The Database Protection Series- Vulnerability Assessments

This is the fourth article of a series that focuses on database security.  In my introduction, I provide an overview of the database protection process and what is to be discussed in future installments.   In last month’s article, we finished our discussion of the most common threats and vulnerabilities.  In this latest installment, we’ll review the database vulnerability assessment process.  We’ll begin by learning how to perform an initial database vulnerability (more...)

The Database Protection Series– Common Threats and Vulnerabilities Part 2

This is the third article of a series that focuses on database security.  In my introduction, I provide an overview of the database protection process and what is to be discussed in future installments.   In last month’s article, we began with a review of the various database vulnerabilities and threat vectors we need to address.    In this article we’ll finish our discussion of the most common threats and vulnerabilities.    In the (more...)

Evaluating the Most Common Database Threats and Vulnerabilities- Part 1

This is the second article of a series that focuses on securing your database data stores.  In the introduction, I provide an overview of the database protection process and what is to be discussed in future installments.   Before we begin the activities required to secure our databases, we need to have a firm understanding of the most common database vulnerabilities and threats.

This two-part article is not intended to be an all-inclusive listing (more...)

Securing Sensitive Database Data Stores

Introduction

Database administrators, since the inception of their job descriptions, have been responsible for the protection of their organization’s most sensitive database assets. They are tasked with ensuring that key data stores are safeguarded against any type of unauthorized data access.

Since I’ve been a database tech for 25 years now, this series of articles will focus on the database system and some of the actions we can take to secure database data. We won’t (more...)

Data Warehouse Appliance Offerings

Introduction

Information Technology units will continue to be challenged by the unbridled growth of their organization’s data stores. An ever-increasing amount of data needs to be extracted, cleansed, analyzed and presented to the end user community. Data volumes that were unheard of a year ago are now commonplace. Day-to-day operational systems are now storing such large amounts of data that they rival data warehouses in disk storage and administrative complexity. New trends, products, and strategies, (more...)

RDX’s IT Process Automation Strategy

RDX’s IT Process Automation Strategy

Remote DBA Experts (RDX) is the largest pure-play provider of remote data infrastructure services. We have been providing remote services for over 20 years, which also makes us one of the pioneers in this space. We currently support hundreds of customers and thousands of database implementations.

RDX competes in an extremely competitive market arena. Our competitors range from “2 guys in a garage” to major outsourcing providers like IBM and (more...)

The Importance of Documentation

As a remote data infrastructure services provider, documenting the activities we perform, as well as our customers’ environments, is critical to our success. RDX currently supports thousands (and thousands) of database ecosystems ranging in complexity from simple to “making your hair stand on end.”

My customers hold my organization to extremely high standards. Rightfully so, they have turned over the keys to their most sensitive and mission-critical data stores to RDX. At the end (more...)

Leveraging Collective Knowledge and Subject Matter Experts to Improve the Quality of Database Support

The database engine plays a strategic role in the majority of organizations. It provides the mechanism to store physical data along with business rules and executable business logic. The database’s area of influence has expanded to a point where it has become the heart of the modern IT infrastructure. Because of its importance, enterprises expect their databases to be reliable, secure and available.

Rapid advances in database technology combined with relatively high database licensing and (more...)

Database Security Best Practices

Database administrators, by the very essence of their job descriptions, are the protectors of their organization’s core data assets. They are tasked with ensuring that key data stores are safeguarded against any type of unauthorized data access. Ensuring that data is protected on a 24 x 7 basis is a complex task. External intrusions and internal employee data thefts combine to make many IT professionals lie awake at night thinking about how they can secure (more...)

Root Cause Corrective Action Reports

Computer architectures are complex by nature. Actually, stating they are complex is like describing the Titanic as having suffered from “a small leak”. If they weren’t, many of us wouldn’t be in this profession. Our services wouldn’t be needed. However, as we all know, computer architectures are not becoming ”administrator free”  or “self healing” as many industry pundits would have us believe. Instead, they are continuing to increase in complexity.

Computer systems are also inherently dynamic. (more...)