IT Management  >   Systems Operations  >   Security  >  

Database Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Oracle Security, Database Protection, SAP Security, SQL Server Security, Data Base Security, Database Administration Security
DEFINITION: The protection of a database from malicious attacks or accidental changes.
Database Security Reports
1 - 25 of 231 Matches Previous Page  |  Next Page
Onapsis Research Labs: SAP Systems Security Analysis
sponsored by Onapsis
WHITE PAPER: This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 22 Aug 2016 | Published: 29 Feb 2016

Onapsis

ESG Instagraphic: Integration with EMC Data Domain and EMC Avamar
sponsored by Richardson Eyres
WHITE PAPER: Access this infographic from ESG Lab Validation to find out how you can gain performance, scalability, reliability, and deduplication benefits for your data backups and how this same technology can enable protection of your entire environment.
Posted: 29 Jul 2016 | Published: 30 Oct 2015

Richardson Eyres

Extend Your Storage Options without Compromising on Security, Reliability
sponsored by BT
WHITE PAPER: Cloud-based object storage ensures data delivery, provides enhanced security and durability that cloud storage solutions typically do not offer. Discover the benefits your enterprise can reap with this storage solution, including easy data migration, automated data replication, and more.
Posted: 29 Jul 2016 | Published: 31 Dec 2014

BT

Definitive Guide: Securing the Mobile Enterprise
sponsored by Aruba Networks
WHITE PAPER: While mobility and IoT offer potential rewards for organizations the thought of all of these unknown devices connecting to the network can be worrisome for security and IT managers This informational white paper offers an outline for the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT.
Posted: 15 Jul 2016 | Published: 15 Jul 2016

Aruba Networks

How to Secure Your Oracle Database 12c
sponsored by Oracle Corporation
WEBCAST: In this webcast, discover how to handle attacks on your Oracle database with preventive, detective, and administrative security controls, as well as how to employ a stratified data protection strategy. Also find out how Epsilon takes care of their data—both improving business for its customers and for database performance, security, and reporting.
Posted: 13 Jul 2016 | Premiered: Dec 31, 2015

Oracle Corporation

Best Practices for Deploying Data Protection Solutions
sponsored by TechTarget
RESOURCE: Check out this guide to review some of the challenges associated with deploying data protection technology and highlights some of the initial pitfalls encountered by early adopters. But not only that, read solutions on how to better manage your data protection.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

TechTarget

Information Security ANZ July 2016
sponsored by SearchSecurity.com
EZINE: Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

SearchSecurity.com

Learn How to Choose the Right Database for the Job
sponsored by IBM
WHITE PAPER: Learn about the process of selecting and deploying the right multi-database solution for you. Uncover 7 types of open source databases and tools. Plus, gain access to a complimentary 30-day trial of IBM's Compose Enterprise multi-DB toolkit.
Posted: 29 Jun 2016 | Published: 29 Jun 2016

IBM

10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments
sponsored by SIOS Technology Corp
WHITE PAPER: Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.
Posted: 28 Jun 2016 | Published: 15 Apr 2014

SIOS Technology Corp

Malware Hitching a Ride on Mobile Apps?
sponsored by SearchSecurity.com
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

SearchSecurity.com

Reach New Heights Using Data with Microsoft SQL Modernization and Migration
sponsored by Hewlett Packard Enterprise
BROCHURE: Learn best practices for ensuring a smooth migration to SQL Server. Also discover how to glean insights from big data and use your new SQL Server capabilities to achieve greater performance, security, availability, and more.
Posted: 23 Jun 2016 | Published: 31 Dec 2015

Hewlett Packard Enterprise

Modern Storage Strategies for SQL Server
sponsored by Tegile
ESSENTIAL GUIDE: Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.
Posted: 25 May 2016 | Published: 31 May 2016

Tegile

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Gemalto
WHITE PAPER: This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.
Posted: 24 May 2016 | Published: 24 May 2016

Gemalto

Coalfire: Cloud & Data Center Security Solution to meet PCI DSS 3.1 Compliance
sponsored by TrendMicro
WHITE PAPER: In this paper, Coalfire examines the applicability of a security platform in regards to PCI DSS when used in physical or cloud environments. Access now for deep analysis on this security platform and for more PCI DSS compliance standards.
Posted: 24 May 2016 | Published: 31 Oct 2015

TrendMicro

Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform
sponsored by Gemalto
WHITE PAPER: With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

A Best Practice Approach to Database Backup and Recovery
sponsored by Veritas
WHITE PAPER: Examine a backup tool that improves visibility, compliance, and data protection and enforces better communication between the backup admin and database admin (DBA). Learn how your enterprise can eliminate the risk of losing time, data and money with a simplified, well-coordinated database backup and recovery solution.
Posted: 19 May 2016 | Published: 19 May 2016

Veritas

SQL Server 2016: Mission-Critical Performance
sponsored by Microsoft
WHITE PAPER: In this white paper, learn how the most recent versions of SQL Server provide advanced security, availability, scalability, and performance capabilities that meet the data needs of modern, global organizations, and the potential cost impacts of this functionality.
Posted: 28 Apr 2016 | Published: 31 May 2015

Microsoft

Gartner Market Guide for Data-Centric Audit and Protection (DCAP).
sponsored by IBM
WHITE PAPER: Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015

IBM

Medical Management solutions technical case study V0.1
sponsored by Cintra/Oracle
CASE STUDY: When medical billing services provider, Medical Management, needed to upgrade their legacy Oracle database architecture they turned to this trusted Oracle partner for help. Discover how the organization was able to facilitate a smooth transition for Medical Management to boost database performance quickly and easily.
Posted: 06 Apr 2016 | Published: 06 Apr 2016

Cintra/Oracle

How Memory and Storage Technologies Are Transforming Enterprise Computing
sponsored by Micron Technology
WHITE PAPER: The ability to successfully manipulate, analyze, utilize and protect data is the key competitive differentiator of today's business era. Learn how you can leverage innovation to your advantage and current trends in memory and storage.
Posted: 28 Mar 2016 | Published: 16 Mar 2016

Micron Technology

Case Study: Revolutionizing Healthcare Analytics and Transforming User Experience
sponsored by Cintra/Oracle
CASE STUDY: This case study discusses how HANY, a healthcare organization, updated their Oracle database architecture with the help of a managed service provider. Find out how they were able to enhance their database security and management, and gain valuable insight into their data.
Posted: 14 Mar 2016 | Published: 14 Mar 2016

Cintra/Oracle

Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

Surfing the flash flood of data growth
sponsored by ComputerWeekly.com
ANALYST REPORT: The rate of exponential growth in single databases is eclipsed by the overall rate of data growth. Analyst Clive Longbottom explains how you can survive the deluge.
Posted: 09 Mar 2016 | Published: 11 Mar 2016

ComputerWeekly.com

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky

Encryption-at-Rest: Keep Inactive Data Protected
sponsored by Rackspace
RESOURCE CENTER: Learn how to protect inactive data with an encryption-at-rest solution.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

Rackspace
1 - 25 of 231 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement