Interview with Scott C. Nevins, President and CEO of Protegrity
by Mirko Zorz - Wednesday, 22 January 2003.
The product needs to:
  • protect and audit sensitive information stored on all the major relational databases (IBM, Sybase, Oracle and Microsoft).
  • an "out-of-the-box" application transparent solution that can be implemented in days, not months. The real cost is not simply the cost of the product, it is the total cost of the implementation.
  • strong role-based access control to facilitate granular access control to sensitive data that allows for sharing of information with business partners, customers, and other internal and external users, without the risk of breach of critical information assets.
  • centralized application of privacy rules.
  • secure audit trail.
There's been a lot of discussion on the topic of internal threats in 2002. Do you see the disgruntled employee or the outside attacker as the bigger threat?

Both are enormous threats to a company. The vast majority of the larger security breaches have occurred as a result of internal personnel however both are threats that can and need to be stopped at the source of the breach - the database.

What are your plans for the future?

On the business side, Protegrity's relationships with IBM, Sybase, Oracle, Microsoft, nCipher, RSA and other strategic partners will continue to expand. Protegrity offers the strongest and most comprehensive database security solution.

We will continue to expand our relationships with key enterprise software applications such as PeopleSoft, SAP and others.

Our product will continue to move forward addressing the new security risks. Protegrity's platform will be expanded to incorporate wireless initiatives and other types of information.

Protegrity will stay focused on ensuring that it remains at the top of the most central part of data and information security - at the source "data at rest" where data is most vulnerable.

Spotlight

The security threat of unsanctioned file sharing

Posted on 31 October 2014.  |  Organisational leadership is failing to respond to the escalating risk of ungoverned file sharing practices among their employees, and employees routinely breach IT policies.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Oct 31st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //