Interview with Scott C. Nevins, President and CEO of Protegrity
by Mirko Zorz - Wednesday, 22 January 2003.
The product needs to:
  • protect and audit sensitive information stored on all the major relational databases (IBM, Sybase, Oracle and Microsoft).
  • an "out-of-the-box" application transparent solution that can be implemented in days, not months. The real cost is not simply the cost of the product, it is the total cost of the implementation.
  • strong role-based access control to facilitate granular access control to sensitive data that allows for sharing of information with business partners, customers, and other internal and external users, without the risk of breach of critical information assets.
  • centralized application of privacy rules.
  • secure audit trail.
There's been a lot of discussion on the topic of internal threats in 2002. Do you see the disgruntled employee or the outside attacker as the bigger threat?

Both are enormous threats to a company. The vast majority of the larger security breaches have occurred as a result of internal personnel however both are threats that can and need to be stopped at the source of the breach - the database.

What are your plans for the future?

On the business side, Protegrity's relationships with IBM, Sybase, Oracle, Microsoft, nCipher, RSA and other strategic partners will continue to expand. Protegrity offers the strongest and most comprehensive database security solution.

We will continue to expand our relationships with key enterprise software applications such as PeopleSoft, SAP and others.

Our product will continue to move forward addressing the new security risks. Protegrity's platform will be expanded to incorporate wireless initiatives and other types of information.

Protegrity will stay focused on ensuring that it remains at the top of the most central part of data and information security - at the source "data at rest" where data is most vulnerable.

Spotlight

Hackers indicted for stealing Apache helicopter training software

Posted on 1 October 2014.  |  Members of a computer hacking ring have been charged with breaking into computer networks of prominent technology companies and the US Army and stealing more than $100 million in intellectual property and other proprietary data.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Wed, Oct 1st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //