Are databases naturally secure?
So how can organizations specifically guard against intellectual property theft? We have a very specific module that alerts when people [access unusual information]. So if someone is trying to steal an entire database, or if we see that there’s a high peak in the reads or the input/output of the database, then we send a notification that hey, there’s something going on, someone is trying to read the entire database. We call that “The Big Read.” How do you monitor databases? Riley: What we can do is monitor the information access and structural integrity of databases, plus [conduct] database vulnerability assessment and monitoring. So we look at a database environment for a customer, and assess whether that environment is safe. For example, there are some inherent weaknesses in databases; we look for those, and [offer] solutions for fixing them. Our number-one goal is to provide a safe operating environment. The next step is, you monitor continuously. If a general user suddenly becomes