IT Management  >   Systems Operations  >   Security  >  

SQL Server Security

RSS Feed    Add to Google    Add to My Yahoo!
SQL Server SecurityReports
 
The future of digital forensics
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK
sponsored by Idera
WHITE PAPER: This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks.
Posted: 31 Jan 2012 | Published: 31 Jan 2012

Idera

MongoDB on Red Hat Enterprise Linux
sponsored by MongoDB, Inc.
WHITE PAPER: Check out this paper and discover how to deploy MongoDB onto Red Hat Enterprise 6.2. In addition to a step-by-step process for deployment, you'll also learn how to take advantage of features of the underlying system, several deployment scenarios for high performance database read and writes, and gain an in-depth look at MongoDB.
Posted: 27 Aug 2012 | Published: 01 May 2012

MongoDB, Inc.

Discover What’s New in Oracle Data Integrator and Oracle GoldenGate
sponsored by Oracle Corporation
WEBCAST: Join Oracle data integration experts as they discuss the new versions of Oracle Data Integrator and Oracle GoldenGate.
Posted: 18 Aug 2011 | Premiered: Aug 18, 2011

Oracle Corporation

Your Enterprise Database Security Strategy (Forrester Consulting Report)
sponsored by IBM
WHITE PAPER: Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization.
Posted: 23 May 2011 | Published: 28 Sep 2009

IBM

Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER: Insider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
Posted: 04 Feb 2011 | Published: 04 Feb 2011

Imperva

Webroot  Endpoint Security eBook
sponsored by Webroot
EBOOK: This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot

Stopping application layer DDoS attacks: What you need to know
sponsored by Neustar®
EGUIDE: While a DDoS attack can be damaging to any organization, DDoS attacks specifically at the application-layer can be more ominous. Understanding these attacks are the first step to keeping your organization protected. In this e-guide, explore how DDoS is being used, what you can do to stop them, the future of the web threat landscape and more.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

Neustar®

ISACA PCI Compliance Symposium
sponsored by Intel
WEBCAST: As we ring in 2011 around the globe, we should also stop and take a look at PCI Compliance – to see where we've been, and discuss where it's headed. Hear from an expert panel of speakers and learn about tokenization, PCI DSS, and what version 2.0 will mean for the future.
Posted: 04 Apr 2011 | Premiered: Jan 25, 2011

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement