{"id":1536,"date":"2007-05-07T00:00:00","date_gmt":"2007-05-07T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/05\/07\/oracle-makes-bid-to-streamline-data-auditing\/"},"modified":"2021-12-30T11:39:33","modified_gmt":"2021-12-30T11:39:33","slug":"oracle-makes-bid-to-streamline-data-auditing","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2007\/05\/07\/oracle-makes-bid-to-streamline-data-auditing\/","title":{"rendered":"Oracle Makes Bid to Streamline Data Auditing"},"content":{"rendered":"<p>Oracle has released an audit management tool company officials say will help address both regulatory compliance issues and the so-called insider threat facing enterprises.  Organizations can use Oracle Audit Vault to centrally manage their database auditing configuration and deploy uniform audit policies, said Vipin Samar, vice president of database security at Oracle.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;It&#8217;s really about knowing what&#8217;s happening inside those databases, who&#8217;s doing what,&#8221; Vipin Samar, vice president of database security at Oracle said in an interview with eWEEK.  Oracle officials also stated Audit Vault can help cut the cost of compliance by making it easier for auditors and security personnel to manage and report on audit data, officials added.  &#8220;I think database auditing and monitoring helps to demonstrate to auditors and regulators that controls are in place&#8230;and provide evidence of the effectiveness of those controls,&#8221; said Trent Henry, an analyst with the Midvale, Utah-based Burton Group, in an interview.<\/p>\n<p>That&#8217;s what a monitoring tool like this does, so it&#8217;s highly complementary (to Oracle&#8217;s other database products).&#8221;<\/p>\n<p>http:\/\/www.eweek.com\/article2\/0,1759,2126725,00.asp?kc=EWRSS03119TX1K0000594<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1536","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1536"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1536\/revisions"}],"predecessor-version":[{"id":4023,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1536\/revisions\/4023"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1536"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}