IT Management  >   Systems Operations  >   Security  >  

SAP Security

RSS Feed    Add to Google    Add to My Yahoo!
SAP Security Multimedia (View All Report Types)
Masood Heydari Discusses the Key to Securing and Accelerating Databases and Applications
sponsored by Oracle Corporation
WEBCAST: In this webinar, Masood Heydari discusses the next phase of hardware and software engineering. Tune in and find out how, by converging elements of database software onto processor silicon, technology has made a giant leap forward in making a fully encrypted data center.
Posted: 11 Nov 2015 | Premiered: Oct 26, 2015

Oracle Corporation

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009


Reduce Costs by Simplifying Data Centers & Networks with a Virtual Infrastructure Layer
sponsored by OnPATH Technologies
WEBCAST: As data centers grow, many virtualized solutions lack the connectivity, bandwidth and fault tolerance that is necessary for efficient management. This Webcast provides an overview of the technology needed to employ an end-to-end virtualized data center...
Posted: 20 Nov 2007 | Premiered: Dec 6, 2007, 12:00 EST (17:00 GMT)

OnPATH Technologies

Security University: Database Security Issues
sponsored by
VIRTUAL ENVIRONMENT: The start of many data security issues is, of course, the database. Here's a look at currently predominant types of database security vulnerabilities and how best to monitor database access to detect potential security incidents.
Posted: 10 Jun 2013 | Premiered: 10 Jun 2013

Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

Customers Discuss Oracle Database Security
sponsored by Oracle Corporation
WEBCAST: Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.
Posted: 24 May 2012 | Premiered: May 24, 2012

Oracle Corporation

Protect data & client trust: an end to end approach to protecting your applications & organization
sponsored by IBM
WEBCAST: This presentation outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.
Posted: 06 Dec 2010 | Premiered: Dec 6, 2010


Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015


Securing PostgreSQL from External Attack
sponsored by EnterpriseDB Corporation
WEBCAST: Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets.
Posted: 09 Nov 2009 | Premiered: Nov 9, 2009

EnterpriseDB Corporation

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA
sponsored by Imperva
PODCAST: Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement