S. W.
October 2007
Red Herring;10/7/2007, Vol. 4 Issue 29, p62
Trade Publication
The article features the security/defense company IPLocks of San Jose, California. Its chief executive officer (CEO) is Nobuya Nobby Yoshida. In an age where keeping company data under lock and key is more vital than ever, IPLocks aims to help companies stay secure, as well as easily and economically demonstrate compliance. Its rivals are companies like Guardium and Tizor. To differentiate itself, IPLocks monitors access to a given database, rather than the network, and while database vendors also offer such a service, IPLocks provides a method of creating an independent audit trail.


Related Articles

  • IPLOCKS VER. 4.1 DATABASE SECURITY MANAGEMENT SYSTEM UNVEILED.  // Worldwide Databases;Oct2004, Vol. 16 Issue 10, pN.PAG 

    The article provides information on the database security management system introduced by IPLocks Inc. in October 2004. IPLocks, an innovative provider of database vulnerability assessment, continuous risk monitoring and non-repudiation audit analysis systems, has unveiled IPLocks version 4.1. ...

  • AUDIT ANALYSIS FEATURE REDUCES IT THEFT.  // Online Product News;Nov2004, pN.PAG 

    This article reports on the decision of IPLocks, an innovative provider of database vulnerability assessment, continuous risk monitoring and non-repudiation audit analysis systems, to unveil IPLocks version 4.1. IPLocks 4.1 expands the functionality of its external, non-intrusive,...

  • Ten Questions with Aiko Sakamoto, President, CEO and Co-Founder of IPLocks.  // Database Trends & Applications;Nov2006, Vol. 20 Issue 11, p22 

    The article presents an interview with Akio Sakamoto, president, CEOP and co-founder of IPLocks. When asked about the major approaches to database security, he refers to the new arrivals of the database security market including forensic auditing, assessment of the security configuration and...

  • New Products Worthy of Your Attention.  // Database Trends & Applications;Nov2006, Vol. 20 Issue 11, p7 

    The article evaluates several database software including Clarity 3.2 database automation software by GridApp Systems, Advantage Database Server 8.1 by Sybase iAnywhere and Database Security and Compliance Solution Version 6.0 by IPLocks.

  • Third parties pick up database security slack. Fonseca, Brian // eWeek;9/13/2004, Vol. 21 Issue 37, p17 

    The article focuses on the lack of database security support from primary database suppliers. Some IT organizations, frustrated by a lack of database security support from their primary database suppliers, are turning to smaller, third-party developers for new internal auditing and monitoring...

  • IPLocks reinforces security tool. Messmer, Ellen // Network World;11/8/2004, Vol. 21 Issue 45, p21 

    This article reports that database-security software vendor IPLocks has announced a new version of its database monitoring, assessment and analysis tool. The IPLocks software, which runs on a 32-bit Linux or Windows server inside the network to check each corporate database, now supports IBM's...

  • NEW PRODUCT DATABASE.  // Database Trends & Applications;Mar2004, Vol. 18 Issue 3, p6 

    Introduces several new product database. Sybase pocket powerbuilder from Sybase Inc.; MyExttra! Smart Connector Mainframe Edition v4.0.2 from Attachmate Corp.; IPLocks Database Security Audit System from IPLocks.

  • Visualisation of Massive Military Datasets.  // Military Technology;2008, Vol. 32 Issue 5, p82 

    The article explores on the nature of visualisation in military operations, the tasks for which it is appropriate, as well as on the processes in the computer and in the humans that support it. It mentions the effectiveness of computers in human lives and activities particularly in military and...

  • New Vulnerabilities, Attacks Exposed.  // Certification Magazine;Jul2006, Vol. 8 Issue 7, p8 

    The article reports on a list of the top Internet security vulnerabilities released by the SANS Institute in the U.S. One discovery is a spike in attacks on database technologies such as access systems, warehouses and back-up. A trend observed was the rise of spear-phishing which is aimed at...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics