Support for your product in a single location.
New releases, updates and patches.
Maximize your investmentFind out how we can help
Our leaders' commentary on news inthe software industry. Read now
Where do you want to be?Search jobs
This webcast was originally presented on Thursday, November 3Duration: 1 hour
The best way to protect SQL Server is to understand how it can be attacked and build your defenses accordingly. Tune in and learn the typical methodology attackers use to discover and then compromise SQL Server.
We'll examine what’s available to attackers – both internally and externally, to the regular user and the rogue administrator. Then we’ll discuss the defenses we can raise to make their assaults more difficult and likely to be caught.
We won't just focus on SQL Server, but we'll also concentrate on OS and network security, as well as the importance of "physical" security, whether we're talking actual hardware or virtual machines.
©2013 Dell Inc. ALL RIGHTS RESERVED. Acquisitions - Enstratius, RemoteScan