IT Management  >   Systems Operations  >   Security  >  

Database Administration Security

RSS Feed    Add to Google    Add to My Yahoo!
Database Administration Security White Papers (View All Report Types)
 
Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Securing Web Applications and Databases for PCI Compliance
sponsored by Imperva
WHITE PAPER: This paper, designed for security and compliance professionals, illustrates how to achieve compliance on three of the most costly and complex sections: requirements 3, 6, and 10 of PCI DSS. This paper also highlights how Web application and database appliances can deliver resource effective compliance while maintaining cost efficiency.
Posted: 12 Nov 2009 | Published: 12 Jul 2009

Imperva

Understanding and Selecting a Database Activity Monitoring Solution
sponsored by Imperva
WHITE PAPER: Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Imperva

Top 10 Steps to Protecting Your Organization’s Privacy Data
sponsored by Intel Security
WHITE PAPER: Over the last few years, the challenge of protecting privacy data has been compounded by increasing compliance regulations that can mean fines - or even jail time - if privacy data is mishandled. This white paper presents the top ten regulatory compliance requirements to consider when selecting a privacy data protection solution.
Posted: 09 Mar 2010 | Published: 09 Mar 2010

Intel Security

Data Masking Best Practices for Copying Sensitive Data Into Non-Production Environments
sponsored by Oracle Corporation
WHITE PAPER: Download this paper to learn data masking best practices and enable your organization to safely use production data for development, testing, and sharing with out-source or off-shore partners, without risking a sensitive data breach.
Posted: 05 Dec 2011 | Published: 05 Dec 2011

Oracle Corporation

Enabling Cost-Cutting Initiatives with Governance, Risk and Compliance Management Technology
sponsored by RSA
WHITE PAPER: This white paper introduces new enterprise governance, risk and compliance (eGRC) management technologies that can help you cut costs and increase operational efficiency so you can meet regulatory and risk demands in today’s tough economy.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

RSA

Hardening Database Security
sponsored by McAfee.
WHITE PAPER: View this paper to learn how McAfee® Database Security Solution, a multitiered software solution that provides protection to all databases and data assets, warding off threats and eliminating vulnerabilities while providing compliance and maximising the efficiency of your operations.
Posted: 15 Aug 2011 | Published: 09 Aug 2011

McAfee.

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements
sponsored by Oracle Corporation
WHITE PAPER: Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.
Posted: 09 Apr 2012 | Published: 31 Jan 2012

Oracle Corporation

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva
WHITE PAPER: This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Imperva

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement