Whitepaper : The Trade-off Between Database Security and Database Performance
Whitepaper
The security of any database can be improved. However, that likely degrades the performance of the database. The cost increases to improve database security while maintaining database performance. That is, the trade-off consists of three axes: Performance, security, and cost. The existence of the three trade-off axes means that security and performance can co-exist. However, it comes at the expense of increased costs (such as effort, planning, and system resources). Fundamentally, it is necessary to choose between a database that is secure and performing, a database that is secure and not costly, or a database that is performing and not costly. It is not feasible to choose a database that is secure, performing, and not costly.
This whitepaper describes how maintaining database performance involves ensuring that end-users can get to everything that they need. In contrast, improving database security focuses on controlling the access of end-users to the available resources. Database security and performance are two of the critical quality attributes used in evaluating the service being delivered by databases to the end-users. While these attributes are highly desirable for databases, end-users often see them as almost inversely related. As database security becomes more important over time, this brings its effects on database performance to the forefront. Security methods cannot overly impact end-users. At the same time, it is not possible to sacrifice security compliance due to the risk of data breaches and the requirements to meet regulatory guidelines.
Register to read the full whitepaper.
See Also:
- Whitepaper: Protecting Personally Identifiable Information in Databases
- Whitepaper: What You Need to Know About Compliance Audits
- Whitepaper: Are You Aware of These Database Risks?
- Whitepaper: How to Handle the Complexities of Regulatory Compliance
- Whitepaper: Ensuring the Security of Personally Identifiable Information (PII) within U.S. Federal Government Agencies
- Whitepaper: Top Five Items to Audit in SQL Server
- Webcast: Adopting a Compliance & Auditing Mindset
- Webcast: Database Auditing Essentials: Tracking Who Did What to Which Data When
- Webcast: Keep your Healthcare Databases Secure and Compliant
- Webcast: Handling HIPAA Compliance with Your Data Access
- Webcast: IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Premises
- Webcast: IDERA Live | Mitigating Data Risks from Cloud to Ground
- Webcast: 7 Tips and Tricks for Auditing SQL Server
- Webcast: An Introduction to Auditing & Compliance for SQL Server
- Webcast: Auditing SQL Server Using Extended Events
- Webcast: Deploying and Maintaining SQL Server Configuration Standards
- Webcast: Manage SQL Server Security Permissions and Audits
- Webcast: Performing a SQL Server Security Risk Assessment Webinar
Topics :
Database Diagnostics,Database Monitoring,
Products :
SQL Diagnostic Manager for SQL Server,SQL Secure,SQL Workload Analysis,
The security of any database can be improved. However, that likely degrades the performance of the database. The cost increases to improve database security while maintaining database performance. That is, the trade-off consists of three axes: Performance, security, and cost. The existence of the three trade-off axes means that security and performance can co-exist. However, it comes at the expense of increased costs (such as effort, planning, and system resources). Fundamentally, it is necessary to choose between a database that is secure and performing, a database that is secure and not costly, or a database that is performing and not costly. It is not feasible to choose a database that is secure, performing, and not costly.
This whitepaper describes how maintaining database performance involves ensuring that end-users can get to everything that they need. In contrast, improving database security focuses on controlling the access of end-users to the available resources. Database security and performance are two of the critical quality attributes used in evaluating the service being delivered by databases to the end-users. While these attributes are highly desirable for databases, end-users often see them as almost inversely related. As database security becomes more important over time, this brings its effects on database performance to the forefront. Security methods cannot overly impact end-users. At the same time, it is not possible to sacrifice security compliance due to the risk of data breaches and the requirements to meet regulatory guidelines.
Register to read the full whitepaper.
See Also:
- Whitepaper: Protecting Personally Identifiable Information in Databases
- Whitepaper: What You Need to Know About Compliance Audits
- Whitepaper: Are You Aware of These Database Risks?
- Whitepaper: How to Handle the Complexities of Regulatory Compliance
- Whitepaper: Ensuring the Security of Personally Identifiable Information (PII) within U.S. Federal Government Agencies
- Whitepaper: Top Five Items to Audit in SQL Server
- Webcast: Adopting a Compliance & Auditing Mindset
- Webcast: Database Auditing Essentials: Tracking Who Did What to Which Data When
- Webcast: Keep your Healthcare Databases Secure and Compliant
- Webcast: Handling HIPAA Compliance with Your Data Access
- Webcast: IDERA Live | Understanding SQL Server Compliance both in the Cloud and On Premises
- Webcast: IDERA Live | Mitigating Data Risks from Cloud to Ground
- Webcast: 7 Tips and Tricks for Auditing SQL Server
- Webcast: An Introduction to Auditing & Compliance for SQL Server
- Webcast: Auditing SQL Server Using Extended Events
- Webcast: Deploying and Maintaining SQL Server Configuration Standards
- Webcast: Manage SQL Server Security Permissions and Audits
- Webcast: Performing a SQL Server Security Risk Assessment Webinar
Topics : Database Diagnostics,Database Monitoring,
Products : SQL Diagnostic Manager for SQL Server,SQL Secure,SQL Workload Analysis,