IT Management  >   Systems Operations  >   Security  >  

Database Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Oracle Security, Database Protection, SAP Security, SQL Server Security, Data Base Security, Database Administration Security
DEFINITION: The protection of a database from malicious attacks or accidental changes.
Database Security White Papers (View All Report Types)
1 - 25 of 127 Matches Previous Page  |  Next Page
ESG Lab Validation: Enterprise Storage for Performance-driven Databases
sponsored by NetApp
WHITE PAPER: This ESG Lab Report documents the real world performance, reliability, availability, and serviceability of NetApp EFSeries flash arrays in Oracle database environments. A combination of hands on testing by ESG Lab and audited inhouse performance testing executed by NetApp were used to create this report.
Posted: 22 Mar 2015 | Published: 22 Mar 2015

NetApp

Five Steps For Securing The Data Center
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper presents five essential steps to securing your database without sacrificing the high performance of modern data centers.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

4 Steps to Address Vulnerabilities Before a Breach
sponsored by IBM
WHITE PAPER: This white paper addresses how vulnerabilities can go undetected and gives you advice for mitigating these vulnerabilities.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

IBM

Data protection for big data environments
sponsored by IBM
WHITE PAPER: Access this exclusive interview to learn how you can design real-time, business-driven data protection policies across your enterprise. Read on to gain more insight into big data analytics and security in six distinct sections.
Posted: 12 Mar 2015 | Published: 31 Mar 2014

IBM

Top Three Myths about Big Data Security
sponsored by IBM
WHITE PAPER: In this informative white paper get the top 3 myths about big data security that are preventing companies effectively securing their big data. Read on to learn how you can implement an effective big data security system to protect your valuable customer data.
Posted: 11 Mar 2015 | Published: 31 Oct 2012

IBM

Understanding the Data Security Risk – New Findings Revealed
sponsored by IBM
WHITE PAPER: In this webcast, discover how to defend the 4 types of data hackers want to steal using a simple framework as a foundation for your security strategy. View now to learn more.
Posted: 11 Mar 2015 | Published: 04 Feb 2015

IBM

Conquering the Top 5 AD Challenges
sponsored by OneLogin
WHITE PAPER: In thiw white paper, explore how one security platform connects your AD infrastructure and cloud applications to simplify and strengthen identity and access management (IAM).
Posted: 09 Mar 2015 | Published: 18 Feb 2015

OneLogin

5 Reasons to User Provision in the Cloud with Identity Management
sponsored by OneLogin
WHITE PAPER: In this white paper, the five reasons to user provision apps in the cloud with identity access management (IAM) software are revealed.
Posted: 09 Mar 2015 | Published: 04 Feb 2015

OneLogin

Uncover the Top Ten Database Threats That Could Affect Your Business
sponsored by Imperva
WHITE PAPER: This white paper highlights the top ten threats that affect traditional databases as well as Big Data technologies.
Posted: 03 Mar 2015 | Published: 31 Dec 2014

Imperva

The Executive Breach Blanket: 7 Steps to Safeguard Your Corporate Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains an effective 7-step process for ensuring that your business is ready to respond to data breaches.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Hewlett-Packard Company

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Data Center Security Report: The Increasing Standards of Data Center Security
sponsored by Fortinet, Inc.
WHITE PAPER: In the following report from Infonetics Research, Principal Analyst Jeff Wilson discusses the data center market and adoption drivers for firewalls, integrated security, and other appliances. Wilson introduces criteria for datacenter class capabilities, and discusses the leading vendors who are poised to deliver on the new requirements.
Posted: 28 Jan 2015 | Published: 28 Jan 2015

Fortinet, Inc.

4 Steps to Prevent a Data Breach: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: Access this valuable resource to learn more about the common threats to data security, and how you can address your database vulnerabilities in 4 critical steps.
Posted: 27 Jan 2015 | Published: 31 Dec 2014

IBM

Tips to Ensure the Best Outcome for Your SQL Server Upgrade
sponsored by SolarWinds, Inc.
WHITE PAPER: Uncover the top 11 items you should include on your checklist for migrating your database server to SQL Server.
Posted: 02 Oct 2014 | Published: 31 Dec 2013

SolarWinds, Inc.

How ObjectRocket Gives Free Backups to Everyone
sponsored by Rackspace
WHITE PAPER: When anyone in the community loses data, everyone in the community feels the effects. Fortunately, for MongoDB users, free backup that's not an add-on or an upcharge is possible to achieve. Learn how it's possible to back up data at a secure location completely free of charge as you read this resource.
Posted: 19 Sep 2014 | Published: 11 Aug 2014

Rackspace

Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Comparing IBM Informix and Oracle Database for High Availability and Data Replication, an ITG Management Report
sponsored by IBM
WHITE PAPER: In this report, get an in-depth comparison between Oracle Databases and Real Application Clusters (RAC) and IBM Informix with regards to high availability and data replication.
Posted: 02 May 2014 | Published: 31 Jan 2014

IBM

Back Up Mission-Critical Data Whenever and Wherever
sponsored by Code42
WHITE PAPER: This in-depth resource shines light on a continuous, multi-destination system to back up mission-critical data whenever and wherever it is created.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Code42

10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments
sponsored by SIOS Technology Corp
WHITE PAPER: Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

SIOS Technology Corp

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Achieving High Oracle Performance
sponsored by Dell Software
WHITE PAPER: DBAs cannot afford to rely on reactive measures anymore. They need advanced performance management tools that will enable them to catch emerging issues before they can affect end users. Discover how advanced database management can help DBAs protect the system by preventing problems from developing at all. Download the white paper to learn more.
Posted: 07 May 2014 | Published: 19 Aug 2013

Dell Software

Is your data as well protected as it should be?
sponsored by Informatica
WHITE PAPER: Read this exclusive white paper now to discover the big data security tool capable of significantly reducing the risk of a data breach, while helping organizations comply with data regulations and policies.
Posted: 07 May 2014 | Published: 30 Nov 2012

Informatica

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Creating SANLess Microsoft SQL Server Failover Cluster Instances with SIOS DataKeeper Cluster Edition and Fusion-io
sponsored by SIOS Technology Corp
WHITE PAPER: Deploying a failover cluster instance (FCI) architecture for your SQL Server database requires expensive shared storage for data files and backups. This resource introduces an alternative to storage area networks (SANs) that provides the availability benefit of an FCI – without the high price tag.
Posted: 11 Feb 2014 | Published: 31 Dec 2013

SIOS Technology Corp
1 - 25 of 127 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement