数据库审计系统技术白皮书目录1前言..........................................................................................................................................12数据库审计的重要性...............................................................................................................22.1满足合规性要求.......................................................................................................22.2降低安全性风险.......................................................................................................42.2.1数据完整性安全...............................................................................................42.2.2内部人员权限滥用...........................................................................................52.2.3授权人员的非法操作.......................................................................................52.2.4维护人员非法操作...........................................................................................52.2.5技术风险...........................................................................................................52.3监测可用性风险.......................................................................................................62.4避免审计风险...........................................................................................................62.5弥补传统安全技术的盲点.......................................................................................72.5.1传统安全设备的盲点.......................................................................................72.5.2数据库自身日志审计的缺陷与危害...............................................................83慧眼数据库审计系统简介.......................................................................................................93.1慧眼数据库审计系统介绍.......................................................................................93.2慧眼数据库审计系统体系架构...............................................................................94产品功能特点.........................................................................................................................114.1防止管理员权限滥用.............................................................................................114.2降低维护人员的安全隐患.....................................................................................124.3保护重要数据安全.................................................................................................124.4保障业务连续性.....................................................................................................124.5优秀的处理性能.....................................................................................................134.6强大的分析能力.....................................................................................................134.7全面的信息分析能力.............................................................................................134.8快速响应预警机制.................................................................................................134.9多角度的展现能力.................................................................................................145产品优势................................................................................................