IT Management  >   Systems Operations  >   Security  >  

SAP Security

RSS Feed    Add to Google    Add to My Yahoo!
SAP Security Reports
 
ESG Brief: Enhancing Database Environments with NetApp Storage
sponsored by NetApp
WHITE PAPER: Whether planning for a major upgrade of existing databases or considering a net new project, enterprise solution architects should realize that the storage capabilities will matter. NetApp's systems, software, and services offer a number of advantages as a foundation for better operational results.
Posted: 13 Jul 2015 | Published: 31 Dec 2014

NetApp

4 Steps to Prevent a Data Breach: Address Your Weak Spots Before it's Too Late
sponsored by IBM
WHITE PAPER: This valuable resource discusses 4 steps you can take to address your database vulnerabilities.
Posted: 27 Jan 2015 | Published: 31 Dec 2014

IBM

Cyber Vulnerability Index 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Why IT Professionals Need to Take Responsibility for Data Security
sponsored by Oracle Corporation
WHITE PAPER: This white paper presents the results of a survey that asked IT professionals about their data security practices, revealing the areas where most organizations need to improve.
Posted: 04 Aug 2015 | Published: 31 Oct 2014

Oracle Corporation

Introduction To Xtremio Snapshots: Get a Lasting Image of Your Data at a Specific Time
sponsored by EMC Corporation
WHITE PAPER: Discover how your organization can instantly copy images of volume data to utilize in a variety of use cases.
Posted: 15 Jun 2015 | Published: 31 Jul 2014

EMC Corporation

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Comparing IBM Informix and Oracle Database for High Availability and Data Replication, an ITG Management Report
sponsored by IBM
WHITE PAPER: In this report, get an in-depth comparison between Oracle Databases and Real Application Clusters (RAC) and IBM Informix with regards to high availability and data replication.
Posted: 02 May 2014 | Published: 31 Jan 2014

IBM

Advanced Performance Management for Today's Complex, Critical Databases
sponsored by Dell Software
WHITE PAPER: Read this informative resource to learn about how advanced performance management can help you meet the demands of high performance and around-the-clock uptime.
Posted: 16 Sep 2013 | Published: 16 Sep 2013

Dell Software

Presentation Transcript: New Releases from Intel and IBM offer Breakthrough Database Performance
sponsored by Intel and IBM
PRESENTATION TRANSCRIPT: Read this presentation transcript now and learn about these advances that are possible by combining the Intel Xeon processor E5-2600 product family with IBM DB2 10 for Linux, Unix and Windows.
Posted: 30 Apr 2012 | Published: 17 Apr 2012

Intel and IBM

Webroot Secure Anywhere Business - Mobile Protection
sponsored by Webroot
WHITE PAPER: Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement