IT Management  >   Systems Operations  >   Security  >  

Database Protection

RSS Feed    Add to Google    Add to My Yahoo!
Database Protection Reports
 
The Real World of the Database Administrator
sponsored by Dell Software
WHITE PAPER: Discover the ways in which database administrators (DBAs) are seeking to get more valuable information out of their relational databases. Learn the top challenges facing DBAs.
Posted: 11 May 2015 | Published: 31 Mar 2015

Dell Software

Next Generation Security for Virtualized Datacenters
sponsored by BitDefender
WHITE PAPER: In this white paper, discover what a virtual environment needs in order to maintain its security.
Posted: 28 Apr 2015 | Published: 28 Apr 2015

BitDefender

Document Storage: 7 Must-Have Features for Superior Performance
sponsored by Actuate
WHITE PAPER: Organizations that produce high-volume customer communications must employ electronic archives to securely store content. This white paper lays out performance-enhancing features found in state-of-the-art enterprise document storage systems. Discover performance-enhancing features all archives should possess.
Posted: 01 May 2015 | Published: 01 May 2015

Actuate

The continuum of protection solutions for Microsoft
sponsored by EMC Corporation
WHITE PAPER: Data in this white paper. Learn the top 10 ways you can protect your data and improve your database performance.
Posted: 15 Jun 2015 | Published: 31 Dec 2014

EMC Corporation

Cost effective cloud backup and recovery model
sponsored by Asigra
WEBCAST: There's been a lot of talk about the recently launched Recovery License Model (RLM), but how does it work?  What does it mean to someone in the backup and recovery industry?
Posted: 11 Aug 2014 | Premiered: Dec 2, 2013

Asigra

Security University: Database Security Issues
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: The start of many data security issues is, of course, the database. Here's a look at currently predominant types of database security vulnerabilities and how best to monitor database access to detect potential security incidents.
Posted: 10 Jun 2013 | Premiered: 10 Jun 2013

SearchSecurity.com

A Proactive Approach to Compliance, Security and Audit
sponsored by IBM
WEBCAST: This exclusive resource examines an integrated solution for automating the complete security and compliance lifestyle across your entire database infrastructure.
Posted: 31 Jul 2013 | Premiered: Jul 31, 2013

IBM

Secure File Transfer Tech Guide
sponsored by SearchSecurity.com
EGUIDE: Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

SearchSecurity.com

Webroot Secure Anywhere Business - Mobile Protection
sponsored by Webroot
WHITE PAPER: Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot

How to keep your confidential information safe
sponsored by Informatica
DATA SHEET: Access this concise resource to uncover the key features of a data masking tool, to ensure the security of your organization's reputation and confidential information.
Posted: 08 May 2014 | Published: 31 Dec 2013

Informatica
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement