical Databases
Network Shield Introduction & Demo
Join Rich Young, Enterprise Solutions Engineer and Jeremy Wolff, SE Director as they demonstrate the power of Cyral’s Network Shield. Learn how to restrict access …
How to Resolve Service Accounts with Cyral
A common problem many security teams face is the lack of identity attribution for the end users of various applications and BI tools that use service accounts to query data from databases.