Loading....
This is a very powerful and easy to use security tool and can be easily deployed to enforce
security and also comply with audit requirements.

In the first case study, a user with all database privileges (DBA) can still be 'locked out' and
prevented from accessing certain tables in a particular schema.

In the second case study, security is enforced by ensuring that any DELETE operations on a
particular table can only be possible if a user connects from a client machine having a particular
IP address.

Using the web UI, creating rule sets and security realms is very easy and this is a way of ensuring
that all different kinds of audit and security requirements are very easily and effectively met with
minimum effort.

Download …;

Please follow and like us:

Last Update: July 2, 2009  

July 2, 2009 211 Gavin Soorma
Total 0 Votes:
0

Tell us how can we improve this post?

+ = Verify Human or Spambot ?

Add A Knowledge Base Question !

You will receive an email when your question will be answered.

+ = Verify Human or Spambot ?

, , ,

Leave a Comment

Your email address will not be published. Required fields are marked *

*
*

Social media & sharing icons powered by UltimatelySocial
Back To Top

Add A Knowledge Base Question !

You will receive an email when your question will be answered.

+ = Verify Human or Spambot ?