IT Management  >   Systems Operations  >   Security  >  

Data Base Security

RSS Feed    Add to Google    Add to My Yahoo!
Data Base Security Reports
 
Don't Rush into Cloud Databases without a Well-Grounded Plan
sponsored by Data Intensity
EGUIDE: In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.
Posted: 17 Apr 2017 | Published: 07 Apr 2017

Data Intensity

Ctac Drives Competitive Advantage with Real-Time Cloud Apps on SAP HANA
sponsored by IBM
CASE STUDY: Ctac, an ICT solution provider and SAP Value Added Reseller, wanted to enable its customers to gain the advantages of real-time analytics, without imposing high, up-front investments in new infrastructure. Access this case study to learn how they achieved this goal with a scalable, flexible cloud infrastructure for S/4HANA.
Posted: 02 Nov 2016 | Published: 02 Nov 2016

IBM

Data Protection Steps for Ransomware
sponsored by TechTarget
RESOURCE: Forrester Research predicts that ransomware attacks and privacy breaches will escalate in 2017. That means organizations without ransomware protection are taking a huge risk. Access our new guide, Two Quick Data Protection Steps for Ransomware, and find out why it's more important than ever to be proactive in the fight against this epidemic.
Posted: 03 Apr 2017 | Published: 03 Apr 2017

TechTarget

Presentation Transcript: New Releases from Intel and IBM offer Breakthrough Database Performance
sponsored by Intel and IBM
PRESENTATION TRANSCRIPT: Read this presentation transcript now and learn about these advances that are possible by combining the Intel Xeon processor E5-2600 product family with IBM DB2 10 for Linux, Unix and Windows.
Posted: 30 Apr 2012 | Published: 17 Apr 2012

Intel and IBM

Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention
sponsored by Intel Security
WHITE PAPER: While databases are the warehouses of the most valuable information assets in the enterprise, many organizations today do poorly to protect them. In this paper, discover how to protect your database and data assets with McAfee Database Security Solution, a multi-tiered solution that can help defend against threats and eliminate vulnerabilities.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Intel Security

Learn How to Choose the Right Database for the Job
sponsored by IBM
WHITE PAPER: Learn about the process of selecting and deploying the right multi-database solution for you. Uncover 7 types of open source databases and tools. Plus, gain access to a complimentary 30-day trial of IBM's Compose Enterprise multi-DB toolkit.
Posted: 29 Jun 2016 | Published: 29 Jun 2016

IBM

Customers Discuss Oracle Database Security
sponsored by Oracle Corporation
WEBCAST: Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.
Posted: 24 May 2012 | Premiered: May 24, 2012

Oracle Corporation

New data management tool will protect your nonproduction environments
sponsored by Informatica
DATA SHEET: Access this exclusive datasheet now to uncover the data management tool for nonproduction environments, as well as its key features and benefits.
Posted: 02 May 2014 | Published: 04 Aug 2011

Informatica

Data Masking Best Practices for Copying Sensitive Data Into Non-Production Environments
sponsored by Oracle Corporation
WHITE PAPER: Download this paper to learn data masking best practices and enable your organization to safely use production data for development, testing, and sharing with out-source or off-shore partners, without risking a sensitive data breach.
Posted: 05 Dec 2011 | Published: 05 Dec 2011

Oracle Corporation

Secure File Transfer Tech Guide
sponsored by SearchSecurity.com
EGUIDE: Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement