'Who Did What to Which Data When?' Whitepaper Download

CorreLog_Database-Access-Auditing-Wp-icon.jpgBy Craig S. Mullins, Industry Consultant for IBM®DB2®, and author of "DB2 Developer's Guide"

Craig S. Mullins gave a webinar, sponsored by CorreLog, Inc., titled "Who Did What to Which Data When?" As an accompanying handout to attendees, Craig provided a whitepaper of the same title and subject matter. You can download this whitepaper here. 

Why is this of importance for DB2 security?

In this informative and educational whitepaper you will learn about:

  • Three highly effective auditing techniques
  • Data management/governance
  • Breach issues and dealing with data protection
  • What data needs to be audited and auditing methods

How do you get this white paper?

  1. Provide your information in the form to the right. Asterisk(*) indicates required field.
  2. After completing the form, the download link will be revealed to you. 
  3. Click link or copy link into browser and you can read, print, or download the PDF.

Or if you prefer to contact us directly for the PDF file, please click here.

For more information on CorreLog's security solutions for DB2, click here

Craig S. Mullins' Whitepaper Download