IT Management  >   Systems Operations  >   Security  >  

Database Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Oracle Security, Database Protection, SAP Security, SQL Server Security, Data Base Security, Database Administration Security
DEFINITION: The protection of a database from malicious attacks or accidental changes.
Database Security Reports
26 - 50 of 226 Matches Previous Page  |  Next Page
How you can defend against criminal attacks originating from the Deep Web
sponsored by IBM
WHITE PAPER: This white paper explores the depths of the Deep Web, using attack data to examine what kinds of attacks originate there and how you can defend against them.
Posted: 09 Sep 2015 | Published: 31 Jul 2015

IBM

SQL Safe Backup: Automate Backups Safely, and Faster
sponsored by Idera
SOFTWARE DOWNLOAD: Eliminate application downtime, automate SQL Server backup, and speed up processes. Learn about the key features of SQL Safe Backup and gain full access to a 14 day free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DBAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

Financial Services Data Privacy and Data Migration
sponsored by ComputerWeekly.com
PRESENTATION: Keith Bucknall, head of Strategy, Architecture & Infrastructure for Lloyds motor insurer, ERS, looks at the data protection challenges faced by the organisation, in this presentation.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

ComputerWeekly.com

The future of digital forensics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Expert Guide to Information Security Certifications
sponsored by TechTarget
RESOURCE: Choosing the right information security certification, whether it is for your educational or career benefit should be easy. Find a list of programs from various vendors, a brief description of each and tips on identifying the right one for your needs in our expert information security guide, upon completion of a brief Data Protection Survey.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

CW Europe – May 2015
sponsored by ComputerWeekly.com
EZINE: In this issue, CW Europe's security editor investigates whether the legislation could strangle Europe's productivity and whether businesses see the regulations as a burden.
Posted: 07 May 2015 | Published: 07 May 2015

ComputerWeekly.com

Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM

Information Security ASEAN March 2015
sponsored by SearchSecurity.com
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

SearchSecurity.com

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Computer Weekly – 9 December 2014: The most influential people in UK IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

ComputerWeekly.com

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Information Security Magazine – July/August 2014
sponsored by SearchSecurity.com
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchSecurity.com

Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

How to keep your confidential information safe
sponsored by Informatica
DATA SHEET: Access this concise resource to uncover the key features of a data masking tool, to ensure the security of your organization's reputation and confidential information.
Posted: 08 May 2014 | Published: 31 Dec 2013

Informatica

Achieving High Oracle Performance
sponsored by Dell Software
WHITE PAPER: DBAs cannot afford to rely on reactive measures anymore. They need advanced performance management tools that will enable them to catch emerging issues before they can affect end users. Discover how advanced database management can help DBAs protect the system by preventing problems from developing at all. Download the white paper to learn more.
Posted: 07 May 2014 | Published: 19 Aug 2013

Dell Software

Data protection tool that's easy to install & configure
sponsored by Informatica
DATA SHEET: Read this exclusive resource to uncover all the ins-and-outs of one industry-leading data protection tool.
Posted: 07 May 2014 | Published: 31 Dec 2013

Informatica

Is your data as well protected as it should be?
sponsored by Informatica
WHITE PAPER: Read this exclusive white paper now to discover the big data security tool capable of significantly reducing the risk of a data breach, while helping organizations comply with data regulations and policies.
Posted: 07 May 2014 | Published: 30 Nov 2012

Informatica

Comparing IBM Informix and Oracle Database for High Availability and Data Replication, an ITG Management Report
sponsored by IBM
WHITE PAPER: In this report, get an in-depth comparison between Oracle Databases and Real Application Clusters (RAC) and IBM Informix with regards to high availability and data replication.
Posted: 02 May 2014 | Published: 31 Jan 2014

IBM

New data management tool will protect your nonproduction environments
sponsored by Informatica
DATA SHEET: Access this exclusive datasheet now to uncover the data management tool for nonproduction environments, as well as its key features and benefits.
Posted: 02 May 2014 | Published: 04 Aug 2011

Informatica

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Creating SANLess Microsoft SQL Server Failover Cluster Instances with SIOS DataKeeper Cluster Edition and Fusion-io
sponsored by SIOS Technology Corp
WHITE PAPER: Deploying a failover cluster instance (FCI) architecture for your SQL Server database requires expensive shared storage for data files and backups. This resource introduces an alternative to storage area networks (SANs) that provides the availability benefit of an FCI – without the high price tag.
Posted: 11 Feb 2014 | Published: 31 Dec 2013

SIOS Technology Corp

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.
26 - 50 of 226 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement