IT Management  >   Systems Operations  >   Security  >  

Data Base Security

RSS Feed    Add to Google    Add to My Yahoo!
Data Base Security Reports
 
Financial Services Data Privacy and Data Migration
sponsored by ComputerWeekly.com
PRESENTATION: Keith Bucknall, head of Strategy, Architecture & Infrastructure for Lloyds motor insurer, ERS, looks at the data protection challenges faced by the organisation, in this presentation.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

ComputerWeekly.com

ESG Lab Validation: Enterprise Storage for Performance-driven Databases
sponsored by NetApp
WHITE PAPER: This ESG Lab Report documents the real world performance, reliability, availability, and serviceability of NetApp EFSeries flash arrays in Oracle database environments. A combination of hands on testing by ESG Lab and audited inhouse performance testing executed by NetApp were used to create this report.
Posted: 22 Mar 2015 | Published: 22 Mar 2015

NetApp

Five Steps For Securing The Data Center
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper presents five essential steps to securing your database without sacrificing the high performance of modern data centers.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

Top Three Myths about Big Data Security
sponsored by IBM
WHITE PAPER: In this informative white paper get the top 3 myths about big data security that are preventing companies effectively securing their big data. Read on to learn how you can implement an effective big data security system to protect your valuable customer data.
Posted: 11 Mar 2015 | Published: 31 Oct 2012

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

SearchSecurity.com E-Guide: Database monitoring best practices: How to use DAM tools
sponsored by IBM
EGUIDE: Protecting databases and the data they contain is a challenging task for every IT security professional. This expert e-guide provides best practices for database activity monitoring and explains a step by step process for prioritizing data and protecting transactions.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

IBM

SANS Institute Making Database Security an IT Security Priority
sponsored by Oracle Corporation
WHITE PAPER: Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security.
Posted: 13 Jun 2011 | Published: 30 Nov 2009

Oracle Corporation

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK
sponsored by Idera
WHITE PAPER: This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks.
Posted: 31 Jan 2012 | Published: 31 Jan 2012

Idera

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Big data in the cloud: How to reduce data center infrastructure costs
sponsored by SearchCloudComputing.com
WHITE PAPER: How can cloud computing help companies in the new world of big data? This expert handbook looks at some possible answers to this question.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

SearchCloudComputing.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement