IT Management  >   Systems Operations  >   Security  >  

Database Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Oracle Security, Database Protection, SAP Security, SQL Server Security, Data Base Security, Database Administration Security
DEFINITION: The protection of a database from malicious attacks or accidental changes.
Database Security Reports
126 - 150 of 220 Matches Previous Page  |  Next Page
NETGEAR ProSecure STM150 Helps Prepress Solutions Provider Double its Sales Prospects
sponsored by NETGEAR Inc.
CASE STUDY: Agfa Graphics is a world leader in prepress solutions for the printing and publishing industries. Read this case study to learn how they maximize productivity gains from virtualization technology, without sacrificing network security with NETGEAR ProSecure STM150.
Posted: 17 Dec 2010 | Published: 17 Dec 2010


DATA Act Protection: Effects of a Federal Breach Notification Law
sponsored by CDW Corporation
EGUIDE: This E-Guide examines new reporting requirements and how your organization will have to report a breach to the FTC and what new steps you’ll have to institute to comply.
Posted: 07 Dec 2010 | Published: 07 Dec 2010

CDW Corporation

Protect data & client trust: an end to end approach to protecting your applications & organization
sponsored by IBM
WEBCAST: This presentation outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.
Posted: 06 Dec 2010 | Premiered: Dec 6, 2010


HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download)
sponsored by IBM
EBOOK: Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles.
Posted: 03 Dec 2010 | Published: 03 Dec 2010


Tips on Implementing Database Auditing to Address Security & Compliance Requirements 
sponsored by IBM
BOOK: Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors. You can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements.
Posted: 03 Dec 2010 | Published: 03 Dec 2010


Presentation Transcript: Challenges of Securing a Smarter Planet
sponsored by IBM
PRESENTATION TRANSCRIPT: In this presentation transcript of the webcast “Challenges of Securing a Smarter Planet,” IBM Rational's Worldwide Security Executive, Jack Danahy, discusses the changing security landscape and offers guidance to teams looking for the right place to start, and missteps to avoid.
Posted: 01 Dec 2010 | Published: 01 Dec 2010


What’s cool about columns -- and how to extend their benefits
sponsored by Infobright, Inc.
WHITE PAPER: This paper will define what column-based relational databases do and how they do it, and where they have advantages (and disadvantages) compared to traditional approaches. This in turn will lead to a discussion of the sort of environments for which columns are best suited.
Posted: 16 Nov 2010 | Published: 16 Nov 2010

Infobright, Inc.

Integrating Information Labeling and Microsoft Active Directory Rights Management Services (AD RMS)
sponsored by TITUS
WHITE PAPER: This white paper examines the challenges of content protection and user acceptance of content protection technology. It provides an overview of Microsoft's Active Directory Rights Management Services (AD RMS) and its integration with Titus' Document Classification and Message Classification product suites.
Posted: 12 Nov 2010 | Published: 12 Nov 2010


Using Windows File Classification Infrastructure to Classify and Protect Documents
sponsored by TITUS
WHITE PAPER: This white paper describes how organizations can leverage the File Classification Infrastructure and partner solutions to identify the business value of data, raise security awareness, and protect information assets.
Posted: 11 Nov 2010 | Published: 11 Nov 2010


eBook: The Shortcut Guide to User Workspace Management - Chapter 4: Transforming to an Environment of User Workspace Management
sponsored by RES Software
EBOOK: You’ve already come to understand the workspace itself, and how that workspace can be made pervasive across the spectrum of delivery mechanisms.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

RES Software

E-Book: Data Protection Plans for Complying with Privacy Laws
sponsored by &
EBOOK: This e-book, brought to you by and, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!
Posted: 21 Oct 2010 | Published: 21 Oct 2010 &

Backup and Recovery Performance and Best Practices for Exadata Cell and the Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: One of the key operational aspects of deploying a Sun Oracle Database Machine is to ensure that database backups are performed and restoration of the Oracle Database is possible if disaster strikes. This paper describes the best practices for setting up the optimal backup and recovery strategy to protect your mission-critical data.
Posted: 07 Oct 2010 | Published: 30 Jun 2010

Oracle Corporation

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine

Improved network security with IP and DNS reputation
sponsored by Hewlett-Packard Company
WHITE PAPER: As cyber threats across the globe continue to increase in number and sophistication, security and networking personnel must not only work harder but also smarter to stay ahead of malicious attacks. Download this paper from HP Networking to learn how to defend IT assets and business reputation.
Posted: 30 Sep 2010 | Published: 30 Sep 2010

Hewlett-Packard Company

Implementing Database Security and Auditing: Using Granular Access Control
sponsored by Guardium, an IBM Company
WHITE PAPER: In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system.
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Guardium, an IBM Company

Managing the Entire Database Security & Compliance Lifecycle with IBM InfoSphere Guardium
sponsored by IBM
WHITE PAPER: Read this paper to find out what solutions optimize operational efficiency with a scalable, multi-tier architecture that automates and centralizes compliance controls across your entire application and database infrastructure.
Posted: 27 Sep 2010 | Published: 27 Sep 2010


Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010


Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva
WHITE PAPER: For each threat, the paper describes background information, general risk mitigation strategies, and the database protection provided by Imperva SecureSphere Database Security Solutions.
Posted: 02 Sep 2010 | Published: 02 Sep 2010


Reduce Risks and Protect Critical Information with Ease - Presentation Transcript
sponsored by Symantec
PRESENTATION TRANSCRIPT: The threat landscape is consistently evolving and today's cyber threats are getting stealthier. With these changes, businesses are finding that anti-virus only solutions are not enough to completely protect their business from risk.
Posted: 02 Aug 2010 | Published: 02 Aug 2010


Why Your Organization Needs to Implement DLP
sponsored by Trend Micro, Inc.
WHITE PAPER: Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Video: Oracle Active Data Guard
sponsored by Oracle Corporation
VIDEO: Watch this brief video for an informative explanation of how Oracle Active Data Guard makes better use of the standby database to complement the functionality of the production database and significantly increase software and hardware return on investment.
Posted: 30 Jun 2010 | Premiered: 30 Jun 2010

Oracle Corporation

Introducing Microsoft SQL Server 2008 R2
sponsored by Microsoft
EBOOK: Learn about all of the exciting enhancements and new capabilities engineered into SQL Server 2008 R2 that will have a positive impact on your applications, ranging from improvements in operation to those in management.
Posted: 25 Jun 2010 | Published: 25 Jun 2010


Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER: Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010


PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements
sponsored by IBM
PRODUCT LITERATURE: High transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.
Posted: 03 May 2010 | Published: 03 Feb 2010


Information Security Magazine: May 2010 - Data: Do you know where it’s going?
sponsored by Information Security Magazine
EZINE: This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.
Posted: 03 May 2010 | Published: 03 May 2010

Information Security Magazine
126 - 150 of 220 Matches Previous Page    4 5 6 7 8 9    Next Page
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement