Five methods for identifying application end users associated with database activity
IBM developerWorks® Features Information Insights
John Haldeman, Guardium Software Engineer with Information Insights, was featured on IBM developerWorks®. Haldeman
writes that many organizations today have data auditing requirements that
make it mandatory to be able to identify which application end users are
executing specific database transactions. In an environment where a connection
pool is being used to enhance performance, it can be a challenge to identify
the end user. Learn five methods for solving this fundamental governance
problem using IBM® InfoSphere® Guardium®, and understand which
of these methods is most applicable for your environment.
Link to
full story.
No comments:
Post a Comment