IT Management  >   Systems Operations  >   Security  >  

Oracle Security

RSS Feed   
Oracle Security White Papers (View All Report Types)
 
Data Security Under GDPR: How to Prepare for the Inevitable
sponsored by Fortinet, Inc.
WHITE PAPER: Access this white paper to gain guidance on how to comply with GDPR when developing data protection policies.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

6 SQL Server Backup and Recovery Best Practices
sponsored by Druva Software
WHITE PAPER: Read this white paper to learn 6 tips for minimizing data loss and corruption in your SQL Server.
Posted: 14 Mar 2018 | Published: 14 Mar 2018

Druva Software

Is your data as well protected as it should be?
sponsored by Informatica
WHITE PAPER: Read this exclusive white paper now to discover the big data security tool capable of significantly reducing the risk of a data breach, while helping organizations comply with data regulations and policies.
Posted: 07 May 2014 | Published: 30 Nov 2012

Informatica

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Managing the Entire Database Security & Compliance Lifecycle with IBM InfoSphere Guardium
sponsored by IBM
WHITE PAPER: Read this paper to find out what solutions optimize operational efficiency with a scalable, multi-tier architecture that automates and centralizes compliance controls across your entire application and database infrastructure.
Posted: 27 Sep 2010 | Published: 27 Sep 2010

IBM

CA ERwin Data Modeler’s Role in the Relational Cloud
sponsored by CA ERwin from CA Technologies
WHITE PAPER: Database as a Service (DaaS) is emerging as soild option for enterprise database management. However, many IT professionals are questioning the perforamce and secutiry of DaaS. Read this white paper to learn more about DaaS and how it can measure up to on-premise databases.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

CA ERwin from CA Technologies

Backup and Recovery Performance and Best Practices for Exadata Cell and the Oracle Exadata Database Machine
sponsored by Oracle Corporation
WHITE PAPER: One of the key operational aspects of deploying a Sun Oracle Database Machine is to ensure that database backups are performed and restoration of the Oracle Database is possible if disaster strikes. This paper describes the best practices for setting up the optimal backup and recovery strategy to protect your mission-critical data.
Posted: 07 Oct 2010 | Published: 30 Jun 2010

Oracle Corporation

Analyst Whitepaper: Bloor Research: Sybase ASE Total Cost of Ownership - A Comparison to Oracle
sponsored by SAP America, Inc.
WHITE PAPER: Given that Sybase ASE can now be deployed as the foundation for SAP Business Suite and BW implementations (in addition to Oracle, Microsoft SQL Server and IBM DB2), the information is relevant to SAP customers installing a new instance of SAP or looking to migrate their existing SAP installation to a different database.
Posted: 22 Apr 2012 | Published: 30 Sep 2011

SAP America, Inc.

Oracle Data Mining 11g Release 2 Competing on In-Database Analytics
sponsored by Oracle Corporation
WHITE PAPER: This paper offers an overview of Oracle Data Mining, detailing how you can build predictive models to better target customers, develop detailed customer profiles and detect and prevent fraud. Read on and learn how this data mining tool eliminates data extraction and movement, delivers the lowest TCO compared to traditional vendors and more.
Posted: 03 Jul 2012 | Published: 24 Jun 2012

Oracle Corporation

Improved network security with IP and DNS reputation
sponsored by Hewlett Packard Enterprise
WHITE PAPER: As cyber threats across the globe continue to increase in number and sophistication, security and networking personnel must not only work harder but also smarter to stay ahead of malicious attacks. Download this paper from HP Networking to learn how to defend IT assets and business reputation.
Posted: 30 Sep 2010 | Published: 30 Sep 2010

Hewlett Packard Enterprise
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement