IT Management  >   Systems Operations  >   Security  >  

SQL Server Security

RSS Feed    Add to Google    Add to My Yahoo!
SQL Server Security White Papers (View All Report Types)
 
SAP SYSTEMS ANALYSIS Business Risk Illustration
sponsored by Onapsis
WHITE PAPER: This white paper helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 09 Mar 2016 | Published: 29 Feb 2016

Onapsis

Oracle Backup and Recovery Strategies: Moving to Data-Protection-as-a-Service
sponsored by Oracle, in association with Intel
WHITE PAPER: This white paper reviews best practices for data protection approaches for backup up Oracle databases. Read on to discover how you can effectively protect your data and provide greater granularity on an application-by-application bases while reducing your RPO and RTO.
Posted: 24 Feb 2016 | Published: 22 Oct 2015

Oracle, in association with Intel

Backup and Recovery for SAP with Oracle Environments
sponsored by EMC & MicroAge
WHITE PAPER: In this white paper, review the EMC data protection suite, which features the necessary SAP integration and support to make backup and recovery more efficient and easier to manage. Read on to discover the new features this technology can provide to your enterprise's backup solution.
Posted: 10 Mar 2016 | Published: 30 Sep 2013

EMC & MicroAge

Integrating Big Data Systems with Enterprise Data Warehouses
sponsored by Oracle Corporation
WHITE PAPER: In this white paper, you will learn how to both maximize the business benefits of big data and minimize the risk of adopting new technologies with a unified query system. Read on to allow a single query to access data in multiple stores—be they Hadoop, NoSQL or relational databases.
Posted: 03 Feb 2016 | Published: 31 Jan 2015

Oracle Corporation

Gartner Market Guide for Data-Centric Audit and Protection (DCAP).
sponsored by IBM
WHITE PAPER: This white paper helps CISOs identify emerging data-centric audit and protection tools that they can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015

IBM

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK
sponsored by Idera
WHITE PAPER: This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks.
Posted: 31 Jan 2012 | Published: 31 Jan 2012

Idera

Ponemon Study: 2011 Cost of a Data Breach
sponsored by Symantec Corporation
WHITE PAPER: This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Posted: 25 May 2012 | Published: 31 Mar 2012

Symantec Corporation

Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER: Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

SANS Institute Making Database Security an IT Security Priority
sponsored by Oracle Corporation
WHITE PAPER: Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security.
Posted: 13 Jun 2011 | Published: 30 Nov 2009

Oracle Corporation

Taming the Data Demons
sponsored by IBM
WHITE PAPER: Taming the data demons: leveraging information in the age of risk explores the framework and advantages of a holistic approach to data risk management, and provides both IT and line-of-business executives with the "why" and "how" to begin putting an end-to-end data risk management program to work in your organization.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement