Categories: Articles

4 must-have database security essentials

used with permission from IBM Big Data & Analytics Hub
by Roger Sanders

How do you keep data protected at all times? Data security threats are becoming ever more prevalent and powerful, and security is a critical part of any database environment. But are you giving security diligent attention every time you build, upgrade or migrate your organization’s database? To help ensure your data is insulated from the latest internal and external threats, here are my top four must-have security capabilities.

1. Cloud security

Many organizations are deploying databases in the cloud, either entirely or as part of a hybrid environment, to help reduce capital IT expenditures and conserve on-premises data center resources. If cloud computing is in your plans—or already in use at your organization—be sure your cloud database offers data protection that’s as strong as its on-premises equivalent. Your on-premises database instances should also be able to replicate data to the cloud, which can be your fail-safe in the event of a primary data center disaster. Consider a managed cloud solution from a reputable provider as a way to help ensure your data is just as safe or safer on the cloud as it is within your own data center.

2. Built-in encryption

By encrypting data, you have a way to keep sensitive information secure even if it is lost or stolen because only authorized users can access the data in an intelligible form. Look for encryption that is built into the database and that doesn’t require the purchase of an add-on encryption solution. All data should be encrypted automatically by the database and decrypted only when an authorized user is working with it.

Encryption is mandatory for compliance with many government regulations and industry standards, ranging from the Health Insurance Portability and Accountability Act (HIPAA) to the Payment Card Industry Data Security Standard (PCI DSS). Your database should not only protect data at rest, but it should also provide Secure Sockets Layer (SSL) capabilities to protect data as it moves through the network.

3. Central master key management

Unscrambling encrypted data so your organization can use it often requires a master encryption key. Many database solutions keep this master key on the same server as the database. But your database backup server and application servers may also need to use the key—and having copies of a master key on multiple servers creates more exposure to risk. To avoid this problem, look for a database that can take advantage of centralized master key management. Managing encryption keys in a central repository protects the keys while facilitating safe access and use by your organization’s servers.

4. Hardware encryption acceleration

Whether you’re running servers with x86 or IBM POWER processors, you’ll want to take advantage of the processor technology to boost database performance whenever encryption is used. Intel processors and IBM POWER8 processors offer hardware acceleration that can speed up data encryption and decryption, and ultimately accelerate application performance. You’ll want to make sure your database software can automatically take advantage of any acceleration technology built into the CPUs of the servers you use.

IBM DB2 databases meet all these requirements and more with new and updated database security features.

Bryan Antepara: IT Specialist

Bryan Antepara is a leader in Cloud engagements with a demonstrated history of digital transformation of business processes with the user of Microsoft Technologies powered by the team of eMazzanti Technologies engineers.

Bryan has a strong experience working with Office 365 cloud solutions, Business Process, Internet Information Services (IIS), Microsoft Office Suite, Exchange Online, SharePoint Online, and Customer Service.

He has the ability to handle the complexity of moving data in and out of containers and cloud sessions, makes him the perfect candidate to help organizations large and small migrate to new and more efficient platforms.  Bryan is a graduate of the University of South Florida and is Microsoft Certification holder.

Recent Posts

Innovations in Microsoft 365 Support the Modern Workplace and Drive Productivity

The office worker of even 20 years ago could scarcely envision today’s dynamic and interconnected…

7 days ago

Harnessing AI: Beyond Self-Driving Cars

Artificial Intelligence (AI) has taken center stage, captivating attention primarily through its role in self-driving…

7 days ago

Unleash Your Creativity with Microsoft’s Copilot Image Creator

The ability to generate compelling, original images using AI is changing the way we think…

2 weeks ago

How to Choose the Right Microsoft Dynamics 365 Sales Partner and Why It Matters

With Microsoft Dynamics 365 Sales, businesses gain a powerful tool for nurturing leads, leveraging AI-based…

3 weeks ago

eMazzanti Technologies Ranked Among World’s Top Managed Service Providers

Annual Channel Futures MSP 501 global ranking identifies industry’s best-in-class businesses on Tech Industry’s most…

4 weeks ago

Are Vendors The Weak Spot In Your Cyber Defenses?

  Carl Mazzanti is the president of eMazzanti Technologies in Hoboken. You engage with vendors…

4 weeks ago