Sybase, Inc. and Lumigent Technologies, Inc., today announce the general availability of Sybase® Data Auditing for Sybase Adaptive Server® Enterprise (ASE) databases. Sybase Data Auditing enables organizations to maintain the integrity of their data, reduce the risk of inappropriate changes and access to data, and comply with regulations for data privacy and security. Sybase and Lumigent have partnered to optimize the solution through joint development and marketing efforts.

Sybase Data Auditing will enhance Sybase’s well-established position within large financial services organizations and other enterprises that must comply with government-regulated data auditing requirements, such as the Sarbanes-Oxley Act and the Health Insurance Portability and Accountability Act (HIPAA). More than 40,000 corporate customers, in 60 countries and 95 of Fortune’s top 100 companies use Sybase technology.

“Our customers require the ability to audit their data at any time,” noted Dr. Raj Nathan, senior vice president and general manager, Sybase Information Technology and Solutions Group. “The ASE database demonstrates consistently superior performance in transaction-heavy environments like government and financial services, where reliability, security and high availability are critical. Sybase ASE combined with Sybase Data Auditing offers customers a superior solution to ensure accountability and transparency of corporate data.”

“Lumigent’s customers have been able to meet a wide range of IT audit and data security requirements,” said Cliff Pollan, CEO of Lumigent. “They have successfully addressed externally-driven compliance and data privacy mandates, while assuring that their IT operations are meeting internal expectations for best practices for data integrity, privacy and security.”

With Sybase Data Auditing, organizations that use Sybase ASE databases to store business critical data will be able to:

—Assure end-to-end integrity of transactions for regulatory compliance
through transparency of modified data and identification of when such
modifications were made

—Detect and analyze breaches in user and application behavior
(intentional or accidental)

—Monitor and alert on database activity of privileged users that occur
outside of application controls and security measures

—Validate policies and controls for protecting sensitive data and
continually monitor the effectiveness of these polices and controls