IT Management  >   Systems Operations  >   Security  >  

SAP Security

RSS Feed    Add to Google    Add to My Yahoo!
SAP Security Reports
451 Research Report: Oracle Database Rolls to the Cloud (Again)
sponsored by Oracle Corporation
WHITE PAPER: In this 451 Research analysis, learn about the new cloud database option from Oracle, and how it differs from previous offerings. Additionally, learn about competition for this cloud database option, see a strengths, weakness, opportunities, and threats analysis, and more.
Posted: 16 Nov 2015 | Published: 16 Oct 2014

Oracle Corporation

Stopping application layer DDoS attacks: What you need to know
sponsored by
EGUIDE: While a DDoS attack can be damaging to any organization, DDoS attacks specifically at the application-layer can be more ominous. Understanding these attacks are the first step to keeping your organization protected. In this e-guide, explore how DDoS is being used, what you can do to stop them, the future of the web threat landscape and more.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

Data Encryption and Redaction: A Review of Database Security
sponsored by Oracle Corporation
WHITE PAPER: This SANS report examines the importance of database security and discusses measures you can take to make your databases impenetrable.
Posted: 16 Nov 2015 | Published: 30 Sep 2014

Oracle Corporation

How to Use SSL with Cloud Databases
sponsored by Rackspace
WHITE PAPER: This white paper explains how Secure Socket Layer protection (SSL) is now being used to encrypt data on all Cloud Database instances. Read on to see how ensure that your cloud data is encrypted in-transit.
Posted: 28 Aug 2015 | Published: 22 Oct 2014


Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

sponsored by Idera
WHITE PAPER: This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks.
Posted: 31 Jan 2012 | Published: 31 Jan 2012


Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008


Webroot Secure Anywhere Business - Mobile Protection
sponsored by Webroot
WHITE PAPER: Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.
Posted: 25 Jul 2012 | Published: 25 Jul 2012


CW Europe – May 2015
sponsored by
EZINE: In this issue, CW Europe's security editor investigates whether the legislation could strangle Europe's productivity and whether businesses see the regulations as a burden.
Posted: 07 May 2015 | Published: 07 May 2015

Data protection tool that's easy to install & configure
sponsored by Informatica
DATA SHEET: Read this exclusive resource to uncover all the ins-and-outs of one industry-leading data protection tool.
Posted: 07 May 2014 | Published: 31 Dec 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement