■ Detect sensitive data and identify policy violations ■ Detect loss of data through authorized channels ■ Correlate database activity to security events ■ Produce an audit trail of all database activity
■ Detect sensitive data and identify policy violations■ Detect loss of data through authorized channels■ Correlate database activity to security events■ Produce an audit trail of all database activity