IT Management  >   Systems Operations  >   Security  >  

Data Base Security

RSS Feed    Add to Google    Add to My Yahoo!
Data Base Security Reports
 
Onapsis Research Labs: SAP Systems Security Analysis
sponsored by Onapsis
WHITE PAPER: This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 22 Aug 2016 | Published: 29 Feb 2016

Onapsis

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

The General Data Protection Regulation Challenge
sponsored by Close Brothers Technology Services
WHITE PAPER: This paper examines some of the problems caused by The General Data Protection Regulation and how it can be used as a catalyst for improvements in security. Find out how you'll be able to turn compliance with this new legislation into an opportunity for to improve data portability, retention, classification and more.
Posted: 21 Sep 2016 | Published: 30 Jun 2016

Close Brothers Technology Services

Don't Guess. Test. Uncover Your Security Vulnerabilities
sponsored by Trustwave
WHITE PAPER: Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.
Posted: 17 Oct 2016 | Published: 30 Sep 2016

Trustwave

Medical Management solutions technical case study V0.1
sponsored by Cintra/Oracle
CASE STUDY: When medical billing services provider, Medical Management, needed to upgrade their legacy Oracle database architecture they turned to this trusted Oracle partner for help. Discover how the organization was able to facilitate a smooth transition for Medical Management to boost database performance quickly and easily.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

Cintra/Oracle

An Information Architecture Vision
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Open Group assesses the "big data" problem and offers an Enterprise Information Planning and Architecture Model to help organisations make the most of their information.
Posted: 07 Jun 2013 | Published: 07 Jun 2013

ComputerWeekly.com

Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications
sponsored by SearchSecurity.com
WHITE PAPER: Implementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

SearchSecurity.com

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

Presentation Transcript: New Releases from Intel and IBM offer Breakthrough Database Performance
sponsored by Intel and IBM
PRESENTATION TRANSCRIPT: Read this presentation transcript now and learn about these advances that are possible by combining the Intel Xeon processor E5-2600 product family with IBM DB2 10 for Linux, Unix and Windows.
Posted: 30 Apr 2012 | Published: 17 Apr 2012

Intel and IBM

Information Security Magazine – July/August 2014
sponsored by SearchSecurity.com
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement