• Data Sheet

Assure Db2 Data Monitor

Regulations like PCI DSS and HIPAA have long suggested the benefits of tracking access to confidential data. More recently, regulations like GDPR have begun to require it, and new regulations are likely to follow that lead.

It’s imperative that your organisation monitor and control the list of people allowed to access your most sensitive databases, and exactly what data they can read. Hoping that unauthorised users are not viewing corporate financial data, executive compensation, medical data and customer lists is not enough. You need tools to prevent accidental data disclosure and intentional breaches of confidentiality.

Assure Db2 Data Monitor, a feature of Assure Security and part of its Assure Compliance Monitoring feature bundle, is an innovative solution that gives you complete control over the visibility of confidential IBM i data. It monitors and alerts you to users who have viewed sensitive records in Db2 databases, as well as how and when the data was viewed. It even blocks records from view by unauthorised users. 

With Assure Db2 Data Monitor, you can monitor the security of your most valuable corporate data while meeting the most stringent regulatory requirements for data confidentiality.

To learn more, download your copy of the full data sheet.

Share this resource:
LinkedIn
Facebook
X
WhatsApp
Email

Related posts

Automated, fast, accurate, sensitive data mapping & assessment as-a-service.
Given the increasing frequency of cyber attacks, it is essential to regularly conduct security risk assessments as part of a comprehensive IT security program.
The days when the IBM i was an isolated platform communicating through proprietary protocols are gone. Modern IBM i systems are highly connected through standard network and open-source protocols. This opens a wide variety of access points to the worldwide hacker community, who recognise the high value of data residing on an IBM i.
Having too many powerful user profiles leaves the security of your IBM i system and data exposed. In fact, security and compliance auditors prefer that IBM i users be given only the authorities required to perform their jobs, and that they be granted additional authority only when needed and only for the time required.