preloader

VENDOR RELATIONSHIPS

CLIENT CASE STUDIES

DB Administration, Security and Compliance for First Distribution

DB Administration, Security and Compliance for First Distribution

First Distribution’s Database Administration, Security and Compliance needs lead it to trusted advisor, Ascent Technology. For any large organisation, Database Administration (DBA) is a vital part of maintaining their Data Platform Operations effectively. As it has...

Ascent Technology helps Bidfood SA migrate to Microsoft Azure

When Bidfood SA chose to modernise and migrate its data platform to Microsoft Azure, it turned to Ascent Technology for help. In a world that is digitally transforming, it is more vital than ever to an organisation’s success to utilise the latest platforms to drive...

Ascent Technology helps migrate Phumelela Gaming to Azure

A Windows Server and SQL Server consolidation, optimisation and migration to Microsoft Azure enables the company to reduce costs, modernise its data platform and boost its innovation capabilities. As an operator running two distinct betting businesses, Phumelela...

CAMPAIGNS

Database System Health Check Service from Ascent Technology

Database System Health Check Service from Ascent Technology

A Database System Health Check assesses if your Database is running optimally, and can help diagnose challenges before performance issues, and/or down time affect your users. That’s where Ascent's Database Health Check Service comes in. Our Database Health Check...

Database Security and Compliance with DB Shield

The growing number of threats to databases and unauthorised access to the data within, is clearly creating on-going headaches for CIOs. Solving these headaches may not be easy, but by asking the right questions, CIOs can begin to overcome their Database Security and...

Database Administration and Support Service from Ascent Technology

Economic volatility is driving a greater number of organisations to consider cost cutting measures and to implement consolidation procedures. This situation is further compounded by the growing skills shortage that makes it more difficult for businesses to acquire and...

AWARDS AND ACCOLADES

Microsoft Data and Analytics Partner of the Year Finalist

Microsoft Data and Analytics Partner of the Year Finalist

Ascent Technology continues its strong showing in the Microsoft Partner of the Year awards, as a finalist in the Data and Analytics Partner of the Year award. Finalist Data and Analytics Partner of the Year "It is always gratifying to be recognised by Microsoft as one...

NEWSFLASHES

Ascent Technology’s clients benefit from Data Platform Modernisation

Ascent Technology’s clients benefit from Data Platform Modernisation

Facing platform ‘end of life’ issues together with increasing pressures to digitise processes, increase profitability and innovate on product and service, organisations are finding Data Platform Modernisation projects can deliver significant value by enabling IT cost...

FROM THE DESK OF THE MD

From the Desk of the MD – January 2019

From the Desk of the MD – January 2019

The start of another year inevitably brings with it the promise of change, and in wishing all our clients a happy New Year, we would like to suggest that 2019 is going to be a year of considerable and exciting change. After all, not only do we have what are sure to be...

Trellix Database Security

Trellix Database Security

Trellix Database Security finds and protects sensitive information in databases from accidental leakage and intentional exposure while maintaining security, optimizing performance, and managing access.

Trellix Database Security finds, classifies, and defends sensitive information in leading database types, keeping your databases secure, patched, and protected even when patches are not an option. Easily conduct regular checks for issues with configuration and coding, as well as find performance problems. Trellix Database Security keeps your databases up-to-date and protects their sensitive information.

 

Database Activity Monitoring

Monitor, log, and control database access, in addition to identifying and blocking potential threats before they can damage the environment.

 

Vulnerability Manager

Perform automated scans to find supported databases and the sensitive data they contain. Identify and prioritize known vulnerabilities – and receive detailed remediation advice.

 

Virtual Patching

Protect databases from known and unknown vulnerabilities without downtime. Stop intrusions and other exploits before they impact your environment.

Why has Database information been getting more attention recently?

Databases contain structured data, in a standard format, that can be highly sensitive like personal identifiers, health information, and payment information. Organizations storing data for a long time and/or adding to legacy databases may not know where all sensitive data resides or be able to keep database protection up to date. In addition, regulations and privacy laws have been rapidly changing. New laws and regulations mandate the restriction of data access, reporting on potential breaches, and the status of who can access sensitive data. Security teams are expected to deliver secure databases that also comply with the latest regulatory expectations, creating the need for tools to enable them.

Why should an organisation consider a Database Security Solution?
Database Security solutions can deliver automation for activities that teams have been handling manually. Through discovery scanning, supported databases and the sensitive data they contain can be identified. Organizations can apply rights management to databases to ensure that only authorized employees have access to the information they contain. Through activity monitoring, organizations can block actions, as well as get alerts, and address potential incidents. To ensure that databases are secure and optimized, automated scanning can also detect vulnerabilities, gaps in security, misconfigurations, and other performance issues.
What are some of the biggest threats Database Security Solutions address?
Insider risk has to be considered a top threat. The rise in data breaches from attackers that target insiders especially threatens the sensitive information in databases, since attackers are seeking out these target-rich environments. Additionally, regulations and compliance are top concerns among Information Management, Technology, and Security teams who collaborate in Database Security support. Organizations are also experiencing an expanding information footprint across Database Security support. This footprint includes everything from aging databases on older servers to databases acquired through mergers, to databases that have simply gotten enormous through the addition of information over the years.
Are there solutions if some of my Databases are out of date?
One of the biggest benefits of virtual patching is that it can provide extra security to databases with both known and unknown vulnerabilities and requires no downtime. Trellix uses threat intelligence to support virtual patching, and for those teams with legacy applications, this functionality can provide extra peace of mind.