IT Management  >   Systems Operations  >   Security  >  

Database Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Oracle Security, Database Protection, SAP Security, SQL Server Security, Data Base Security, Database Administration Security
DEFINITION: The protection of a database from malicious attacks or accidental changes.
Database Security Reports
1 - 25 of 220 Matches Previous Page  |  Next Page
Oracle MAA Reference Architectures
sponsored by Oracle Corporation
WHITE PAPER: View this informative white paper for a detailed discussion of four high availability reference architecture and the accompanying service level objectives that can be achieved.
Posted: 27 Apr 2015 | Published: 01 Jul 2014

Oracle Corporation

Lab Report: SIOS DataKeeper Replication for Windows Clusters
sponsored by SIOS Technology Corp
RESOURCE: Access this extensive study to learn just how effective DataKeeper is in an SQL Server 2012 environment. Discover how this software performed when cluster nodes failed. Read now to delve deeper into DataKeeper's implementation, and set up process to determine if it could help your organization with their data replication needs.
Posted: 20 Apr 2015 | Published: 31 Dec 2014

SIOS Technology Corp

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Point-of-Sale Security for Dummies
sponsored by Bit9 + Carbon Black
RESOURCE: Access this popular resource to find out how you can protect transactions at the point of sale.
Posted: 13 Apr 2015 | Published: 13 Apr 2015

Bit9 + Carbon Black

Internet System for Tracking Over-Prescribing (I-Stop) FAQ
sponsored by Imprivata
WHITE PAPER: Access this white paper to find out about frequently asked questions regarding software that tracks over-prescribing. Read on to learn more about the laws and regulations, software and data requirements, and more.
Posted: 10 Apr 2015 | Published: 10 Apr 2015

Imprivata

ESG Lab Validation: Enterprise Storage for Performance-driven Databases
sponsored by NetApp
WHITE PAPER: This ESG Lab Report documents the real world performance, reliability, availability, and serviceability of NetApp EFSeries flash arrays in Oracle database environments. A combination of hands on testing by ESG Lab and audited inhouse performance testing executed by NetApp were used to create this report.
Posted: 22 Mar 2015 | Published: 22 Mar 2015

NetApp

Five Steps For Securing The Data Center
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper presents five essential steps to securing your database without sacrificing the high performance of modern data centers.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.

4 Steps to Address Vulnerabilities Before a Breach
sponsored by IBM
WHITE PAPER: This white paper addresses how vulnerabilities can go undetected and gives you advice for mitigating these vulnerabilities.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

IBM

Data protection for big data environments
sponsored by IBM
WHITE PAPER: Access this exclusive interview to learn how you can design real-time, business-driven data protection policies across your enterprise. Read on to gain more insight into big data analytics and security in six distinct sections.
Posted: 12 Mar 2015 | Published: 31 Mar 2014

IBM

Experiences from the Field - Detailed Data Security Case Study
sponsored by IBM
VIDEO: Watch this exclusive video to hear from Product Marketing integration and governance specialist, Jeff Scheepers of IBM to learn more about the new emphasis being placed on database security in today's business landscape. Continue to watch hear about industry leaders' security issues and how they were able to resolve them.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM

Database Vulnerability Assessment Tool: Determine the Efficacy of Your Database Protection System
sponsored by IBM
ASSESSMENT TOOL: Access this vulnerability assessment evaluation package which provides you with a simple tool that you can download for free, set up easily, and use to explore the benefits of database vulnerability assessment without the overhead of an enterprise deployment.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

IBM

Top Three Myths about Big Data Security
sponsored by IBM
WHITE PAPER: In this informative white paper get the top 3 myths about big data security that are preventing companies effectively securing their big data. Read on to learn how you can implement an effective big data security system to protect your valuable customer data.
Posted: 11 Mar 2015 | Published: 31 Oct 2012

IBM

Understanding the Data Security Risk – New Findings Revealed
sponsored by IBM
WHITE PAPER: In this webcast, discover how to defend the 4 types of data hackers want to steal using a simple framework as a foundation for your security strategy. View now to learn more.
Posted: 11 Mar 2015 | Published: 04 Feb 2015

IBM

Protecting your Organization’s Most Valuable Data
sponsored by IBM
WEBCAST: This webcast delves into how to find out the source of database information attacks. Watch now to explore multiple case studies of security breaches and how one data protection platform simplifies detecting and blocking rogue users.
Posted: 11 Mar 2015 | Premiered: Jan 15, 2015

IBM

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

The Executive Breach Blanket: 7 Steps to Safeguard Your Corporate Data
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper contains an effective 7-step process for ensuring that your business is ready to respond to data breaches.
Posted: 10 Feb 2015 | Published: 10 Feb 2015

Hewlett-Packard Company

Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Cost effective cloud backup and recovery model
sponsored by Asigra
WEBCAST: There's been a lot of talk about the recently launched Recovery License Model (RLM), but how does it work?  What does it mean to someone in the backup and recovery industry?
Posted: 11 Aug 2014 | Premiered: Dec 2, 2013

Asigra

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DBAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Computer Weekly – 9 December 2014: The most influential people in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

ComputerWeekly.com

Information Security Magazine – July/August 2014
sponsored by SearchSecurity.com
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchSecurity.com

Download a Free Trial of SQL Safe Backup
sponsored by Idera
SOFTWARE DOWNLOAD: Learn about the key features of SQL Safe Backup – and find out how you can gain access to a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera
1 - 25 of 220 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement