Database Security Reports

10 Reasons to Upgrade to Oracle Database 12c
sponsored by Oracle
EGUIDE: Let Brian Peasland, a DBA with over 20 years of experience, explains why you should upgrade to Oracle Database 12c. Learn about how you can gain increased back-end support, updated hardware and OS, security patches and more inside.
Posted: 08 Feb 2017 | Published: 08 Feb 2017

Oracle

The Enterprise Guide to SAP HANA's Cloud Models and Migration Checklist
sponsored by UXC Oxygen and Amazon Web Services
EGUIDE: If you're considering HANA but are unsure about SAP's models of cloud computing, you'll want to fully outline your deployment options before migration. Discover three options for cloud-based HANA, as well as 6-point checklist for crafting a successful cloud migration strategy.
Posted: 07 Nov 2016 | Published: 28 Oct 2016

UXC Oxygen and Amazon Web Services

AWS Lowers Cost Barriers for SAP HANA and Database Migrations to the Cloud
sponsored by UXC Oxygen and Amazon Web Services
EGUIDE: Although SAP deployments are currently dominated by appliances, more companies are tapping the cloud. But is cloud deployment a smart decision for you? Download now to weigh SAP HANA on-premises options against their cloud offerings. Also, discover how AWS' new tools will lower cost barriers for database cloud migrations.
Posted: 28 Oct 2016 | Published: 27 Oct 2016

UXC Oxygen and Amazon Web Services

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

3 Steps to Secure Cloud Database-as-a-Service
sponsored by Oracle Corporation UK Ltd
EGUIDE: Database-as-a-Service (DBaaS) may be easy to deploy and easy to manage, but it's not without its own security challenges. Evaluating a provider is an important first step, but where do you go from there? In this e-guide, we explore 3 key steps to ensuring secure cloud database services. Discover how to make your DBaaS migration safe and successful.
Posted: 06 Oct 2016 | Published: 04 Oct 2016

Oracle Corporation UK Ltd

Information Security ANZ July 2016
sponsored by TechTarget Security
EZINE: Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.
Posted: 05 Jul 2016 | Published: 04 Jul 2016

TechTarget Security

Malware Hitching a Ride on Mobile Apps?
sponsored by TechTarget Security
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

TechTarget Security

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky

CW Europe – May 2015
sponsored by TechTarget ComputerWeekly.com
EZINE: In this issue, CW Europe's security editor investigates whether the legislation could strangle Europe's productivity and whether businesses see the regulations as a burden.
Posted: 07 May 2015 | Published: 07 May 2015

TechTarget ComputerWeekly.com

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Computer Weekly – 9 December 2014: The most influential people in UK IT
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now.
Posted: 05 Dec 2014 | Published: 05 Dec 2014

TechTarget ComputerWeekly.com

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Information Security Magazine – July/August 2014
sponsored by TechTarget Security
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

TechTarget Security

SQL Safe Backup: Automate Backups Safely, and Faster
sponsored by Idera
SOFTWARE DOWNLOAD: Eliminate application downtime, automate SQL Server backup, and speed up processes. Learn about the key features of SQL Safe Backup and gain full access to a 14 day free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

How to keep your confidential information safe
sponsored by Informatica
DATA SHEET: Access this concise resource to uncover the key features of a data masking tool, to ensure the security of your organization's reputation and confidential information.
Posted: 08 May 2014 | Published: 31 Dec 2013

Informatica

Achieving High Oracle Performance
sponsored by Dell Software
WHITE PAPER: DBAs cannot afford to rely on reactive measures anymore. They need advanced performance management tools that will enable them to catch emerging issues before they can affect end users. Discover how advanced database management can help DBAs protect the system by preventing problems from developing at all. Download the white paper to learn more.
Posted: 07 May 2014 | Published: 19 Aug 2013

Dell Software

Data protection tool that's easy to install & configure
sponsored by Informatica
DATA SHEET: Read this exclusive resource to uncover all the ins-and-outs of one industry-leading data protection tool.
Posted: 07 May 2014 | Published: 31 Dec 2013

Informatica

Is your data as well protected as it should be?
sponsored by Informatica
WHITE PAPER: Read this exclusive white paper now to discover the big data security tool capable of significantly reducing the risk of a data breach, while helping organizations comply with data regulations and policies.
Posted: 07 May 2014 | Published: 30 Nov 2012

Informatica

Comparing IBM Informix and Oracle Database for High Availability and Data Replication, an ITG Management Report
sponsored by IBM
WHITE PAPER: In this report, get an in-depth comparison between Oracle Databases and Real Application Clusters (RAC) and IBM Informix with regards to high availability and data replication.
Posted: 02 May 2014 | Published: 31 Jan 2014

IBM

New data management tool will protect your nonproduction environments
sponsored by Informatica
DATA SHEET: Access this exclusive datasheet now to uncover the data management tool for nonproduction environments, as well as its key features and benefits.
Posted: 02 May 2014 | Published: 04 Aug 2011

Informatica

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Creating SANLess Microsoft SQL Server Failover Cluster Instances with SIOS DataKeeper Cluster Edition and Fusion-io
sponsored by SIOS Technology Corp
WHITE PAPER: Deploying a failover cluster instance (FCI) architecture for your SQL Server database requires expensive shared storage for data files and backups. This resource introduces an alternative to storage area networks (SANs) that provides the availability benefit of an FCI – without the high price tag.
Posted: 11 Feb 2014 | Published: 31 Dec 2013

SIOS Technology Corp