IT Management  >   Systems Operations  >   Security  >  

Data Base Security

RSS Feed   
Data Base Security Reports
 
Autonomous Operator Prerequisites and System Requirements
sponsored by Red Hat and Couchbase
DATA SHEET: Read on to view the system requirements and prerequisites for the Couchbase Autonomous Operator so you can get started as soon as possible—including information on Couchbase, Kubernetes, and persistent volume compatibility specifications and networking must-haves.
Posted: 27 May 2020 | Published: 27 May 2020

Red Hat and Couchbase

Veeam + HPE Nimble Storage: Five-Year ROI of 278%
sponsored by Veeam Software
WHITE PAPER: IDC interviewed organizations with a solution set consisting of Veeam Cloud Data Management software combined with HPE Nimble Storage to understand, validate and quantify the value of the combined solution. Register and download the Veeam and HPE Nimble Storage Research Study to find out more.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

Veeam Software

Veeam and Cisco HyperFlex: A Data Protection Solution You Can Have Confidence In
sponsored by Veeam Software
WHITE PAPER: In order to properly insulate businesses from risk, hardware and software need to work together to deliver data protection and disaster recovery instantaneously. Access this white paper to learn how a uniquely positioned solution from Veeam and Cisco can help businesses achieve optimum protection for their data and high availability workloads.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Veeam Software

Veeam + Nutanix = Simplifying Availability
sponsored by Veeam Software
WHITE PAPER: Hybrid cloud is a key choice for organizations looking for quick recovery and endless scalability. Explore this white paper to learn how hybrid cloud data protection and backup work and view 10 benefits you can gain by using this approach in your enterprise.
Posted: 28 Jan 2020 | Published: 28 Jan 2020

Veeam Software

Multitenancy Options in Postgres
sponsored by EnterpriseDB
WHITE PAPER: This white paper will show you the different ways that Postgres can help you achieve a multitenant database architecture. Download now for a complete architectural overview and to view these 3 multitenancy options at your disposal.
Posted: 09 Mar 2020 | Published: 09 Mar 2020

EnterpriseDB

Dremio Security Architecture Guide
sponsored by Dremio
WHITE PAPER: Because data sets and analytics systems are valuable targets for cybercriminals, it is important that your data access and analysis systems provide a variety of security options so that you can protect your organization’s data from potential threats. Read the attached guide to see some security choices that the data lake engine Dremio offers.
Posted: 05 Feb 2020 | Published: 20 Nov 2018

Dremio

The Changing Role of the DBA: Machine Learning for DBAs
sponsored by Oracle and Intel®
WEBCAST: In this webcast, Charlie Berger, Sr. Director of Product Management at Oracle, investigates the changing role of the DBA. Tune in to hear him present 6 steps with which you can evolve from database developer to data scientist and confront common machine learning obstacles and how to overcome them.
Posted: 13 Mar 2020 | Premiered: Mar 13, 2020

Oracle and Intel®

Ponemon Study: 2011 Cost of a Data Breach
sponsored by Symantec Corporation
WHITE PAPER: This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Posted: 25 May 2012 | Published: 31 Mar 2012

Symantec Corporation

3 Steps to Secure Cloud Database-as-a-Service
sponsored by Oracle Corporation UK Ltd
EGUIDE: Database-as-a-Service (DBaaS) may be easy to deploy and easy to manage, but it's not without its own security challenges. Evaluating a provider is an important first step, but where do you go from there? In this e-guide, we explore 3 key steps to ensuring secure cloud database services. Discover how to make your DBaaS migration safe and successful.
Posted: 06 Oct 2016 | Published: 04 Oct 2016

Oracle Corporation UK Ltd

Webroot  Endpoint Security eBook
sponsored by Webroot
EBOOK: This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info