IT Management  >   Systems Operations  >   Security  >  

Database Administration Security

RSS Feed   
Database Administration Security Reports
 
Disaster Recovery Planning Ahead
sponsored by OffSiteDataSync and Veeam
EBOOK: A disaster recovery plan will help your organization resume business operations within an acceptable timeframe should an outage or emergency occur. Access this e-book to learn why disaster recovery plans are necessary for businesses of all sizes and get guidance for putting your plan into action.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

OffSiteDataSync and Veeam

The New Availability Standard for Nutanix AHV
sponsored by Veeam Software
WEBCAST: The customers have spoken and Veeam and Nutanix have teamed up, providing Nutanix AHV integration with Veaam Backup & Replication. Access this webcast to hear a discussion around native AHV protection, as well as how Veeam Backup & Replication fulfills Nutanix AHV’s backup and data protection requirements.
Posted: 29 Jan 2020 | Premiered: Jun 29, 2018

Veeam Software

State of the Firewall
sponsored by FireMon
WHITE PAPER: While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

FireMon

Oxipro Informatique Relies on StorageCraft for its Client Data Backup and Recover Needs
sponsored by StorageCraft Technology Corporation
CASE STUDY: Businesses handling client data to provide a need reliable and scalable data protection –otherwise they risk jeopardizing client data. Read this case study to see how a project management business put a data converged data protection platform to the test when handling sensitive client data during projects.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

StorageCraft Technology Corporation

Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications
sponsored by SearchSecurity.com
WHITE PAPER: Implementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

SearchSecurity.com

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012

Rapid7

A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
sponsored by IBM
WHITE PAPER: Access this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
Posted: 30 Oct 2013 | Published: 30 Sep 2012

IBM

Comparing IBM Informix and Oracle Database for High Availability and Data Replication, an ITG Management Report
sponsored by IBM
WHITE PAPER: In this report, get an in-depth comparison between Oracle Databases and Real Application Clusters (RAC) and IBM Informix with regards to high availability and data replication.
Posted: 02 May 2014 | Published: 31 Jan 2014

IBM

Advanced Performance Management for Today's Complex, Critical Databases
sponsored by Dell Software
WHITE PAPER: Read this informative resource to learn about how advanced performance management can help you meet the demands of high performance and around-the-clock uptime.
Posted: 16 Sep 2013 | Published: 16 Sep 2013

Dell Software

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info