IT Management  >   Systems Operations  >   Security  >  

SAP Security

RSS Feed    Add to Google    Add to My Yahoo!
SAP SecurityReports
 
Manage data security and application threats with a muli-tiered approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications
sponsored by SearchSecurity.com
WHITE PAPER: Implementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

SearchSecurity.com

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
WHITE PAPER: This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DBAs are supposed to protect.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

Idera

Big data in the cloud: How to reduce data center infrastructure costs
sponsored by SearchCloudComputing.com
WHITE PAPER: How can cloud computing help companies in the new world of big data? This expert handbook looks at some possible answers to this question.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

SearchCloudComputing.com

Secure File Transfer Tech Guide
sponsored by SearchSecurity.com
EGUIDE: Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

SearchSecurity.com

Thinking strategically about mobility and enterprise data
sponsored by AppSense
WHITE PAPER: IT professionals face new governance challenges as a result of the transformation of enterprise computing. The demand for mobile productivity is constantly growing, and IT leaders need to find solutions for mobility without sacrificing efficiency or governance.
Posted: 09 Jul 2012 | Published: 09 Jul 2012

AppSense

CA ERwin Data Modeler’s Role in the Relational Cloud
sponsored by CA ERwin from CA Technologies
WHITE PAPER: Database as a Service (DaaS) is emerging as soild option for enterprise database management. However, many IT professionals are questioning the perforamce and secutiry of DaaS. Read this white paper to learn more about DaaS and how it can measure up to on-premise databases.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

CA ERwin from CA Technologies

Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention
sponsored by McAfee, Inc.
WHITE PAPER: While databases are the warehouses of the most valuable information assets in the enterprise, many organizations today do poorly to protect them. In this paper, discover how to protect your database and data assets with McAfee Database Security Solution, a multi-tiered solution that can help defend against threats and eliminate vulnerabilities.  
Posted: 04 Nov 2011 | Published: 04 Nov 2011

McAfee, Inc.

SearchStorage eGuide: A smarter approach to data protection: 4 best practices
sponsored by IBM
EGUIDE: There's a big difference between backup and business continuity. When it comes to protecting business critical information, the digital era has brought with it exposure to more threats from more directions than ever before. Download this SearchStorage.com E-Guide to learn all about protecting the use of information and data files.
Posted: 12 May 2011 | Published: 12 May 2011

IBM

Presentation Transcript: Disaster Recovery Planning and Security for the IT Industry
sponsored by IBM
PRESENTATION TRANSCRIPT: The biggest security issues are the ones that you don’t know about – and the reality is many businesses don’t truly know where they stand. Check out this presentation transcript from a SearchDisasterRecovery.com webcast to learn about today’s biggest security concerns and best practices for protecting your IT center.
Posted: 17 May 2011 | Published: 17 May 2011

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement