IT Management  >   Systems Operations  >   Security  >  

SQL Server Security

RSS Feed    Add to Google    Add to My Yahoo!
SQL Server Security White Papers (View All Report Types)
 
Oracle MAA Reference Architectures
sponsored by Oracle Corporation
WHITE PAPER: View this informative white paper for a detailed discussion of four high availability reference architecture and the accompanying service level objectives that can be achieved.
Posted: 27 Apr 2015 | Published: 01 Jul 2014

Oracle Corporation

Document Storage: 7 Must-Have Features for Superior Performance
sponsored by Actuate
WHITE PAPER: Organizations that produce high-volume customer communications must employ electronic archives to securely store content. This white paper lays out performance-enhancing features found in state-of-the-art enterprise document storage systems. Discover performance-enhancing features all archives should possess.
Posted: 01 May 2015 | Published: 01 May 2015

Actuate

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies.
Posted: 27 Mar 2009 | Published: 27 Mar 2009

Embarcadero Technologies, Inc.

Top 10 Steps to Protecting Your Organization’s Privacy Data
sponsored by McAfee, Inc.
WHITE PAPER: Over the last few years, the challenge of protecting privacy data has been compounded by increasing compliance regulations that can mean fines - or even jail time - if privacy data is mishandled. This white paper presents the top ten regulatory compliance requirements to consider when selecting a privacy data protection solution.
Posted: 09 Mar 2010 | Published: 09 Mar 2010

McAfee, Inc.

Protecting and Enhancing SQL Server With Double-Take Availability
sponsored by Double-Take Software
WHITE PAPER: Double-Take Software provides organizations with a solution that offers distinct recovery and protection advantages over manual Microsoft SQL built-in replication capabilities: Double-Take Availability saves more data real-time and restores that data in a much faster manner.
Posted: 16 Nov 2009 | Published: 22 Oct 2009

Double-Take Software

How to Protect Data Against Theft and Ensure That it Remains Confidential - No Matter Where it is Stored
sponsored by Sophos, Inc.
WHITE PAPER: This white paper introduces SafeGuard Enterprise 5.40, an innovative solution from Sophos that fulfills all the requirements a company could have for protecting confidential data on mobile PCs and data media.
Posted: 19 Nov 2009 | Published: 01 Sep 2009

Sophos, Inc.

SANS Institute Making Database Security an IT Security Priority
sponsored by Oracle Corporation
WHITE PAPER: Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security.
Posted: 13 Jun 2011 | Published: 30 Nov 2009

Oracle Corporation

Implementing Database Security and Auditing: Using Granular Access Control
sponsored by Guardium, an IBM Company
WHITE PAPER: In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system.
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Guardium, an IBM Company

Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER: Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008

Information Security Magazine
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement