IT Management  >   Systems Operations  >   Security  >  

Data Base Security

RSS Feed    Add to Google    Add to My Yahoo!
Data Base SecurityMultimedia (View All Report Types)
 
IBM DB2 Webcast Series for Oracle Professionals
sponsored by IBM
WEBCAST: Due to PL/SQL and a range of other compatibilty features, Oracle applications are much more easily enabled for DB2.  Use this short webcast to get level-set on terms.  Part of a series, this short webcast replay is an overview of DB2 terms and terminology for those most familiar with the Oracle environment.
Posted: 30 Aug 2011 | Premiered: Aug 30, 2011

IBM

CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF
sponsored by CA Technologies.
SOFTWARE DEMO: Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation.
Posted: 17 Jun 2008 | Premiered: 13 Jun 2008

CA Technologies.

Simplifying Data Centers & Storage Area Networks by Creating a Virtual Infrastructure Layer
sponsored by OnPATH Technologies
WEBCAST: A virtual infrastructure layer can help your organization adapt to the dynamic needs of a virtualized data center by providing a more secure environment that enables a hands-off approach to managing the SAN. This Webcast provides an overview of the...
Posted: 23 Oct 2007 | Premiered: Nov 15, 2007, 12:00 EST (17:00 GMT)

OnPATH Technologies

Security University: Database Security Issues
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: The start of many data security issues is, of course, the database. Here's a look at currently predominant types of database security vulnerabilities and how best to monitor database access to detect potential security incidents.
Posted: 10 Jun 2013 | Premiered: 10 Jun 2013

SearchSecurity.com

Securing PostgreSQL from External Attack
sponsored by EnterpriseDB Corporation
WEBCAST: Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets.
Posted: 09 Nov 2009 | Premiered: Nov 9, 2009

EnterpriseDB Corporation

Reduce Costs by Simplifying Data Centers & Networks with a Virtual Infrastructure Layer
sponsored by OnPATH Technologies
WEBCAST: As data centers grow, many virtualized solutions lack the connectivity, bandwidth and fault tolerance that is necessary for efficient management. This Webcast provides an overview of the technology needed to employ an end-to-end virtualized data center...
Posted: 20 Nov 2007 | Premiered: Dec 6, 2007, 12:00 EST (17:00 GMT)

OnPATH Technologies

AppDetective
sponsored by Application Security, Inc.
TRIAL SOFTWARE: Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
Posted: 17 Nov 2006 | Premiered: 01 Mar 2006

Application Security, Inc.

A Proactive Approach to Compliance, Security and Audit
sponsored by IBM
WEBCAST: This exclusive resource examines an integrated solution for automating the complete security and compliance lifestyle across your entire database infrastructure.
Posted: 31 Jul 2013 | Premiered: Jul 31, 2013

IBM

Introducing Oracle Exadata Database Machine X2-8
sponsored by Oracle Corporation
PODCAST: Oracle has recently introduced the new Exadata Database Machine X-28. Listen to this podcast featuring Ron Weiss to learn more about this new product and how it can enhance your company.
Posted: 21 Mar 2011 | Premiered: Mar 18, 2011

Oracle Corporation

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement