IT Management  >   Systems Operations  >   Security  >  

Data Base Security

RSS Feed   
Data Base Security Reports
 
Trouble at your door: targeted cyber attacks in the UK and Europe
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.
Posted: 29 Sep 2016 | Published: 29 Sep 2016

ComputerWeekly.com

Why EDB Chose Immutable Application Containers
sponsored by EnterpriseDB
RESOURCE: Cloud Native PostgreSQL is a Kubernetes Operator for Postgres written by EBD, designed with a DevOps mindsight and a special focus on the potential of immutable application containers. Read this blog post to learn how immutable application containers alongside Postgres reduce security risk, decrease downtime, and excel in a Kubernetes environment.
Posted: 12 Mar 2021 | Published: 01 Feb 2021

EnterpriseDB

Best practices in security with PostgreSQL
sponsored by EnterpriseDB
WEBCAST: When it comes to implementing better database security, there are a wide range of measures and steps to be taken. Some of these are obvious, like restricting physical access to your DB. Others, however, are less apparent. Tune in to this webinar to learn security best practices for PostgreSQL—specifically related to data breaches.
Posted: 13 Nov 2020 | Premiered: Nov 13, 2020

EnterpriseDB

Couchbase vs. MongoDB™ for Scale-Out and High Availability
sponsored by Couchbase
WHITE PAPER: Couchbase is a distributed NoSQL document-oriented database that supports a flexible data model, easy scalability, high performance, high availability, and advanced security. Many enterprises are considering Couchbase or MongoDB for these reasons. This paper will focus on how Couchbase compares to MongoDB for scalability and high availability.
Posted: 01 Apr 2021 | Published: 01 Apr 2021

Couchbase

MongoDB on Red Hat Enterprise Linux
sponsored by MongoDB, Inc.
WHITE PAPER: Check out this paper and discover how to deploy MongoDB onto Red Hat Enterprise 6.2. In addition to a step-by-step process for deployment, you'll also learn how to take advantage of features of the underlying system, several deployment scenarios for high performance database read and writes, and gain an in-depth look at MongoDB.
Posted: 27 Aug 2012 | Published: 01 May 2012

MongoDB, Inc.

How to keep your confidential information safe
sponsored by Informatica
DATA SHEET: Access this concise resource to uncover the key features of a data masking tool, to ensure the security of your organization's reputation and confidential information.
Posted: 08 May 2014 | Published: 31 Dec 2013

Informatica

Webroot Secure Anywhere Business - Mobile Protection
sponsored by Webroot
WHITE PAPER: Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot

SearchCompliance.com E-guide: A lesson in database security: What every compliance officer needs to know
sponsored by IBM
EGUIDE: Too many enterprise databases are leaking sensitive information. Yet the solution to these problems is simple: user education, coupled with a new breed of database activity monitoring tools. This e-guide provides guidelines for establishing a data protection framework and teaching the right way to handle data.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

Is your data as well protected as it should be?
sponsored by Informatica
WHITE PAPER: Read this exclusive white paper now to discover the big data security tool capable of significantly reducing the risk of a data breach, while helping organizations comply with data regulations and policies.
Posted: 07 May 2014 | Published: 30 Nov 2012

Informatica

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences