IT Management  >   Systems Operations  >   Security  >  

SQL Server Security

RSS Feed    Add to Google    Add to My Yahoo!
SQL Server Security White Papers (View All Report Types)
 
Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Security and Trust: The Backbone of Doing Business Over the Internet
sponsored by Symantec Corporation
WHITE PAPER: Carefully managing consumers' sensitive information is an essential part of online transactions. This informative resource helps you learn how you can gain the trust of your customers and keep their valuable information safe.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Symantec Corporation

Document Storage: 7 Must-Have Features for Superior Performance
sponsored by Actuate
WHITE PAPER: Organizations that produce high-volume customer communications must employ electronic archives to securely store content. This white paper lays out performance-enhancing features found in state-of-the-art enterprise document storage systems. Discover performance-enhancing features all archives should possess.
Posted: 01 May 2015 | Published: 01 May 2015

Actuate

Managing the Entire Database Security & Compliance Lifecycle with IBM InfoSphere Guardium
sponsored by IBM
WHITE PAPER: Read this paper to find out what solutions optimize operational efficiency with a scalable, multi-tier architecture that automates and centralizes compliance controls across your entire application and database infrastructure.
Posted: 27 Sep 2010 | Published: 27 Sep 2010

IBM

Big data in the cloud: How to reduce data center infrastructure costs
sponsored by SearchCloudComputing.com
WHITE PAPER: How can cloud computing help companies in the new world of big data? This expert handbook looks at some possible answers to this question.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

SearchCloudComputing.com

Creating SANLess Microsoft SQL Server Failover Cluster Instances with SIOS DataKeeper Cluster Edition and Fusion-io
sponsored by SIOS Technology Corp
WHITE PAPER: Deploying a failover cluster instance (FCI) architecture for your SQL Server database requires expensive shared storage for data files and backups. This resource introduces an alternative to storage area networks (SANs) that provides the availability benefit of an FCI – without the high price tag.
Posted: 11 Feb 2014 | Published: 31 Dec 2013

SIOS Technology Corp

Controlling Risk Through Software Code Governance
sponsored by Coverity by Synopsys
WHITE PAPER: Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain.
Posted: 27 Jul 2011 | Published: 26 Jul 2011

Coverity by Synopsys

Understanding and Selecting a Database Activity Monitoring Solution
sponsored by Imperva
WHITE PAPER: Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Imperva

The Executive Guide to Data Loss Prevention
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention is designed to protect information assets with minimal interference in business processes. It provides new insights into how information is used, and enforces protective controls to prevent unwanted incidents. Read on to learn how DLP can reduce risk, improve data management practices, and even lower certain compliance costs.
Posted: 18 Aug 2009 | Published: 18 Aug 2009

Websense, Inc.

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
sponsored by Dell Software
WHITE PAPER: This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement