IT Management  >   Systems Operations  >   Security  >  

Database Administration Security

RSS Feed    Add to Google    Add to My Yahoo!
Database Administration SecurityWhite Papers (View All Report Types)
 
Tips to Ensure the Best Outcome for Your SQL Server Upgrade
sponsored by SolarWinds, Inc.
WHITE PAPER: Uncover the top 11 items you should include on your checklist for migrating your database server to SQL Server.
Posted: 02 Oct 2014 | Published: 31 Dec 2013

SolarWinds, Inc.

Edison Group, Comparative Management Costs Study: Oracle Database 11g vs. Microsoft SQL Server 2008
sponsored by Oracle Corporation
WHITE PAPER: In this whitepaper presented by the Edison Group, reveals how Oracle Database widens the manageability lead over Microsoft SQL Server 2008. The study shows how Oracle Database can save 43% in time and 41% in database management costs over Microsoft SQL Server 2008.
Posted: 09 Sep 2009 | Published: 15 Jul 2009

Oracle Corporation

Ponemon Study: 2011 Cost of a Data Breach
sponsored by Symantec Corporation
WHITE PAPER: This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Posted: 25 May 2012 | Published: 31 Mar 2012

Symantec Corporation

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

IOUG 2011 Survey: The Petabyte Challenge: 2011 IOUG Database Growth Survey
sponsored by Oracle Corporation
WHITE PAPER: More than 300 database and information security professionals were recently surveyed on their data security practices. The results were disturbing with 60% saying that a data breach is likely over the next 12 months. Download this complimentary copy of the 2011 IOUG Data Security Survey Report and see how your organization measures up.
Posted: 10 Apr 2012 | Published: 06 Oct 2011

Oracle Corporation

IDC Disaster Recovery: Improving Time-to-Readiness
sponsored by EMC Backup and Recovery Solutions
WHITE PAPER: Read this IDC Analyst Connection to learn how using deduplication storage for data protection can help organizations achieve two goals: efficiently manage the growing data volumes and be prepared to handle the most pressing disaster recovery scenarios.
Posted: 27 May 2011 | Published: 27 May 2011

EMC Backup and Recovery Solutions

Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER: Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008

Information Security Magazine

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010

Imperva

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement