IT Management  >   Systems Operations  >   Security  >  

Data Base Security

RSS Feed    Add to Google    Add to My Yahoo!
Data Base Security Reports
 
The future of digital forensics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Expert Guide to Information Security Certifications
sponsored by TechTarget
RESOURCE: Choosing the right information security certification, whether it is for your educational or career benefit should be easy. Find a list of programs from various vendors, a brief description of each and tips on identifying the right one for your needs in our expert information security guide, upon completion of a brief Data Protection Survey.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Gartner Market Guide for Data-Centric Audit and Protection (DCAP).
sponsored by IBM
WHITE PAPER: Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015

IBM

Creating SQL Server Disaster Recovery Solutions with SIOS DataKeeper
sponsored by SIOS Technology Corp
WHITE PAPER: This resource explores why many organizations don't aggressively pursue disaster recovery, and introduces a tool for driving DR success in your SQL Server environment.
Posted: 12 Feb 2014 | Published: 31 Dec 2013

SIOS Technology Corp

Set yourself apart from the rest with this secure enterprise platform
sponsored by Red Hat
WHITE PAPER: This whitepaper shows you how Red Hat Enterprise Linux delivers an exceptionally secure, open source server platform via an extensive set of processes and practices.
Posted: 20 Nov 2013 | Published: 20 Nov 2013

Red Hat

Webroot  Endpoint Security eBook
sponsored by Webroot
EBOOK: This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK
sponsored by Idera
WHITE PAPER: This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks.
Posted: 31 Jan 2012 | Published: 31 Jan 2012

Idera

Information Security Magazine – July/August 2014
sponsored by SearchSecurity.com
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchSecurity.com

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement