Advertisement

Quest Announces New Toad for Oracle – Sensitive Data Protection Solution

By on

A recent press release states, “Quest Software, a global systems management, data protection and security software provider, today announced the general availability of Toad® for Oracle – Sensitive Data Protection (SDP) Module. This new add-on module empowers Database Administrators (DBAs) to play a key role in maintaining compliance regulations across the business. With Toad for Oracle SDP, DBAs can quickly and reliably identify and protect sensitive data across the database infrastructure to help their organization mitigate against the risk of non-compliance with data regulations. Toad for Oracle enables DBAs to detect and receive notification of Personally Identifiable Information (PII) data residing in databases, select encryption and redaction options immediately after detection, and perform ongoing monitoring to proactively manage databases. With greater visibility and insight into where sensitive data resides, DBAs can maintain stronger security and have greater confidence in meeting compliance regulations and standards.”

The release goes on, “With the European Union’s General Data Protection Regulation (GDPR) now in effect, organizations are taking a closer look at available database management options as they implement regulation strategies to ensure that data stored meets regulation requirements and doesn’t pose a threat to business. The consequence of non-compliance, whether for GDPR or long-standing regulations such as the Health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI DSS), carry severe financial penalties as well as reputational damage. With these tightening data standards, DBAs are under increased pressure to meet compliance requirements and are on the front lines of securing sensitive data. Toad for Oracle SDP takes an automated approach to help DBAs mitigate the risk of non-compliance, identify where personal data resides across Oracle databases, and apply the appropriate protection techniques.”

Read more at Newswire Today.

Image used under license from Shutterstock.com

Leave a Reply