IT Management  >   Systems Operations  >   Security  >  

Oracle Security

RSS Feed   
Oracle Security Reports
 
Best practices in security with PostgreSQL
sponsored by EnterpriseDB
WEBCAST: When it comes to implementing better database security, there are a wide range of measures and steps to be taken. Some of these are obvious, like restricting physical access to your DB. Others, however, are less apparent. Tune in to this webinar to learn security best practices for PostgreSQL—specifically related to data breaches.
Posted: 13 Nov 2020 | Premiered: Nov 13, 2020

EnterpriseDB

5 Things To Include On Your Postgresql Security Checklist
sponsored by EnterpriseDB
WHITE PAPER: Explore this short guide to learn how you can better manage 5 key PostgreSQL security features, including access security, authentication, encryption, and more.
Posted: 03 May 2021 | Published: 03 May 2021

EnterpriseDB

CW Europe: December 2016 - February 2017
sponsored by ComputerWeekly.com
EZINE: Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.
Posted: 05 Dec 2016 | Published: 15 Dec 2016

ComputerWeekly.com

Data Protection in the Enterprise
sponsored by HelpSystems
WHITE PAPER: Every organization is challenged by exponential data growth. A data classification solution not only helps identify the data in your IT environment, but it monitors your data at creation and as it moves throughout your organization. Read this white paper to learn how the Titus Classification Suite can help meet your data classification needs.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

HelpSystems

The Trusted Data Center And Server Infrastructure:
sponsored by Dell Technologies
EBOOK: For highly competitive mid-market organizations, a data center outage can have devastating effects on the company’s reputation, legal standing and bottom line. This eBook provides best practices and strategic insights that mid-market IT leaders can use to improve the security and reliability of their IT environments.
Posted: 26 Oct 2020 | Published: 30 Nov 2019

Dell Technologies

Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications
sponsored by SearchSecurity.com
WHITE PAPER: Implementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

SearchSecurity.com

Ponemon Study: 2011 Cost of a Data Breach
sponsored by Symantec Corporation
WHITE PAPER: This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Posted: 25 May 2012 | Published: 31 Mar 2012

Symantec Corporation

Expert tips and considerations for database appliances
sponsored by Delphix
EGUIDE: This e-guide from SearchCIO.com takes a look at one organization's quest to find the right database appliance that suited their needs. Read now for an in-depth analysis of current database appliance offerings, as well as relevant considerations for database security.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

Delphix

Webroot  Endpoint Security eBook
sponsored by Webroot
EBOOK: This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot

Data protection tool that's easy to install & configure
sponsored by Informatica
DATA SHEET: Read this exclusive resource to uncover all the ins-and-outs of one industry-leading data protection tool.
Posted: 07 May 2014 | Published: 31 Dec 2013

Informatica
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences