IT Management  >   Systems Operations  >   Security  >  

Database Security

RSS Feed   
ALSO CALLED: Oracle Security, Database Protection, SAP Security, SQL Server Security, Data Base Security, Database Administration Security
DEFINITION: The protection of a database from malicious attacks or accidental changes.
Database Security Reports
1 - 25 of 194 Matches Previous Page  |  Next Page
Creating a Multi-Layered Secured Postgres Database
sponsored by EnterpriseDB
WEBCAST: Ensuring your database security is up to par is a multifaceted challenge—you need to prevent unauthorized access and data corruption without restricting data access for your own employees. Watch this webinar to learn how industry experts create their own, open-source multi-layered Postgres database security.
Posted: 26 Oct 2020 | Premiered: Oct 26, 2020

EnterpriseDB

The Trusted Data Center and Server Infrastructure: Mid-Market Organizations
sponsored by Dell Technologies Partner Program
EBOOK: For highly competitive mid-market organizations, a data center outage can have devastating effects on the company’s reputation, legal standing and bottom line. This eBook provides best practices and strategic insights that mid-market IT leaders can use to improve the security and reliability of their IT environments.
Posted: 26 Oct 2020 | Published: 30 Nov 2019

Dell Technologies Partner Program

6 Critical Reasons for Office 365 Backup
sponsored by Veeam Software
WHITE PAPER: Access this white paper to learn the 6 reasons why backing up Office 365 is critical so you can close security gaps before your data is compromised.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Veeam Software

Secure VDI with NSX
sponsored by VMware International Unlimited Company
WEBCAST: What if you could build in a zero-trust architecture at the most granular level of the data center? And what if you could maintain that level of consistent security across dynamically created desktops? In this video, learn how you can microsegment your VDI environments with VMware NSX platform.
Posted: 14 Oct 2020 | Premiered: Jul 31, 2020

VMware International Unlimited Company

The Top 10 Reasons to Choose Oracle Autonomous Database
sponsored by Oracle Cloud
RESOURCE: Running a quality database can be resource intensive and time consuming. To overcome menial database headaches, companies are turning to automated solutions like Oracle’s Autonomous Database. Check out this list of the top 10 reasons customers choose the Oracle Autonomous Database to see why it’s becoming an increasingly popular solution.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Oracle Cloud

Security Best Practices for PostgreSQL
sponsored by EnterpriseDB
WHITE PAPER: Securing your PostgreSQL database is a multifaceted undertaking that involves evaluating everything from physical security to authentication protocols. Read this EnterpriseDB white paper to learn PostgreSQL security best practices as well as how to implement them in your own database.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

EnterpriseDB

Creating a Multi-Layered Secured Postgres Database
sponsored by EnterpriseDB
WEBCAST: When it comes to the mission-critical and often sensitive workloads you run on your databases, nothing short of the best security should be accepted. Watch this video to learn how you can create a multi-layered security architecture for your Posgres database, with features including authorization, authentication, and auditing.
Posted: 23 Sep 2020 | Premiered: Aug 19, 2019

EnterpriseDB

Best Practices for Database Consolidation
sponsored by Oracle and Intel®
EBOOK: Databases are essential for nearly everything, from mission critical operations to AI and ML training. But database infrastructure can become sprawling and fractured, limiting governance and efficiency. Read this e-book to learn how you can consolidate Oracle databases and improve your database ecosystem.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

Oracle and Intel®

Creating a Multi-layered Secured Postgres Database
sponsored by EDB
RESOURCE: Creating a database with multiple layers of security isn’t easy; and in today’s world of malware, strict data regulations, and cybercrime, data security is more important than ever. Watch this webinar to learn how you can create a multi-layered security architecture for your Postgres database, with authentication, authorization, auditing, and more.
Posted: 08 Sep 2020 | Published: 21 Aug 2019

EDB

Securing the Data Center in Just Four Steps
sponsored by VMware
WHITE PAPER: Security perimeters of yesterday are falling out of fashion due to their permeability, but securing east-west traffic can be expensive in a world of increasingly dynamic workloads. Enter a distributed, scale-out internal firewall, designed to monitor and protect east-west traffic to keep your data center secure. Read this white paper to learn more.
Posted: 28 Aug 2020 | Published: 30 Jun 2020

VMware

Building Secure Software in a Complex Environment
sponsored by MongoDB, Inc.
WHITE PAPER: While the primary goal of databases like MongoDB is to make data accessible and easy to work with, it would be pointless to have a database that is perfect to keep data on and vulnerable to cyberattacks at the same time. Read on to learn how MongoDB was able to build security into their scalable, accessible database.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

MongoDB, Inc.

Tintri Introduces SQL Integrated Storage
sponsored by Tintri
ANALYST REPORT: To learn more about SQL integrated storage and its cross-team benefits, as well as to view a new solution from Tintri in this area, download this exclusive Storage Switzerland white paper.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Tintri

Complexity in Cybersecurity Report
sponsored by IBM
ANALYST REPORT: Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats. Fill out this form to read more about it.
Posted: 07 Aug 2020 | Published: 31 May 2019

IBM

The Changing Face of Global Data Privacy: GDPR, CCPA, and Beyond
sponsored by MongoDB, Inc.
WHITE PAPER: For companies that collect user data, the GDPR was just the beginning of a regulatory onslaught; the CCPA signifies a start of a wave of similar legislation across another country, with more to follow. Check out this white paper to learn how you can map privacy controls to databases and meet data privacy requirements with MongoDB.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

MongoDB, Inc.

Scale Your Startup with MongoDB
sponsored by MongoDB, Inc.
WEBCAST: In this webcast, MongoDB Director Mike Lynn introduces MongoDB Atlas, their global database service which can simplify database scaling with the cloud in just a few clicks. Tune in to learn how to add users, manage access, and more.
Posted: 29 Jul 2020 | Premiered: Jul 29, 2020

MongoDB, Inc.

Kingminer –a Crypto-Jacking Botnet Under the Scope
sponsored by Bitdefender
WHITE PAPER: Kingminer is a piece of crypto-jacking malware that has been around since early 2018. It is an infection that begins from an SQL server process and exploits configuration flaws to obtain access to said server and schedules malicious commands for execution. Read this white paper for a technical analysis and how to know if you’ve been compromised.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Bitdefender

How Modern DevOps Teams Use MongoDB Atlas to Enhance Productivity
sponsored by MongoDB, Inc.
WHITE PAPER: DevOps has been a blessing for developers and companies ever since it burst onto the scene in 2008, but its use isn’t only limited to application development. Check out this white paper to learn how MongoDB is designed to integrate with DevOps teams and processes, guaranteeing high availability and unprecedented database visibility.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

MongoDB, Inc.

Loading DLLs for Illicit Profit: A Story About a Metamorfo Distribution Campaign
sponsored by Bitdefender
WHITE PAPER: Dynamic-link libraries (DLLs) are on-ramps into a network that tend to be overlooked. Hackers can hijack an organization’s DLLs leaving valuable company data vulnerable to attack and theft. Read this white paper for a closer look at how cybercriminals hack DLLs for illicit profit and how you may be able to prevent these criminals.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Bitdefender

Protecting Sensitive Data in and Around an Oracle Database
sponsored by Thales
DATA SHEET: When planning to secure sensitive data in an Oracle database, enterprises need to consider that sensitive data may reside in unanticipated locations outside of the database itself. Robust data security includes considering how to secure sensitive data surrounding the Oracle database. Read on to learn how to get started.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

Thales

Case Study: CIO interview - Stephen Docherty on NHS data sharing
sponsored by ComputerWeekly.com
EGUIDE: The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why
Posted: 03 Jul 2020 | Published: 03 Jul 2020

ComputerWeekly.com

Europe's controversial digital vision for the next decade
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.
Posted: 15 Jun 2020 | Published: 16 Jun 2020

ComputerWeekly.com

Automatic Whole Database Encryption – How It Works
sponsored by NetLib Security
WHITE PAPER: In this online white paper are three diagrams that show a simplified, brief outline of how Encryptionizer works. Read on to get started.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

NetLib Security

Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector
sponsored by NetLib Security
CASE STUDY: In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

Multitenancy Options in Postgres
sponsored by EDB
WHITE PAPER: This white paper will show you the different ways that Postgres can help you achieve a multitenant database architecture. Download now for a complete architectural overview and to view these 3 multitenancy options at your disposal.
Posted: 09 Mar 2020 | Published: 09 Mar 2020

EDB

How to Implement a Strong COVID-19 Cybersecurity Plan
sponsored by SearchSecurity.com
EBOOK: Cybercriminals aren't slowing down during the pandemic, and neither can your security. Learn about the biggest threats right now and how to stop them cold.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

SearchSecurity.com
1 - 25 of 194 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info