IT Management  >   Systems Operations  >   Security  >  

Database Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Oracle Security, Database Protection, SAP Security, SQL Server Security, Data Base Security, Database Administration Security
DEFINITION: The protection of a database from malicious attacks or accidental changes.
Database SecurityReports
101 - 125 of 208 Matches Previous Page  | Next Page
E-Guide: Database Tools for Auditing and Forensics
sponsored by SearchSecurity.com
EGUIDE: This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

SearchSecurity.com

Reducing PCI DSS Scope: The Gateway Approach
sponsored by Intel
WHITE PAPER: This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.
Posted: 04 Apr 2011 | Published: 31 Mar 2011

Intel

Introducing Oracle Exadata Database Machine X2-8
sponsored by Oracle Corporation
PODCAST: Oracle has recently introduced the new Exadata Database Machine X-28. Listen to this podcast featuring Ron Weiss to learn more about this new product and how it can enhance your company.
Posted: 21 Mar 2011 | Premiered: Mar 18, 2011

Oracle Corporation

Presentation Transcript:  Deploying Database Activity Monitoring
sponsored by IBM
PRESENTATION TRANSCRIPT: Database Activity Monitoring tools offer an unparalleled ability to protect sensitive assets without interfering with business processes. This presentation transcript of the video “Deploying Database Activity Monitoring,”  will teach you how to determine the best use cases for DAM, what you need to protect and how to select a deployment model.
Posted: 11 Mar 2011 | Published: 11 Mar 2011

IBM

Log Management Best Practices: Six Tips for Success
sponsored by Novell, Inc.
EGUIDE: The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.
Posted: 11 Mar 2011 | Published: 11 Mar 2011

Novell, Inc.

How Secure Is Your Data? Enhancing Data Security And Compliance With Oracle Database 11g
sponsored by Miro Consulting, Inc.
PRESENTATION TRANSCRIPT: Most organizations suffer from data security vulnerabilities within their databases. In addition to the need for securing business data, regulations across industries demand compliance with standards regarding data access, auditing, segregation of duties and the protection of personally identifiable information (PII).
Posted: 22 Feb 2011 | Published: 22 Feb 2011

Miro Consulting, Inc.

Database Security Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Top Ten Database Security Threats
sponsored by Imperva
WHITE PAPER: The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten as identified by Imperva’s Application Defense Center.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Choosing a Cloud Provider with Confidence
sponsored by GeoTrust, Inc.
WHITE PAPER: The goal of this paper is to help enterprises make decisions about where and when to use cloud solutions by outlining issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
Posted: 02 Feb 2011 | Published: 02 Feb 2011

GeoTrust, Inc.

Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security
sponsored by Trend Micro, Inc.
WHITE PAPER: An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

Trend Micro, Inc.

Presentation Transcript: Protect Data and Client Trust - An End-to-End Approach to Protecting Your Client Applications and Organizations
sponsored by IBM
PRESENTATION TRANSCRIPT: This presentation transcript of the webcast “Protect Data and Client Trust: An End-to-End Approach to Protecting Your Client Applications and Organizations” outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

IBM

Locking Down Your Enterprise: What You Need to Know About Database Security Inside and Outside Your Company
sponsored by Oracle Corporation
EBOOK: This e-Book will take a look at how database managers can evolve their security strategies to match the increasingly sophisticated technologies used by hackers to attack their mission critical data.
Posted: 30 Dec 2010 | Published: 30 Dec 2010

Oracle Corporation

NETGEAR ProSecure STM150 Helps Prepress Solutions Provider Double its Sales Prospects
sponsored by NETGEAR Inc.
CASE STUDY: Agfa Graphics is a world leader in prepress solutions for the printing and publishing industries. Read this case study to learn how they maximize productivity gains from virtualization technology, without sacrificing network security with NETGEAR ProSecure STM150.
Posted: 17 Dec 2010 | Published: 17 Dec 2010

NETGEAR Inc.

DATA Act Protection: Effects of a Federal Breach Notification Law
sponsored by CDW Corporation
EGUIDE: This E-Guide examines new reporting requirements and how your organization will have to report a breach to the FTC and what new steps you’ll have to institute to comply.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

CDW Corporation

Protect data & client trust: an end to end approach to protecting your applications & organization
sponsored by IBM
WEBCAST: This presentation outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.
Posted: 06 Dec 2010 | Premiered: Dec 6, 2010

IBM

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download)
sponsored by IBM
EBOOK: Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

IBM

Tips on Implementing Database Auditing to Address Security & Compliance Requirements 
sponsored by IBM
BOOK: Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors. You can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements.
Posted: 03 Dec 2010 | Published: 03 Dec 2010

IBM

Presentation Transcript: Challenges of Securing a Smarter Planet
sponsored by IBM
PRESENTATION TRANSCRIPT: In this presentation transcript of the webcast “Challenges of Securing a Smarter Planet,” IBM Rational's Worldwide Security Executive, Jack Danahy, discusses the changing security landscape and offers guidance to teams looking for the right place to start, and missteps to avoid.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

IBM

What’s cool about columns -- and how to extend their benefits
sponsored by Infobright, Inc.
WHITE PAPER: This paper will define what column-based relational databases do and how they do it, and where they have advantages (and disadvantages) compared to traditional approaches. This in turn will lead to a discussion of the sort of environments for which columns are best suited.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Infobright, Inc.

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS)
sponsored by TITUS
WHITE PAPER: This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites.
Posted: 12 Nov 2010 | Published: 12 Nov 2010

TITUS

Using Windows File Classification Infrastructure to Classify and Protect Documents
sponsored by TITUS
WHITE PAPER: This white paper describes how organizations can leverage the File Classification Infrastructure and partner solutions to identify the business value of data, raise security awareness, and protect information assets.
Posted: 11 Nov 2010 | Published: 11 Nov 2010

TITUS

eBook: The Shortcut Guide to User Workspace Management - Chapter 4: Transforming to an Environment of User Workspace Management
sponsored by RES Software
EBOOK: You’ve already come to understand the workspace itself, and how that workspace can be made pervasive across the spectrum of delivery mechanisms.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

RES Software

E-Book: Data Protection Plans for Complying with Privacy Laws
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!
Posted: 21 Oct 2010 | Published: 21 Oct 2010

SearchSecurity.com & SearchCompliance.com

Backup and Recovery Performance and Best Practices for Exadata Cell and the Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: One of the key operational aspects of deploying a Sun Oracle Database Machine is to ensure that database backups are performed and restoration of the Oracle Database is possible if disaster strikes. This paper describes the best practices for setting up the optimal backup and recovery strategy to protect your mission-critical data.
Posted: 07 Oct 2010 | Published: 30 Jun 2010

Oracle Corporation
101 - 125 of 208 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement