IT Management  >   Systems Operations  >   Security  >  

Oracle Security

RSS Feed   
Oracle Security Reports
 
Data protection: Not just about personal data and compliance
sponsored by ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

ComputerWeekly.com

How to Implement a Strong COVID-19 Cybersecurity Plan
sponsored by SearchSecurity.com
EBOOK: Cybercriminals aren't slowing down during the pandemic, and neither can your security. Learn about the biggest threats right now and how to stop them cold.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

SearchSecurity.com

Veeam + HPE Nimble Storage: Five-Year ROI of 278%
sponsored by Veeam Software
WHITE PAPER: IDC interviewed organizations supporting their data backup and recovery environments with Veeam Cloud Data Management software combined with HPE Nimble Storage to see how it performed. Read this IDC white paper to learn the 8 benefits of this combined solution and see the results that customers experienced.
Posted: 29 Jan 2020 | Published: 29 Jan 2020

Veeam Software

IT Security Purchasing Intentions 2013
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

ComputerWeekly.com

The Enterprise Guide to SAP HANA's Cloud Models and Migration Checklist
sponsored by UXC Oxygen and Amazon Web Services
EGUIDE: If you're considering HANA but are unsure about SAP's models of cloud computing, you'll want to fully outline your deployment options before migration. Discover three options for cloud-based HANA, as well as 6-point checklist for crafting a successful cloud migration strategy.
Posted: 07 Nov 2016 | Published: 28 Oct 2016

UXC Oxygen and Amazon Web Services

MongoDB on Red Hat Enterprise Linux
sponsored by MongoDB, Inc.
WHITE PAPER: Check out this paper and discover how to deploy MongoDB onto Red Hat Enterprise 6.2. In addition to a step-by-step process for deployment, you'll also learn how to take advantage of features of the underlying system, several deployment scenarios for high performance database read and writes, and gain an in-depth look at MongoDB.
Posted: 27 Aug 2012 | Published: 01 May 2012

MongoDB, Inc.

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012

Rapid7

Don't Rush into Cloud Databases without a Well-Grounded Plan
sponsored by Data Intensity
EGUIDE: In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.
Posted: 17 Apr 2017 | Published: 07 Apr 2017

Data Intensity

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info