Security threats exist against your data warehouse (DW), whether it is accessible through the Internet or buried deep within your internal network and available only to authorized users. The increasing prevalence of Web-enabled applications accessing the DW compounds this threat by spanning the enterprise infrastructure and the Internet. Vendors supplying applications for DW environments are being pressured by users to quickly provide more functionality and performance to the marketplace, outpacing the competition while sacrificing security. Do you really think your DW implementation is still secure?
This is the first of a three-part series on security vulnerabilities in the DW environment. This installment discusses the origination of security risks, and subsequent columns will examine actual exploit types and measures that can be applied to increase the security and minimize your risk of exposure.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access