Threats to a database can come from any direction and in any form, whether Human error, Natural Disasters, Hardware failures or even simple misunderstandings. Risk mitigation needs to cover all possible threats, including information theft, by either preventing it or having a reaction plan in place if it occurs thereby restricting the loss. Living in the Information Age means the very survival of a business is dependant on the information they have and the availability of that information.
RDB will asses your database environment and implement procedures and practices that will mitigate virtually any database risk. RDB makes use of its own in-house developed procedures as well as features built into the database software such as Flashback Technology, Log Mining, RAC, Logical and Physical DataGuard, Auditing as well as foolproof backup and recovery strategies.
- Backup and Recovery strategies.
- RAC design and implementation.
- DR thought DataGuard implementation and automation for both physical and logical standby databases.
- HA database design and set-up.
- Vendor HA product consulting in partnership with vendor.
- Database Resource Manager set-up, implementation.
- User SLA configuring and implementation.
- User security management (passwords, roles, profile).
- Database security management.
- UNIX security consulting.
- Fine grained access control.
- DDL triggers for auditing and reporting.
- SYS or DBA auditing and reporting.
- Flashback recovery and query protection procedures.
- Log Miner protection procedures.
- Change control procedures
- Test/UAT environment management – a true reflection of production
- Test/UAT security
- Archiving strategies
- Performance Tuning
So true are the old adages “An ounce of prevention is worth a pound of cure” and “Prevention is better than cure”