Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:20 AM
Adrian Lane
Adrian Lane

What DAM Does

Database activity monitoring (DAM) tools have a range of capabilities, including data collection and analysis. But the real question is: How does this technology help you?

Database activity monitoring (DAM) tools have a range of capabilities, including data collection and analysis. But the real question is: How does this technology help you?No one is looking for a generic tool; rather, they are looking for a cost-effective solution for some business problem. And in this economy, it had better save time and money as well. So how do you apply database activity monitoring to solve business problems? There are three common use cases:

Security: The collection of all SQL activity inside and outside the database offers a unique form of event correlation that, when coupled with real time analysis, provides extraordinary security event notification. Failed logins, administrative activity, SQL injection detection, blocking unwanted statements, alteration of user privileges, and use of stored procedures are common security features built into DAM platforms. Access control systems, SIEM, and WAF technologies can offer many of these features, but not all at once -- and not from a single product.

Database Operations: Changes to database applications are complex, often comprised of hundreds of individual steps, with the ultimate result not evident from any single action. These include changes to platform function, to database structure, installation of patches, backup and recovery detection, change order verification, resource allocation issues, business process failures and in some cases, database and vulnerability detection. Transactional analysis of these common database administrative tasks are built into database monitoring and auditing tools, and can feed the results into other management applications.

Compliance: It's beyond the skill of most auditors to find information within a database, but separation of duties demands information collection and policy analysis be independent of DBA's and IT administrators. Change order verification, audit trail production, user permissions changes, and control validation are typical requirements. Collection of database audit and access trails provides control verification. Sarbanes-Oxley and other financial regulations require a complete and accurate picture of transactions, while PCI compliance mandates data usage reports on credit card related data. These are native capabilities to DAM, providing a neutral platform for policy deployment, analysis, and reporting. Solving database security problems was the genesis of the DAM market, but compliance is what drives adoption of the technology today. While there is some overlap with other security and management platforms, DAM offers features and functions found nowhere else.

Most vendors pre-package thousands of compliance and security polices, both saving time in the development of these rules and providing database analysis capabilities to non-database experts.

While compliance is the driver, business justification for DAM products comes from the sum of these capabilities to automates security, compliance, and operational management tasks, and the flexibility to adapt to many environments.

Adrian Lane is an analyst/CTO with Securosis LLC, an independent security consulting practice. Special to Dark Reading. Adrian Lane is a Security Strategist and brings over 25 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and secure software development. With experience at Ingres, Oracle, and ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/22/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Is Zero Trust the Best Answer to the COVID-19 Lockdown?
Dan Blum, Cybersecurity & Risk Management Strategist,  5/20/2020
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-05-25
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There are CSRF issues with the log-clear controller action.
PUBLISHED: 2020-05-25
An issue was discovered in the Image Resizer plugin before 2.0.9 for Craft CMS. There is stored XSS in the Bulk Resize action.
PUBLISHED: 2020-05-25
A Remote code execution vulnerability exists in DEXT5Upload in DEXT5 through 2.7.1402870. An attacker can upload a PHP file via dext5handler.jsp handler because the uploaded file is stored under dext5uploadeddata/.
PUBLISHED: 2020-05-25
Cybozu Desktop for Windows 2.0.23 to 2.2.40 allows remote code execution via unspecified vectors.
PUBLISHED: 2020-05-24
ffjpeg through 2020-02-24 has an invalid read in jfif_encode in jfif.c.