Using Database Tools to Meet Information Security Requirements

By: Michael Findling

Abstract: This session covers tagging of data assets per regulatory requirements (for example: FISMA, HIPAA, etc.) and shows how DSAuditor reports on who accessed the data.

Published on: 9/3/2009 2:32:33 PM

Server Response from: ETNASC02

Copyright© 1994 - 2013 Embarcadero Technologies, Inc. All rights reserved.