IT Management  >   Systems Operations  >   Security  >  

Oracle Security

RSS Feed    Add to Google    Add to My Yahoo!
Oracle Security Reports
Rising Cyber Crime Mandates More Effective Security Measures
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this in-depth white paper, get the facts from industry veterans on how to best prevent data breaches and implement effective risk management.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Hewlett-Packard Limited

Big Data SIEM on the Horizon
sponsored by Splunk
WHITE PAPER: In this white paper, you will learn the three SIEM trends that call for a big data SIEM approach as well as the limitations of traditional SIEM strategies.
Posted: 12 Aug 2015 | Published: 05 Aug 2015


15 Qualities to Look for in SAP/SAP HANA Data Protection
sponsored by EMC
WHITE PAPER: This white paper explores fifteen qualities that organizations look for in backup and disaster recovery solutions for SAP/SAP HANA loads.
Posted: 24 Sep 2015 | Published: 31 Dec 2014


Comprehensive Security for Your Valuable Data
sponsored by Trustwave
WHITE PAPER: This white paper explains how you can implement strong database security that will keep the hackers out.
Posted: 01 Oct 2015 | Published: 31 Dec 2014


Dell XC Web-Scale Converged Appliance for VMware® Horizon View™
sponsored by Dell, Inc.
WHITE PAPER: This white paper outlines how to configure virtual desktop so that you can achieve maximum data protection. Read on to learn more about how to design full-clone persistent virtual desktops.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Dell, Inc.

How Red Hat Delivers a Secure Enterprise Platform for Next-Generation DataCenters
sponsored by Red Hat
WHITE PAPER: This whitepaper will introduce you to the key differentiators that set Red Hat Enterprise Linux apart in regards to security for next-generation datacenters. Read on to learn more.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

Red Hat

Point of Sale (POS) Systems and Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: Access this white paper to learn about another perspective in POS system security. Read on for an overview of payment card systems and attack methods, as well as how to leverage the Council on CyberSecurity's 20 critical controls to your system's advantage.
Posted: 13 Apr 2015 | Published: 31 Oct 2014

Bit9 + Carbon Black

Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015


Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements
sponsored by Oracle Corporation
WHITE PAPER: Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.
Posted: 09 Apr 2012 | Published: 31 Jan 2012

Oracle Corporation

SANS Institute Making Database Security an IT Security Priority
sponsored by Oracle Corporation
WHITE PAPER: Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security.
Posted: 13 Jun 2011 | Published: 30 Nov 2009

Oracle Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement