Feb 18 2010
Application Security, Inc., the leading provider of database security, risk and compliance solutions for the enterprise, today announced the availability of a FREE whitepaper that simplifies the selection process for a database vulnerability assessment solution.
“Few people understand the internal complexities of database systems”
The whitepaper sponsored by AppSec and independently written by Adrian Lane, analyst and chief technology officer of Securosis, is titled: “Understanding and Selecting a Database Assessment Solution.” The whitepaper discusses how database vulnerability assessment has evolved into a powerful platform for automating compliance mandates and security requirements and provides insight into evaluating solutions.
“Few people understand the internal complexities of database systems” said Adrian Lane, analyst and chief technology officer, Securosis. “When you initiate a database security program, assessment is the starting point for the entire process.”
“AppSec has long advocated the importance of database vulnerability assessment,” said Thom VanHorn, vice president, global marketing, AppSec. “This independent research validates that position and provides organizations with the tools and understanding they require to implement the appropriate assessment solution for their enterprise.
The whitepaper provides answers to the following questions:
- Why are database assessment solutions important for enterprise organizations?
- What are the business needs and drivers for database assessment solutions?
- What constitutes modern database assessment and how does it differ from network/OS scanning?
- What value do businesses derive from ongoing database assessment?
- How should an organization evaluate core features of database assessment solutions?
AppSec will also host a webinar with Securosis’ Adrian Lane on March 16, 2010 at 2:00 p.m. EST. The Webinar will explore the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying database assessment.
Source:
Application Security, Inc.