IT Management  >   Systems Operations  >   Security  >  

Oracle Security

RSS Feed   
Oracle Security Reports
 
9 Steps to Critical Event Management Improvement
sponsored by EverBridge Inc.
EGUIDE: By leveraging a holistic approach to CEM, organizations can look forward to a more unified, distributed, automated, and collaborative process. Access this white paper to discover an essential 9-step CEM process that organizations can use to improve their responses to critical events.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

EverBridge Inc.

Building confidence in data security
sponsored by ComputerWeekly.com
ANALYST REPORT: Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

The future of databases in APAC
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the promises of autonomous databases, why relational databases are poor at running digital transformation projects, and why Amazon Web Services decided to switch off its Oracle data warehouse.
Posted: 09 Jan 2019 | Published: 09 Jan 2019

ComputerWeekly.com

The Changing Role of Backup and Secondary Storage
sponsored by Veeam Software
WHITE PAPER: Designing an enterprise backup system is a complex process where customers need to gather requirements, evaluate multiple solutions, and do their homework to acquire the expertise to deploy it themselves. Read this white paper to learn how HCI can alleviate the strains of traditional, multi-vendor backup environments.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

Veeam Software

Webinar: You Need Live Patching to Achieve SOC2 Compliance
sponsored by CloudLinux
VIDEO: In this webinar, join industry experts as they share best practices and use cases of data protection and vulnerability management for maintaining compliance in their Linux-based systems. Continue to view the webinar.
Posted: 24 Jan 2020 | Premiered: 11 Jul 2019


Cyber Vulnerability Index 2012
sponsored by ComputerWeekly.com
RESEARCH CONTENT: More than three-quarters of the Forbes 2000 companies leak potentially dangerous data that could be exploited by hackers, this research from KPMG reveals.  The report explains the risks and the actions companies need to take to protect themselves.
Posted: 31 Aug 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Computer Weekly – 26 March 2019: A 'stunning victory' in Post Office Horizon trial
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report on the latest news from the court case about the controversial Post Office Horizon IT system. IT leaders share their views on creating a strategy for the digital age. And the CIO of Halfords talks about cloud, data analytics and emerging technologies. Read the issue now.
Posted: 22 Mar 2019 | Published: 26 Mar 2019

ComputerWeekly.com

Expert tips and considerations for database appliances
sponsored by Delphix
EGUIDE: This e-guide from SearchCIO.com takes a look at one organization's quest to find the right database appliance that suited their needs. Read now for an in-depth analysis of current database appliance offerings, as well as relevant considerations for database security.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

Delphix

Secure File Transfer Tech Guide
sponsored by SearchSecurity.com
EGUIDE: Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

SearchSecurity.com

Thinking strategically about mobility and enterprise data
sponsored by AppSense
WHITE PAPER: IT professionals face new governance challenges as a result of the transformation of enterprise computing. The demand for mobile productivity is constantly growing, and IT leaders need to find solutions for mobility without sacrificing efficiency or governance.
Posted: 09 Jul 2012 | Published: 09 Jul 2012

AppSense
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info