IT Management  >   Systems Operations  >   Security  >  

Oracle Security

RSS Feed    Add to Google    Add to My Yahoo!
Oracle SecurityReports
 
Engineered High Performance Storage Solutions for Primary Storage
sponsored by Oracle Corporation
WHITE PAPER: This exclusive guide reveals database-aware, high-performance storage systems that provide an ideal platform for primary storage, test and development, and backup and recovery processes.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Oracle Corporation

Introducing LogRhythm v6.2
sponsored by LogRhythm, Inc.
WHITE PAPER: Although security professionals do as much as they can to prevent error or risks, they must always be prepared for something to go wrong. Now they can with a powerful monitoring and auditing platform that keeps security personnel informed with an excellent investigatory tool.
Posted: 29 Jul 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

When in Doubt, Backup: Protecting Mission-Critical Data
sponsored by Code42
WHITE PAPER: This in-depth resource shines light on a continuous, multi-destination system to back up mission-critical data whenever and wherever it is created.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Code42

Ponemon Study: 2011 Cost of a Data Breach
sponsored by Symantec Corporation
WHITE PAPER: This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Posted: 25 May 2012 | Published: 31 Mar 2012

Symantec Corporation

Oracle Data Mining 11g Release 2 Competing on In-Database Analytics
sponsored by Oracle Corporation
WHITE PAPER: This paper offers an overview of Oracle Data Mining, detailing how you can build predictive models to better target customers, develop detailed customer profiles and detect and prevent fraud. Read on and learn how this data mining tool eliminates data extraction and movement, delivers the lowest TCO compared to traditional vendors and more.
Posted: 03 Jul 2012 | Published: 24 Jun 2012

Oracle Corporation

Webroot  Endpoint Security eBook
sponsored by Webroot
EBOOK: This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot

Introducing the Next Generation of SPARC Servers E-Book
sponsored by Oracle Corporation
EBOOK: Discover the benefits of Oracle's new SPARC T4 servers and how they deliver world record performance for a wide range of enterprise applications, and offer enhanced reliability and security, improved virtualization tools, and reduced costs. View this e-book packed with valuable information, customer success stories, and a 3D demo.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

Oracle Corporation

SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools
sponsored by IBM
EGUIDE: Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM

CA ERwin Data Modeler’s Role in the Relational Cloud
sponsored by CA ERwin from CA Technologies
WHITE PAPER: Database as a Service (DaaS) is emerging as soild option for enterprise database management. However, many IT professionals are questioning the perforamce and secutiry of DaaS. Read this white paper to learn more about DaaS and how it can measure up to on-premise databases.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

CA ERwin from CA Technologies

Oracle Database 11g Release 2 High Availability
sponsored by Oracle Corporation
WHITE PAPER: This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
Posted: 12 Mar 2012 | Published: 31 Oct 2010

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement