IT Management  >   Systems Operations  >   Security  >  

Database Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Oracle Security, Database Protection, SAP Security, SQL Server Security, Data Base Security, Database Administration Security
DEFINITION: The protection of a database from malicious attacks or accidental changes.
Database Security Reports
1 - 25 of 219 Matches Previous Page  |  Next Page
Help Your Database Run at Top Speed, Not Out of Gas
sponsored by TechTarget
RESOURCE: In-memory processing, big data applications and NoSQL technologies are pushing traditional database systems to the limit. To make it today, they need to run at top speed. Access our exclusive guide, Help Your Database Run at Top Speed, Not Out of Gas, and learn how to boost your performance management planning.
Posted: 05 Oct 2015 | Published: 05 Oct 2015


Top Ten Database Threats
sponsored by Imperva
WHITE PAPER: Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


Comprehensive Security for Your Valuable Data
sponsored by Trustwave
WHITE PAPER: This white paper explains how you can implement strong database security that will keep the hackers out.
Posted: 01 Oct 2015 | Published: 31 Dec 2014


High Availability and Data Protection with Scale-out NAS
sponsored by SI Systems
WHITE PAPER: Access this document to learn how scale-out NAS solutions can be used as a new approach to file storage and meet availability, protection, and performance requirements of Big Data. Read on to see the many benefits this NAS solution can provide your enterprise.
Posted: 25 Sep 2015 | Published: 31 Mar 2015

SI Systems

15 Qualities to Look for in SAP/SAP HANA Data Protection
sponsored by EMC
WHITE PAPER: This white paper explores fifteen qualities that organizations look for in backup and disaster recovery solutions for SAP/SAP HANA loads.
Posted: 24 Sep 2015 | Published: 31 Dec 2014


How Keeps Its Website Humming 24/7/365
sponsored by Dell Software
WHITE PAPER: In this white paper, learn how online travel company experiences 99.9% website uptime and seamless upgrades and migrations with reliable replication and proactive monitoring.
Posted: 24 Sep 2015 | Published: 30 Jun 2015

Dell Software

How you can defend against criminal attacks originating from the Deep Web
sponsored by IBM
WHITE PAPER: This white paper explores the depths of the Deep Web, using attack data to examine what kinds of attacks originate there and how you can defend against them.
Posted: 09 Sep 2015 | Published: 31 Jul 2015


Dell XC Web-Scale Converged Appliance for VMware® Horizon View™
sponsored by Dell, Inc.
WHITE PAPER: This white paper outlines how to configure virtual desktop so that you can achieve maximum data protection. Read on to learn more about how to design full-clone persistent virtual desktops.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Dell, Inc.

How to Use SSL with Cloud Databases
sponsored by Rackspace
WHITE PAPER: This white paper explains how Secure Socket Layer protection (SSL) is now being used to encrypt data on all Cloud Database instances. Read on to see how ensure that your cloud data is encrypted in-transit.
Posted: 28 Aug 2015 | Published: 22 Oct 2014


ESG Brief: Enhancing Database Environments with NetApp Storage
sponsored by NetApp
WHITE PAPER: Whether planning for a major upgrade of existing databases or considering a net new project, enterprise solution architects should realize that the storage capabilities will matter. NetApp's systems, software, and services offer a number of advantages as a foundation for better operational results.
Posted: 13 Jul 2015 | Published: 31 Dec 2014


4 Steps to Securing Your Data: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: This valuable resource discusses 4 steps you can take to find and address your database vulnerabilities and avoid a data breach.
Posted: 27 Jan 2015 | Published: 31 Dec 2014


How ObjectRocket Gives Free Backups to Everyone
sponsored by Rackspace
WHITE PAPER: When anyone in the community loses data, everyone in the community feels the effects. Fortunately, for MongoDB users, free backup that's not an add-on or an upcharge is possible to achieve. Learn how it's possible to back up data at a secure location completely free of charge as you read this resource.
Posted: 19 Sep 2014 | Published: 11 Aug 2014


Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Cost effective cloud backup and recovery model
sponsored by Asigra
WEBCAST: There's been a lot of talk about the recently launched Recovery License Model (RLM), but how does it work?  What does it mean to someone in the backup and recovery industry?
Posted: 11 Aug 2014 | Premiered: Dec 2, 2013


Download a Free Trial of SQL Safe Backup
sponsored by Idera
SOFTWARE DOWNLOAD: Eliminate application downtime. Learn about the key features of SQL Safe Backup – and gain full access to a 14 day free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014


Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

CW Europe – May 2015
sponsored by
EZINE: In this issue, CW Europe's security editor investigates whether the legislation could strangle Europe's productivity and whether businesses see the regulations as a burden.
Posted: 07 May 2015 | Published: 07 May 2015

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Point-of-Sale Security for Dummies
sponsored by Bit9 + Carbon Black
RESOURCE: Access this popular resource to find out how you can protect transactions at the point of sale.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Bit9 + Carbon Black

Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015


Information Security ASEAN March 2015
sponsored by
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014


Computer Weekly – 9 December 2014: The most influential people in UK IT
sponsored by
EZINE: In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013


Information Security Magazine – July/August 2014
sponsored by
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014
1 - 25 of 219 Matches Previous Page    1 2 3 4    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement