preloader

Table of Contents

  1. Microsoft Azure

VENDOR RELATIONSHIPS

FROM THE DESK OF THE MD

Microsoft Tiered EA/MPSA Pricing Ends – Explore the CSP Advantage

Microsoft Tiered EA/MPSA Pricing Ends – Explore the CSP Advantage

Standardised pricing replaces tiered discounts — many organisations are reviewing CSP for cost and flexibility benefits. Microsoft Tiered EA/MPSA Pricing Ends Microsoft will remove tiered discounts for Online Services under Enterprise Agreement (EA) and Microsoft...

Why Database Auditing Is No Longer Optional

In an era defined by relentless cyber threats and tightening regulatory demands, organisations can no longer afford to treat database auditing as optional. From sensitive customer records to financial data and IP, databases are prime targets - and without proper...

The Hidden Costs of Neglecting Your Database Administration

In many organisations, database administration is an afterthought - a background function that only gains attention when something breaks. But the costs of neglecting proper DBA practices are far from hidden. From performance issues and downtime to security...

CAMPAIGNS

Prepare for SQL Server 2014 End of Support

Prepare for SQL Server 2014 End of Support

On July 9, 2024, support for SQL Server 2014 ended. That means the end of regular security updates. Don't let your infrastructure and applications go unprotected. We're here to help you migrate to current versions for greater security, performance and innovation....

Prepare for SQL Server 2012 End of Support

On July 12, 2022, support for SQL Server 2012 ended. That means the end of regular security updates. Don't let your infrastructure and applications go unprotected. We're here to help you migrate to current versions for greater security, performance and innovation....

Prepare for Windows Server 2012 End of Support

On October 10, 2023, support for Windows Server 2012 and 2012 R2 ended. That means the end of regular security updates. Don't let your infrastructure and applications go unprotected. We're here to help you migrate to current versions for greater security, performance...

NEWSFLASHES

CLIENT CASE STUDIES

DB Administration, Security and Compliance for First Distribution

DB Administration, Security and Compliance for First Distribution

First Distribution’s Database Administration, Security and Compliance needs lead it to trusted advisor, Ascent Technology. For any large organisation, Database Administration (DBA) is a vital part of maintaining their Data Platform Operations effectively. As it has...

Ascent Technology helps Bidfood SA migrate to Microsoft Azure

When Bidfood SA chose to modernise and migrate its data platform to Microsoft Azure, it turned to Ascent Technology for help. In a world that is digitally transforming, it is more vital than ever to an organisation’s success to utilise the latest platforms to drive...

Ascent Technology helps migrate Phumelela Gaming to Azure

A Windows Server and SQL Server consolidation, optimisation and migration to Microsoft Azure enables the company to reduce costs, modernise its data platform and boost its innovation capabilities. As an operator running two distinct betting businesses, Phumelela...

AWARDS AND ACCOLADES

Microsoft Data and Analytics Partner of the Year Finalist

Microsoft Data and Analytics Partner of the Year Finalist

Ascent Technology continues its strong showing in the Microsoft Partner of the Year awards, as a finalist in the Data and Analytics Partner of the Year award. Finalist Data and Analytics Partner of the Year "It is always gratifying to be recognised by Microsoft as one...

Trellix Database Security

Trellix Database Security

Trellix Database Security finds and protects sensitive information in databases from accidental leakage and intentional exposure while maintaining security, optimizing performance, and managing access.

Trellix Database Security finds, classifies, and defends sensitive information in leading database types, keeping your databases secure, patched, and protected even when patches are not an option. Easily conduct regular checks for issues with configuration and coding, as well as find performance problems. Trellix Database Security keeps your databases up-to-date and protects their sensitive information.

 

Database Activity Monitoring

Monitor, log, and control database access, in addition to identifying and blocking potential threats before they can damage the environment.

 

Vulnerability Manager

Perform automated scans to find supported databases and the sensitive data they contain. Identify and prioritize known vulnerabilities – and receive detailed remediation advice.

 

Virtual Patching

Protect databases from known and unknown vulnerabilities without downtime. Stop intrusions and other exploits before they impact your environment.

Why has Database information been getting more attention recently?

Databases contain structured data, in a standard format, that can be highly sensitive like personal identifiers, health information, and payment information. Organizations storing data for a long time and/or adding to legacy databases may not know where all sensitive data resides or be able to keep database protection up to date. In addition, regulations and privacy laws have been rapidly changing. New laws and regulations mandate the restriction of data access, reporting on potential breaches, and the status of who can access sensitive data. Security teams are expected to deliver secure databases that also comply with the latest regulatory expectations, creating the need for tools to enable them.

Why should an organisation consider a Database Security Solution?
Database Security solutions can deliver automation for activities that teams have been handling manually. Through discovery scanning, supported databases and the sensitive data they contain can be identified. Organizations can apply rights management to databases to ensure that only authorized employees have access to the information they contain. Through activity monitoring, organizations can block actions, as well as get alerts, and address potential incidents. To ensure that databases are secure and optimized, automated scanning can also detect vulnerabilities, gaps in security, misconfigurations, and other performance issues.
What are some of the biggest threats Database Security Solutions address?
Insider risk has to be considered a top threat. The rise in data breaches from attackers that target insiders especially threatens the sensitive information in databases, since attackers are seeking out these target-rich environments. Additionally, regulations and compliance are top concerns among Information Management, Technology, and Security teams who collaborate in Database Security support. Organizations are also experiencing an expanding information footprint across Database Security support. This footprint includes everything from aging databases on older servers to databases acquired through mergers, to databases that have simply gotten enormous through the addition of information over the years.
Are there solutions if some of my Databases are out of date?
One of the biggest benefits of virtual patching is that it can provide extra security to databases with both known and unknown vulnerabilities and requires no downtime. Trellix uses threat intelligence to support virtual patching, and for those teams with legacy applications, this functionality can provide extra peace of mind.