IT Management  >   Systems Operations  >   Security  >  

Database Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Oracle Security, Database Protection, SAP Security, SQL Server Security, Data Base Security, Database Administration Security
DEFINITION: The protection of a database from malicious attacks or accidental changes.
Database SecurityReports
176 - 200 of 213 Matches Previous Page  | Next Page
Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos, Inc.
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefit...
Posted: 20 Feb 2009 | Published: 20 Feb 2009

Sophos, Inc.

IBM Security Event and Log Management Service
sponsored by IBM
SERVICE LISTING: With Security Event and Log Management Service, you can assemble the collective mindshare of your organization's network applications and operating systems along with disparate security technologies into one platform. You can archive, analyze, correlate and trend security and network events, while managing response and remediation workflow.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Managing the Entire Database Security & Compliance Lifecycle
sponsored by Guardium, an IBM Company
DATA SHEET: Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle.
Posted: 12 Feb 2009 | Published: 12 Feb 2010

Guardium, an IBM Company

Understanding and Selecting a Database Activity Monitoring Solution
sponsored by Imperva
WHITE PAPER: Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Imperva

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva
WHITE PAPER: This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

Imperva

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Advanced Disaster Recovery and Business Continuity Planning Techniques and Technologies: Module 3 Testing
sponsored by SearchStorage.com
PRESENTATION: Review this presentation to learn how to use business continuity planning to create a recovery capability for your organization.
Posted: 26 Nov 2008 | Published: 26 Nov 2008

SearchStorage.com

Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER: Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008

Information Security Magazine

Data Loss Prevention: Keeping Sensitive Data out of the Wrong Hands
sponsored by Symantec Corporation
WHITE PAPER: Data security breaches pose a serious threat. Companies need to reduce risks associated with exposing customer data, losing intellectual property, or violating compliance obligations. Learn more about DLP issues, strategies and solutions.
Posted: 06 Oct 2008 | Published: 03 Oct 2008

Symantec Corporation

Best Practices for Endpoint Data Loss Prevention
sponsored by Symantec Corporation
WHITE PAPER: Find out the best practices for planning for and deploying an endpoint DLP tool in your corporation. The technology overview section of this document provides a closer look on how DLP works with other existing technologies and how best to integrate DLP in your environment.
Posted: 24 Sep 2008 | Published: 24 Sep 2008

Symantec Corporation

Why Database Archiving Should Be Part of Your Enterprise DBMS Strategy
sponsored by Clearpace Software
WHITE PAPER: Enterprises that archive their database often find more than one benefit to doing so, whether it’s business, infrastructure, or cost-related. In addition, the value of archiving grows considerably as it becomes easier to access
Posted: 25 Aug 2008 | Published: 25 Aug 2008

Clearpace Software

CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF
sponsored by CA Technologies.
SOFTWARE DEMO: Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation.
Posted: 17 Jun 2008 | Premiered: 13 Jun 2008

CA Technologies.

Keeping the Right People: Making the Right Decisions When It Counts
sponsored by Vurv Technology
WHITE PAPER: The purpose of this Executive White Paper is to help you avoid the pitfalls inherent in by any reduction in (work)force (RIF). It also details a solution that can assist companies in collecting employee data efficiently and keeping it secure.
Posted: 20 May 2008 | Published: 01 May 2008

Vurv Technology

Building Compliance and Security into an Application Delivery Framework
sponsored by Citrix
WHITE PAPER: The right IT solution, such as Citrix Delivery Center™, offers a holistic approach to delivering compliance and security.
Posted: 05 May 2008 | Published: 28 Apr 2008

Citrix

Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment
sponsored by XTS
WHITE PAPER: This white paper provides an analytical perspective on how to best manage your Citrix environment.
Posted: 10 Apr 2008 | Published: 01 Apr 2008

XTS

Optim Data Privacy Solution
sponsored by IBM
SOFTWARE LISTING: The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments.
Posted: 14 Mar 2008 | Published: 13 Mar 2008

IBM

Closing the Data Privacy Gap: Protecting Sensitive Data in Non-Production Environments
sponsored by IBM
WHITE PAPER: This White Paper explains why protecting sensitive information and ensuring privacy have become high priorities.
Posted: 14 Mar 2008 | Published: 01 Aug 2007

IBM

Tera1200 PC-over-IP Host Processor Product Brief
sponsored by Teradici Corporation
PRODUCT LITERATURE: This product brief provides IT administrators with key information to better manage their commercial PC environments.
Posted: 10 Mar 2008 | Published: 10 Mar 2008

Teradici Corporation

Technology Assessment Vendor Viewpoint: Teradici Corporation
sponsored by Teradici Corporation
WHITE PAPER: This white paper gives a IT administrators a new approach to computer deployment management and PC functionality.
Posted: 10 Mar 2008 | Published: 01 Jan 2007

Teradici Corporation

EK1000 Slap Shot Evaluation Kit Product Brief
sponsored by Teradici Corporation
PRODUCT LITERATURE: This brief provides IT administrators with key information on how to manage their PC environments with and maximize end-user productivity.
Posted: 10 Mar 2008 | Published: 10 Mar 2008

Teradici Corporation

Governance, Risk, and Compliance Management: Realizing the Value Of Cross-Enterprise Solutions
sponsored by SAP America, Inc.
WHITE PAPER: This paper explains SAP’s vision for a cross-enterprise GRC solution and the benefits it can provide, defines key terms, and discusses what to look for when evaluating GRC software options.
Posted: 01 Feb 2008 | Published: 01 Jan 2007

SAP America, Inc.

Best Practices for Database Security and Compliance
sponsored by Guardium, an IBM Company
WEBCAST: Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.
Posted: 31 Jan 2008 | Premiered: Feb 13, 2008, 14:00 EST (19:00 GMT)

Guardium, an IBM Company

Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER: Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008

IBM Software Group

The importance of security assessments
sponsored by IBM
WHITE PAPER: This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM
176 - 200 of 213 Matches Previous Page    6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement