Workflows
Workflows consolidate several database activity monitoring tasks, including asset discovery, vulnerability assessment and hardening, database activity monitoring and audit reporting, report distribution, sign-off by key stakeholders, and escalations.
Workflows are intended to transform database security management from a time-consuming manual activity performed periodically to a continuously automated process that supports company privacy and governance requirements, such as PCI-DSS, SOX, Data Privacy and HIPAA. In addition, workflows support the exporting of audit results to external repositories for additional forensic analysis via Syslog, CSV/CEF files, and external feeds.
For example, a compliance workflow automation process might address the following questions: what type of report, assessment, audit trail, or classification is needed, who should receive this information and how sign-offs are handled, and what is the schedule for delivery?