Artikel

What Is Database Activity Monitoring (DAM)?

Database activity monitoring tracks who accesses sensitive data, when, and how. Learn how DAM works and why it matters for data security in 2026.

DAM captures, analyzes, and alerts on activity happening inside database systems — tracking who accessed what data, when, and how, independently of the database's own logs.

The purpose is to protect sensitive data from unauthorized access, meet regulatory compliance requirements, and give security teams forensic evidence they can trust.

DAP is Gartner's term for the broader category DAM has evolved into, which adds capabilities like data discovery and classification, vulnerability management, and activity blocking on top of core monitoring.

Next-gen DAM uses cloud-native, agentless interception or native log collection instead of per-server agents. It deploys faster, scales across thousands of databases, and works with managed cloud services that legacy DAM cannot reach.

DAM provides the continuous monitoring, tamper-proof audit trails, and privileged-access reporting these frameworks require — turning compliance evidence into something retrievable on demand rather than reconstructed manually.

Secure your data. Build trust.

Modern business is deeply interconnected, creating both opportunities and risks. Teradata safeguards data with best-in-class technologies and processes, earning the trust of leading enterprises from the world's most highly regulated industries. To learn more about how Teradata delivers trusted data for business, visit our Trust and Security Center.

Bleiben Sie auf dem Laufenden

Abonnieren Sie den Blog von Teradata, um wöchentliche Einblicke zu erhalten



Ich erkläre mich damit einverstanden, dass mir die Teradata Corporation als Anbieter dieser Website gelegentlich Marketingkommunikations-E-Mails mit Informationen über Produkte, Data Analytics und Einladungen zu Events und Webinaren zusendet. Ich nehme zur Kenntnis, dass ich mein Einverständnis jederzeit widerrufen kann, indem ich auf den Link zum Abbestellen klicke, der sich am Ende jeder von mir erhaltenen E-Mail befindet.

Der Schutz Ihrer Daten ist uns wichtig. Ihre persönlichen Daten werden im Einklang mit der globalen Teradata Datenschutzrichtlinie verarbeitet.