RDX’s IT Process Automation Strategy
Remote DBA Experts (RDX) is the largest pure-play provider of remote data infrastructure services. We have been providing remote services for over 20 years, which also makes us one of the pioneers in this space. We currently support hundreds of customers and thousands of database implementations.
RDX competes in an extremely competitive market arena. Our competitors range from “2 guys in a garage” to major outsourcing providers like IBM and (more...)
One of the key measurements DBAs can use to evaluate their team’s performance is analyzing customer feedback. At RDX, we have established a customer feedback engine that consists of multiple communication contact points and delivery mechanisms to ensure that we receive a constant flow of service quality information. We elicit feedback from all personnel that we support including customer management, DBAs, developers and end-users.
Since we support many different organizations in virtually every market (more...)
Let’s conclude this series of articles on database security by reviewing what we learned in previous installments. Along the way, I’ll provide some additional hints and tips to tie everything together.
We learned that database administrators, since the inception of their job descriptions, have been responsible for the protection of their organization’s most sensitive database assets. This envious responsibility will not change. As DBAs, we will be forever tasked with ensuring that our critical (more...)
In this installment, we’ll focus on database and server hardening as well as database security best practices. Instead of offering you my personal recommendations, I’ll provide you with recommended websites that offer an abundance of information on database security best practices. You must be very careful when you select an author or website to assist you in your goal of securing your organization’s sensitive database data stores. I think that after reviewing this article, you’ll (more...)
In this installment, we’ll talk about the benefits that real time database activity monitoring products provide. We’ll also learn how these types of products work. You will notice that I often refer to the McAfee database security protection product set when I describe some of the activities that RDX performs as part of our database security offering.
If you are truly serious about protecting your database data, you’ll quickly find that partnering with a (more...)
This is the fourth article of a series that focuses on database security. In my introduction, I provide an overview of the database protection process and what is to be discussed in future installments. In last month’s article, we finished our discussion of the most common threats and vulnerabilities. In this latest installment, we’ll review the database vulnerability assessment process. We’ll begin by learning how to perform an initial database vulnerability (more...)
This is the third article of a series that focuses on database security. In my introduction, I provide an overview of the database protection process and what is to be discussed in future installments. In last month’s article, we began with a review of the various database vulnerabilities and threat vectors we need to address. In this article we’ll finish our discussion of the most common threats and vulnerabilities. In the (more...)
This is the second article of a series that focuses on securing your database data stores. In the introduction, I provide an overview of the database protection process and what is to be discussed in future installments. Before we begin the activities required to secure our databases, we need to have a firm understanding of the most common database vulnerabilities and threats.
This two-part article is not intended to be an all-inclusive listing (more...)
Database administrators, since the inception of their job descriptions, have been responsible for the protection of their organization’s most sensitive database assets. They are tasked with ensuring that key data stores are safeguarded against any type of unauthorized data access.
Since I’ve been a database tech for 25 years now, this series of articles will focus on the database system and some of the actions we can take to secure database data. We won’t (more...)
Information Technology units will continue to be challenged by the unbridled growth of their organization’s data stores. An ever-increasing amount of data needs to be extracted, cleansed, analyzed and presented to the end user community. Data volumes that were unheard of a year ago are now commonplace. Day-to-day operational systems are now storing such large amounts of data that they rival data warehouses in disk storage and administrative complexity. New trends, products, and strategies, (more...)