'Who Did What to Which Data When?' Whitepaper Download

CorreLog_Database-Access-Auditing-Wp-icon.jpgBy Craig S. Mullins, Industry Consultant for IBM®DB2®, and author of "DB2 Developer's Guide"

Recently, Craig S. Mullins gave a webinar, sponsored by CorreLog, Inc., titled "Who Did What to Which Data When?" As an accompanying handout to attendees, Craig provided a whitepaper of the same title and subject matter. You can download this whitepaper here. 

Why is this of importance for mainframe security?

In this informative and educational whitepaper you will learn about:

  • Three highly effective auditing techniques
  • Data management/governance
  • Breach issues and dealing with data protection
  • What data needs to be audited and auditing methods

How do you get this white paper?

  1. Provide your information in the form to the right. Asterisk(*) indicates required field.
  2. After completing the form, the download link will be revealed to you. 
  3. Click link or copy link into browser and you can read, print, or download the PDF.

Or if you prefer to contact us directly for the PDF file, please click here.

Craig S. Mullins' Whitepaper Download