• Jul 6, 2010 from 11:00am to 12:00pm
  • Location: On Demand
  • Latest Activity: Sep 2, 2021
Broadcast date: July 6, 2010, 11 a.m., Eastern Daylight Time, 3:00 p.m. GMT Developed for: IT managers, application architects, database administrators, system administrators, system programmers and system architects Business, regulatory and customer privacy continue to require tighter controls over access to your critical data. If data administrators could establish security policies or security logic on tables with restricted data, they could enforce security controls on all applications and tools that access the restricted data. And, if they could do that without changing existing applications, the savings in resources alone would be considerable. Join us for this complimentary teleconference and learn how new controls and features in the planned expansion of DB2® 10 for z/OS® Beta data-centric security make this possible. Businesses can comply with new regulations without changes to existing applications since security logic is separated from application logic. As security policies change, they will also be easier to deploy since the security logic can be automatically deployed against all SQL access to the data. In this session, we’ll discuss how the new features in DB2 10 for z/OS Beta can: Prevent the use of SQL to bypass views, application security logic or prevent the use of SQL Injection to attack a DB2 Protect sensitive data from privileged administrators — even with SYSADM or SYSCTRL authority – by using configurable authorities Define authorities with more granularity to meet your security policies, such as an administrator who can manage tables but has no access to data Enforce separation of duties by requiring more than one privileged person in order to access restricted data Learn about all the new security and auditing capabilities planned for DB2 10 for z/OS Beta. Speaker: Jim Pickel, Senior Technical Staff, IBM Software Group Register Now
Votes: 0
E-mail me when people leave their comments –

You need to be a member of World Of Db2 to add comments!

Join World Of Db2

Comments

  • We are in the process of analyzing what it are the gaps to convert from native DB2 Security to RACF for DB2.
This reply was deleted.