IT Management  >   Systems Operations  >   Security  >  

Database Security

RSS Feed   
ALSO CALLED: Oracle Security, Database Protection, SAP Security, SQL Server Security, Data Base Security, Database Administration Security
DEFINITION: The protection of a database from malicious attacks or accidental changes.
Database Security Reports
126 - 150 of 167 Matches Previous Page  |  Next Page
Implementing Database Security and Auditing: Using Granular Access Control
sponsored by Guardium, an IBM Company
WHITE PAPER: In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system.
Posted: 27 Sep 2010 | Published: 27 Sep 2010

Guardium, an IBM Company

Database Security: Audit and Protect Critical Databases
sponsored by Imperva
WHITE PAPER: Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
Posted: 07 Sep 2010 | Published: 07 Sep 2010

Imperva

Reduce Risks and Protect Critical Information with Ease - Presentation Transcript
sponsored by Symantec
PRESENTATION TRANSCRIPT: The threat landscape is consistently evolving and today's cyber threats are getting stealthier. With these changes, businesses are finding that anti-virus only solutions are not enough to completely protect their business from risk.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

Symantec

Why Your Organization Needs to Implement DLP
sponsored by Trend Micro, Inc.
WHITE PAPER: Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010

Trend Micro, Inc.

Video: Oracle Active Data Guard
sponsored by Oracle Corporation
VIDEO: Watch this brief video for an informative explanation of how Oracle Active Data Guard makes better use of the standby database to complement the functionality of the production database and significantly increase software and hardware return on investment.
Posted: 30 Jun 2010 | Premiered: 30 Jun 2010

Oracle Corporation

Introducing Microsoft SQL Server 2008 R2
sponsored by Microsoft
EBOOK: Learn about all of the exciting enhancements and new capabilities engineered into SQL Server 2008 R2 that will have a positive impact on your applications, ranging from improvements in operation to those in management.
Posted: 25 Jun 2010 | Published: 25 Jun 2010

Microsoft

Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER: Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements
sponsored by IBM
PRODUCT LITERATURE: High transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements.
Posted: 03 May 2010 | Published: 03 Feb 2010

IBM

Information Security Magazine: May 2010 - Data: Do you know where it’s going?
sponsored by Information Security Magazine
EZINE: This month’s cover story deals with database activity monitoring and how to keep vigilant watch over your data. Other features cover new stealthy and sophisticated malware that aims at hijacking business banking accounts and Windows 7 operating system security improvements. Read on and take a look at all three featured articles and much more.
Posted: 03 May 2010 | Published: 03 May 2010

Information Security Magazine

Secure File Transfer Solution Saves Bank Time and Money
sponsored by Linoma Software
CASE STUDY: Integra Bank needed to secure systems with role-based data access. They accomplished this with GoAnywhere Director from Linoma Software. Additionally they were able to automate and secure file transfers, consolidate processing applications and provide SOX and other compliance audit reports. Read this white paper to learn more.
Posted: 24 Mar 2010 | Published: 24 Mar 2010

Linoma Software

Presentation Transcript: The Business Case for Database Activity Monitoring-- Who's Watching the Watchers?
sponsored by Guardium, an IBM Company
PRESENTATION TRANSCRIPT: This Presentation Transcript is an introduction to database activity monitoring and covers the basics of how this important technology works. It also offers tips on how to demonstrate to business leaders that database activity monitoring can not only help data protection efforts, but can also augment an organisational compliance program.
Posted: 16 Mar 2010 | Published: 16 Mar 2010

Guardium, an IBM Company

IT Decision Checklist: SIMs and Log Management
sponsored by LogLogic, Inc.
EGUIDE: In this paper, you'll learn that Security information management systems are effective platforms for the collection, analysis and storage of events from a broad range of systems and devices. We'll outline what you should look for to get the most relevant data from SIMs.
Posted: 05 Jan 2010 | Published: 05 Jan 2010

LogLogic, Inc.

Information Security Magazine - December 2009 / January 2010: Basic Database Security
sponsored by Information Security Magazine
EZINE: This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more.
Posted: 14 Dec 2009 | Published: 14 Dec 2009

Information Security Magazine

Databases at Risk: Current State of Database Security (Enterprise Strategy Group)
sponsored by IBM
ANALYST BRIEF: This ESG Research Brief analyzes the current state of database security and categorizes databases as a “dangerous and growing security gap”. Read this brief which offers steps to improve database security across the enterprise.
Posted: 30 Nov 2009 | Published: 25 Sep 2009

IBM

Presentation Transcript: Insider Threats -- an Interview with Bill Crowell -- Former Deputy Director of the NSA
sponsored by Imperva
PRESENTATION TRANSCRIPT: Bill Crowell, former Deputy Director of the NSA, is interviewed in this presentation transcript. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection – especially around mission-critical applications and databases.
Posted: 12 Nov 2009 | Published: 12 Nov 2009

Imperva

Anatomy of a Database Attack
sponsored by Imperva
WEBCAST: Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
Posted: 12 Nov 2009 | Premiered: Nov 12, 2009

Imperva

Presentation Transcript: MS SQL Server 2008
sponsored by Fusion-IO
PRESENTATION TRANSCRIPT: Check out this transcript of a presentation given by Sumeet Bansal, Fusion-io Principal Solutions Architect, to learn how Fusion-io solutions enhance SQL server performance, improve customer experience, and optimize storage management systems.
Posted: 12 Oct 2009 | Published: 30 Sep 2009

Fusion-IO

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment
sponsored by Dell Software
WHITE PAPER: This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs.
Posted: 02 Oct 2009 | Published: 02 Oct 2009

Dell Software

Edison Group, Comparative Management Costs Study: Oracle Database 11g vs. Microsoft SQL Server 2008
sponsored by Oracle Corporation
WHITE PAPER: In this whitepaper presented by the Edison Group, reveals how Oracle Database widens the manageability lead over Microsoft SQL Server 2008. The study shows how Oracle Database can save 43% in time and 41% in database management costs over Microsoft SQL Server 2008.
Posted: 09 Sep 2009 | Published: 15 Jul 2009

Oracle Corporation

Using Encrypting File System to Protect Microsoft Dynamics CRM Data on a V3c Client Running Windows XP Professional
sponsored by Microsoft
WHITE PAPER: This white paper explains how to use Encrypting File System (EFS), a feature that is provided by default in the Windows® operating system, to protect data in Microsoft Dynamics CRM clients for Outlook Compatibility Update running on Windows XP Professional Service Pack 2 (SP2).
Posted: 25 Aug 2009 | Published: 28 Jun 2007

Microsoft

Database Crime Scene Prevention
sponsored by Imperva
TECHNICAL ARTICLE: This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods.
Posted: 19 Aug 2009 | Published: 20 Feb 2009

Imperva

Presentation Transcript: Continuous Data Protection (CDP) Strategies for the Enterprise
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: This presentation will discuss the pros and cons of CDP, how it fits into your architecture and DR plan, and ultimately whether it's a good fit for your organization.
Posted: 09 Jun 2009 | Published: 06 May 2009

Symantec Corporation

Customer Success Story: Sony Online Replaces Oracle with EnterpriseDB
sponsored by EnterpriseDB Corporation
CASE STUDY: Read this customer success story to discover why Sony Online Entertainment replaced it's existing Oracle database solution with EnterpriseDB's Postgres Plus® Advanced Server, providing enhanced performance, scalability, and cost savings.
Posted: 28 Apr 2009 | Published: 29 Apr 2009

EnterpriseDB Corporation

BMC Software Hybrid Copy Techniques
sponsored by BMC Software, Inc.
WHITE PAPER: Because organizations are demanding 24x7 availability from their IMS, DB2®, and VSAM applications, it is imperative that those applications do not experience outages. Read this white paper to find out how BMC's Hybrid Copy techniques help for faster system recovery in the event of a local outage.
Posted: 17 Apr 2009 | Published: 17 Apr 2009

BMC Software, Inc.

Data Loss Prevention Survey
sponsored by Symantec Corporation
ASSESSMENT TOOL: Take this quick, 5 question survey on data loss prevention (DLP) and be entered to win one of two 8GB iTouch giveaways.
Posted: 02 Apr 2009 | Published: 02 Apr 2009

Symantec Corporation
126 - 150 of 167 Matches Previous Page    4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences