IT Management  >   Systems Operations  >   Security  >  

Database Administration Security

RSS Feed   
Database Administration Security Reports
 
Effective Data Management for NoSQL and Hadoop Environments
sponsored by Cohesity
ANALYST REPORT: The following ESG paper digs into the most important data protection and orchestration considerations for Hadoop and NoSQL deployments. Access now for more on the impact of Hadoop and NoSQL data loss and how to establish more flexible protection for these workloads in your organization.
Posted: 13 Aug 2019 | Published: 31 Jul 2019

Cohesity

Security and Governance for Amazon S3 Data Lakes
sponsored by Okera
WHITE PAPER: In this white paper, learn about Amazon S3 data lake security concerns for fine-grained access control and governance, and discover how an Okera Active Data Access Platform can help your organization achieve complete data access control and governance in modern data lakes.
Posted: 24 Jun 2019 | Published: 31 Mar 2019

Okera

Cloud Data Protection for VMware Cloud on AWS
sponsored by Druva
WEBCAST: Organizations can implement Druva and VMware Cloud on AWS to move and protect applications as needed, accelerate and simplify data migration, and utilize robust DR. Watch this webcast to learn how AWS, VMware, and Druva fit together to streamline your data backup and restoration needs.
Posted: 18 Dec 2019 | Premiered: Dec 18, 2019

Druva

Enterprise Family Guide
sponsored by TechData - Seagate
WHITE PAPER: Access this white paper to learn about a family of vertically integrated Enterprise Data Solutions from Seagate, including the Exos Enterprise Hard Drives and the Nytro Enterprise Solid-State Drives, that are fit to accommodate zettabyte-level data capacity and performance.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

TechData - Seagate

9 Steps to Critical Event Management Improvement
sponsored by EverBridge Inc.
EGUIDE: By leveraging a holistic approach to CEM, organizations can look forward to a more unified, distributed, automated, and collaborative process. Access this white paper to discover an essential 9-step CEM process that organizations can use to improve their responses to critical events.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

EverBridge Inc.

Ponemon Study: 2011 Cost of a Data Breach
sponsored by Symantec Corporation
WHITE PAPER: This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Posted: 25 May 2012 | Published: 31 Mar 2012

Symantec Corporation

New data management tool will protect your nonproduction environments
sponsored by Informatica
DATA SHEET: Access this exclusive datasheet now to uncover the data management tool for nonproduction environments, as well as its key features and benefits.
Posted: 02 May 2014 | Published: 04 Aug 2011

Informatica

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Presentation Transcript: New Releases from Intel and IBM offer Breakthrough Database Performance
sponsored by Intel and IBM
PRESENTATION TRANSCRIPT: Read this presentation transcript now and learn about these advances that are possible by combining the Intel Xeon processor E5-2600 product family with IBM DB2 10 for Linux, Unix and Windows.
Posted: 30 Apr 2012 | Published: 17 Apr 2012

Intel and IBM

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info