IT Management  >   Systems Operations  >   Security  >  

Database Administration Security

RSS Feed    Add to Google    Add to My Yahoo!
Database Administration SecurityReports
 
Is your customer's data well protected?
sponsored by Informatica
CASE STUDY: Access this informative case study now to uncover the key features of a database protection tool to ensure your solid business reputation remains intact.
Posted: 06 May 2014 | Published: 31 Dec 2013

Informatica

TELUS leverages HP ArcSight and TippingPoint - Managed security service provider builds intelligentanalysis on tightly integrated HP solution
sponsored by Hewlett-Packard Limited
WHITE PAPER: This resource explains the reasoning behind MSSPs and how they help prevent cybercrime.
Posted: 10 Jun 2014 | Published: 01 Sep 2013

Hewlett-Packard Limited

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Achieving High Oracle Performance
sponsored by Dell Software
WHITE PAPER: In an ever-changing world, DBAs are managing more complex, business-critical systems. With demands of high performance and around-the-clock uptime, how can they keep providing maximum service levels? Advanced performance management is the answer. Learn more – read this Dell Software white paper.
Posted: 07 May 2014 | Published: 19 Aug 2013

Dell Software

An Information Architecture Vision
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The Open Group assesses the "big data" problem and offers an Enterprise Information Planning and Architecture Model to help organisations make the most of their information.
Posted: 07 Jun 2013 | Published: 07 Jun 2013

ComputerWeekly.com

Secure File Transfer Tech Guide
sponsored by SearchSecurity.com
EGUIDE: Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

SearchSecurity.com

SearchSecurity.com E-Guide: 5 Simple Steps to Secure Database Development
sponsored by IBM
EGUIDE: Databases and the information they hold are always an attractive target for hackers looking to exploit weaknesses in database applications. This expert e-guide explains the 5 most common database-related vulnerabilities and offers technical advice on how to avoid them.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

Manage data security and application threats with a muli-tiered approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Reducing PCI DSS Scope: The Gateway Approach
sponsored by Intel
WHITE PAPER: This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.
Posted: 04 Apr 2011 | Published: 31 Mar 2011

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement