IT Management  >   Systems Operations  >   Security  >  

Oracle Security

RSS Feed    Add to Google    Add to My Yahoo!
Oracle Security White Papers (View All Report Types)
 
Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications
sponsored by SearchSecurity.com
WHITE PAPER: Implementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

SearchSecurity.com

Set yourself apart from the rest with this secure enterprise platform
sponsored by Red Hat
WHITE PAPER: This whitepaper shows you how Red Hat Enterprise Linux delivers an exceptionally secure, open source server platform via an extensive set of processes and practices.
Posted: 20 Nov 2013 | Published: 20 Nov 2013

Red Hat

The Executive Breach Blanket: 7 Steps to Safeguard Your Corporate Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains an effective 7-step process for ensuring that your business is ready to respond to data breaches.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Hewlett-Packard Company

Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Implementing Database Security and Auditing: Using Granular Access Control
sponsored by Guardium, an IBM Company
WHITE PAPER: In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system.
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Guardium, an IBM Company

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

What’s cool about columns -- and how to extend their benefits
sponsored by Infobright, Inc.
WHITE PAPER: This paper will define what column-based relational databases do and how they do it, and where they have advantages (and disadvantages) compared to traditional approaches. This in turn will lead to a discussion of the sort of environments for which columns are best suited.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Infobright, Inc.

Your Enterprise Database Security Strategy (Forrester Consulting Report)
sponsored by IBM
WHITE PAPER: Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization.
Posted: 23 May 2011 | Published: 28 Sep 2009

IBM

Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER: Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement