Advisor

Database Threat Protection Solutions

Posted May 4, 2016 | | Amplify

In my research pertaining to trends and developments influencing the market for, and the application of, data-centric security and protection that organizations will want to keep abreast of in 2016-2107, I have explored database threat protection solutions. These facilitate the discovery of all databases in the network (including those undocumented) and continuous monitoring of databases to identify malicious activity. New products employing machine learning (ML) and behavioral analysis to protect databases and facilitate real-time identification of compromised database credentials are available.

About The Author
Curt Hall
Curt Hall is a Cutter Expert and a member of Arthur D. Little’s AMP open consulting network. He has extensive experience as an IT analyst covering technology and application development trends, markets, software, and services. Mr. Hall's expertise includes artificial intelligence (AI), machine learning (ML), intelligent process automation (IPA), natural language processing (NLP) and conversational computing, blockchain for business, and customer… Read More
Don’t have a login? Make one! It’s free and gives you access to all Cutter research.