In recent years, there has been an increase in the frequency of unauthorized access and/or disclosure of sensitive, confidential or otherwise protected data. Large and well known organizations have seen massive data breaches that have not only resulted in hefty fines and penalties, but has also negatively impacted their reputation. Many of these breaches could have been avoided. With MySQL Enterprise, we provide the tools needed to strengthen your data environment. From SQL injection to hardware theft, we can keep you protected.
Due to security restrictions, many DBAs have no access to the Operating System. That's a good thing. MySQL 8.0 added many new features and capabilities for running checks and improve hardening security via a MySQL connection. No SSH required. In this webinar, we will show you what you need to check along with SQL statements for doing it. And if a check fails, how to fix and further secure your MySQL environment.