IT Management  >   Systems Operations  >   Security  >  

Database Protection

RSS Feed    Add to Google    Add to My Yahoo!
Database Protection Multimedia (View All Report Types)
 
Video: Oracle Active Data Guard
sponsored by Oracle Corporation
VIDEO: Watch this brief video for an informative explanation of how Oracle Active Data Guard makes better use of the standby database to complement the functionality of the production database and significantly increase software and hardware return on investment.
Posted: 30 Jun 2010 | Premiered: 30 Jun 2010

Oracle Corporation

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA
sponsored by Imperva
PODCAST: Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

Reduce Costs by Simplifying Data Centers & Networks with a Virtual Infrastructure Layer
sponsored by OnPATH Technologies
WEBCAST: As data centers grow, many virtualized solutions lack the connectivity, bandwidth and fault tolerance that is necessary for efficient management. This Webcast provides an overview of the technology needed to employ an end-to-end virtualized data center...
Posted: 20 Nov 2007 | Premiered: Dec 6, 2007, 12:00 EST (17:00 GMT)

OnPATH Technologies

Simplifying Data Centers & Storage Area Networks by Creating a Virtual Infrastructure Layer
sponsored by OnPATH Technologies
WEBCAST: A virtual infrastructure layer can help your organization adapt to the dynamic needs of a virtualized data center by providing a more secure environment that enables a hands-off approach to managing the SAN. This Webcast provides an overview of the...
Posted: 23 Oct 2007 | Premiered: Nov 15, 2007, 12:00 EST (17:00 GMT)

OnPATH Technologies

ISACA PCI Compliance Symposium
sponsored by Intel
WEBCAST: As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.
Posted: 04 Apr 2011 | Premiered: Jan 25, 2011

Intel

The Executive Guide to Data Loss Prevention
sponsored by Websense, Inc.
VIDEO: Rich Mogull of Securosis answers the question, What is Data Loss Prevention (DLP)? In this videocast he discusses how DLP benefits business and shows examples of DLP usage in the real world.
Posted: 02 Sep 2009 | Premiered: 02 Sep 2009

Websense, Inc.

Protect data & client trust: an end to end approach to protecting your applications & organization
sponsored by IBM
WEBCAST: This presentation outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.
Posted: 06 Dec 2010 | Premiered: Dec 6, 2010

IBM

Securing PostgreSQL from External Attack
sponsored by EnterpriseDB Corporation
WEBCAST: Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets.
Posted: 09 Nov 2009 | Premiered: Nov 9, 2009

EnterpriseDB Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement