<Li> The ability to monitor intra-database attacks and back - doors in real time (such as stored procedures, triggers, views, etc .) </Li> <Li> A solution which is agnostic to most IT infrastructure variables - such as encryption or network topology </Li> <Li> Blocking and prevention, without being in - line to the transactions </Li> <Li> Active discovery of at - risk data </Li>

Who is responsible for monitoring the database environment