Resource Library

Browse our IT and security resources to find information on topics around managed security, security news, and more.


Access Granted or Denied: Framework for Effective User Rights Management

Misused privileges can pose a major risk to database security, which is why organizations must properly identify and manage users, roles and privileges. The best way to establish meaningful controls that track users - or to capture an audit trail for a breach investigation - is to know who has access to what and why/how they have been granted that access. Watch part two of our three-part webinar series on database security to learn more about the important concepts involved with user rights management for your databases, including:

  • Audit all user accounts and identify those that may be excessively privileged.
  • Review how privileges are created.
  • Establish risk mitigation and compensating controls.