To enhance our website and services, we use Google Analytics, which requires your consent below to gather data about your device and site usage. Your data may be transferred outside the EU by Google, where regulations may differ. Consent is voluntary and revocable by contacting us.
Essential cookies are strictly necessary for site operation. For details on cookie usage as well as how we process your data, please read our policy.
Databases are often overlooked when it comes to security, providing a weak link to the wannabe attacker. A Database Administrator (DBA) may not have security at the forefront of their minds as they go about their business, in fact they often introduce vulnerabilities from inappropriate roles within roles or privilege runaway. These products are designed to identify vulnerabilities and inappropriate configuration within databases giving providing both the DBA and Security Officer peace of mind about the security of their database.