Broadcast date: July 6, 2010, 11 a.m., Eastern Daylight Time, 3:00 p.m. GMTDeveloped for: IT managers, application architects, database administrators, system administrators, system programmers and system architects
Business, regulatory and customer privacy continue to require tighter controls over access to your critical data. If data administrators could establish security policies or security logic on tables with restricted data, they could enforce security controls on all applications and tools that access the restricted data. And, if they could do that without changing existing applications, the savings in resources alone would be considerable.
Join us for this complimentary teleconference and learn how new controls and features in the planned expansion of DB2® 10 for z/OS® Beta data-centric security make this possible. Businesses can comply with new regulations without changes to existing applications since security logic is separated from application logic. As security policies change, they will also be easier to deploy since the security logic can be automatically deployed against all SQL access to the data.
In this session, we’ll discuss how the new features in DB2 10 for z/OS Beta can:
Prevent the use of SQL to bypass views, application security logic or prevent the use of SQL Injection to attack a DB2
Protect sensitive data from privileged administrators — even with SYSADM or SYSCTRL authority – by using configurable authorities
Define authorities with more granularity to meet your security policies, such as an administrator who can manage tables but has no access to data
Enforce separation of duties by requiring more than one privileged person in order to access restricted data
Learn about all the new security and auditing capabilities planned for DB2 10 for z/OS Beta.
Speaker: Jim Pickel, Senior Technical Staff, IBM Software GroupRegister Now
Comments