IT Management  >   Systems Operations  >   Security  >  

Database Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Oracle Security, Database Protection, SAP Security, SQL Server Security, Data Base Security, Database Administration Security
DEFINITION: The protection of a database from malicious attacks or accidental changes.
Database Security White Papers (View All Report Types)
1 - 25 of 125 Matches Previous Page  |  Next Page
Definitive Guide: Securing the Mobile Enterprise
sponsored by Aruba Networks
WHITE PAPER: While mobility and IoT offer potential rewards for organizations the thought of all of these unknown devices connecting to the network can be worrisome for security and IT managers This informational white paper offers an outline for the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Aruba Networks

Learn How to Choose the Right Database for the Job
sponsored by IBM
WHITE PAPER: Learn about the process of selecting and deploying the right multi-database solution for you. Uncover 7 types of open source databases and tools. Plus, gain access to a complimentary 30-day trial of IBM's Compose Enterprise multi-DB toolkit.
Posted: 29 Jun 2016 | Published: 29 Jun 2016

IBM

10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments
sponsored by SIOS Technology Corp
WHITE PAPER: Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.
Posted: 28 Jun 2016 | Published: 15 Apr 2014

SIOS Technology Corp

Few Fully Prepared for Software Security Risks
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper shows you results from a recent security survey and the value of testing your security measure regularly.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

Top 10 Database Security Threats
sponsored by Dimension Data
WHITE PAPER: Read this paper to understand the top 10 database threats and how you can protect your most valuable assets.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Dimension Data

Recognize and Respond to Cyber Attacks
sponsored by Verizon
WHITE PAPER: The inability to recognize and react the lead indicators of a cyber attack can be an organization's greatest weakness. Learn how to prepare your organization to recognize and mitigate threats. Accelerate your detection capabilities so breaches can't linger.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Verizon

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Gemalto
WHITE PAPER: This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.
Posted: 24 May 2016 | Published: 24 May 2016

Gemalto

Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform
sponsored by Gemalto
WHITE PAPER: With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

A Best Practice Approach to Database Backup and Recovery
sponsored by Veritas
WHITE PAPER: Examine a backup tool that improves visibility, compliance, and data protection and enforces better communication between the backup admin and database admin (DBA). Learn how your enterprise can eliminate the risk of losing time, data and money with a simplified, well-coordinated database backup and recovery solution.
Posted: 19 May 2016 | Published: 19 May 2016

Veritas

SQL Server 2016: Mission-Critical Performance
sponsored by Microsoft
WHITE PAPER: In this white paper, learn how the most recent versions of SQL Server provide advanced security, availability, scalability, and performance capabilities that meet the data needs of modern, global organizations, and the potential cost impacts of this functionality.
Posted: 28 Apr 2016 | Published: 31 May 2015

Microsoft

Gartner Market Guide for Data-Centric Audit and Protection (DCAP).
sponsored by IBM
WHITE PAPER: Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015

IBM

How Memory and Storage Technologies Are Transforming Enterprise Computing
sponsored by Micron Technology
WHITE PAPER: The ability to successfully manipulate, analyze, utilize and protect data is the key competitive differentiator of today's business era. Learn how you can leverage innovation to your advantage and current trends in memory and storage.
Posted: 28 Mar 2016 | Published: 16 Mar 2016

Micron Technology

Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER: Read this paper to understand the top 10 database threats and how you can protect your most valuable assets.
Posted: 16 Feb 2016 | Published: 30 Dec 2015

Imperva

Support Your Innovation Needs with SQL Server
sponsored by Microsoft
WHITE PAPER: Access this white paper now and find out how your company can take advantage of the 'data dividend' through the next wave of innovation on the Microsoft SQL Server platform including improvements in performance, security and compliance, availability, scalability and cloud capabilities.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

SQL Server 2016: Have you Made the Leap?
sponsored by Microsoft
WHITE PAPER: Some technology gets better over time. If you haven't already, explore the categories of enhancement in SQL Server 2016.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

Microsoft

SQL Server 2014 and the Data Platform
sponsored by Microsoft
WHITE PAPER: This data sheet presents three reasons SQL Server is beneficial to the enterprise, offering details about each one. Discover why building, deploying, and managing solutions that span on-premises and cloud environments just got easier.
Posted: 03 Feb 2016 | Published: 31 Mar 2014

Microsoft

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Achieving High Oracle Performance
sponsored by Dell Software
WHITE PAPER: DBAs cannot afford to rely on reactive measures anymore. They need advanced performance management tools that will enable them to catch emerging issues before they can affect end users. Discover how advanced database management can help DBAs protect the system by preventing problems from developing at all. Download the white paper to learn more.
Posted: 07 May 2014 | Published: 19 Aug 2013

Dell Software

Is your data as well protected as it should be?
sponsored by Informatica
WHITE PAPER: Read this exclusive white paper now to discover the big data security tool capable of significantly reducing the risk of a data breach, while helping organizations comply with data regulations and policies.
Posted: 07 May 2014 | Published: 30 Nov 2012

Informatica

Comparing IBM Informix and Oracle Database for High Availability and Data Replication, an ITG Management Report
sponsored by IBM
WHITE PAPER: In this report, get an in-depth comparison between Oracle Databases and Real Application Clusters (RAC) and IBM Informix with regards to high availability and data replication.
Posted: 02 May 2014 | Published: 31 Jan 2014

IBM

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva
1 - 25 of 125 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement