This is a very powerful and easy to use security tool and can be easily deployed to enforce
security and also comply with audit requirements.
In the first case study, a user with all database privileges (DBA) can still be 'locked out' and
prevented from accessing certain tables in a particular schema.
In the second case study, security is enforced by ensuring that any DELETE operations on a
particular table can only be possible if a user connects from a client machine having a particular
IP address.
Using the web UI, creating rule sets and security realms is very easy and this is a way of ensuring
that all different kinds of audit and security requirements are very easily and effectively met with
minimum effort.
Download …;
0 Comments