IT Management  >   Systems Operations  >   Security  >  

Database Protection

RSS Feed    Add to Google    Add to My Yahoo!
Database Protection Reports
 
Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications
sponsored by SearchSecurity.com
WHITE PAPER: Implementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

SearchSecurity.com

Taming the beast: Data protection in 2014 & beyond
sponsored by TechTarget
RESOURCE: In this epic time of data breaches, are you doing enough to ensure protection? By contributing to this brief, 5 minute survey, you'll gain immediate access to an expert resource on top data protection tips that will help you answer that question and establish an effective security strategy for the future.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

8 Best Practices for Securing Enterprise Data Sources and Achieving Compliance
sponsored by IBM
WHITE PAPER: This informative white paper explains why organizations need to adopt a more proactive, systematic approach to securing sensitive data and addressing compliance requirements amid the digital information explosion.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

The future of digital forensics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Webroot  Endpoint Security eBook
sponsored by Webroot
EBOOK: This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot

Oracle Data Mining 11g Release 2 Competing on In-Database Analytics
sponsored by Oracle Corporation
WHITE PAPER: This paper offers an overview of Oracle Data Mining, detailing how you can build predictive models to better target customers, develop detailed customer profiles and detect and prevent fraud. Read on and learn how this data mining tool eliminates data extraction and movement, delivers the lowest TCO compared to traditional vendors and more.
Posted: 03 Jul 2012 | Published: 24 Jun 2012

Oracle Corporation

Oracle Advanced Security with Oracle Database 11g Release 2
sponsored by Oracle Corporation
WHITE PAPER: This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
Posted: 08 Jun 2011 | Published: 31 Oct 2010

Oracle Corporation

Taking the fear out of bringing Government Systems online
sponsored by IBM
WHITE PAPER: People are quickly navigating to a more mobile environment and many individuals are urging government agencies to develop online services. In the past, certain aspects of online sharing have caused government agencies to hesitate, but this white paper helps outline some of the benefits of online systems.
Posted: 27 Dec 2012 | Published: 24 Jul 2012

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Presentation Transcript: New Releases from Intel and IBM offer Breakthrough Database Performance
sponsored by Intel and IBM
PRESENTATION TRANSCRIPT: Read this presentation transcript now and learn about these advances that are possible by combining the Intel Xeon processor E5-2600 product family with IBM DB2 10 for Linux, Unix and Windows.
Posted: 30 Apr 2012 | Published: 17 Apr 2012

Intel and IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement