This is a very powerful and easy to use security tool and can be easily deployed to enforce security and also comply with audit requirements. In the first case study, a user with all database privileges (DBA) can still be 'locked out' and prevented from accessing certain tables in a particular schema. In the second case study, security is enforced by ensuring that any DELETE operations on a particular table can only be possible if a user connects from a client machine having a particular IP address. Using the web UI, creating rule sets and security realms is very easy and this is a way of ensuring that all different kinds of audit and security requirements are very easily and effectively met with minimum effort.
The following two tabs change content below.