IT Management  >   Systems Operations  >   Security  >  

Oracle Security

RSS Feed    Add to Google    Add to My Yahoo!
Oracle Security White Papers (View All Report Types)
 
Oracle Backup and Recovery Strategies: Moving to Data-Protection-as-a-Service
sponsored by Oracle, in association with Intel
WHITE PAPER: This white paper reviews best practices for data protection approaches for backup up Oracle databases. Read on to discover how you can effectively protect your data and provide greater granularity on an application-by-application bases while reducing your RPO and RTO.
Posted: 24 Feb 2016 | Published: 22 Oct 2015

Oracle, in association with Intel

Digitization Drives the Need for Application Strengthening
sponsored by Ixia
WHITE PAPER: This white paper discusses the changing business landscape as it moves into the digital era. In this IT-driven era, competitive advantage is based on an organization's ability to be agile and adapt to changes as well as to make rapid shifts to capture market transitions.
Posted: 04 May 2016 | Published: 01 Apr 2016

Ixia

How you can defend against criminal attacks originating from the Deep Web
sponsored by IBM
WHITE PAPER: This white paper explores the depths of the Deep Web, using attack data to examine what kinds of attacks originate there and how you can defend against them.
Posted: 09 Sep 2015 | Published: 31 Jul 2015

IBM

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva
WHITE PAPER: This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions.
Posted: 19 Aug 2009 | Published: 03 Aug 2009

Imperva

Protect citizen data with IBM Rational software
sponsored by IBM
WHITE PAPER: Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

IBM

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Create Fault-Tolerant SQL Server 2008 Installations -- Rely on SQL Server 2008 Features to Protect Data
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Read this paper to determine how best to protect your SQL environment when running SQL Server on Dell PowerEdge servers.
Posted: 01 Sep 2009 | Published: 01 Sep 2009

Dell, Inc. and Intel®

Faster Application Development via Improved Database Change Management
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Embarcadero® Change Manager™ puts the power of change tracking, schema comparison, software-generated synchronization scripts, and flexible reporting into the hands of the development team.
Posted: 01 Apr 2009 | Published: 27 Mar 2009

Embarcadero Technologies, Inc.

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement