> Technology > Data Management > Database Security
 

Database Security

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 101 - 125 of 379Sort Results By: Published Date | Title | Company Name
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security, security, virtualization
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, database security
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security, security, virtualization
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, database security
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security, security, virtualization
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, database security
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security, security, virtualization
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response of a data security breach.
Tags : 
the cost of a data breach, business costs of a data breach, responses to a data breach, database security
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, database security
    
Symantec
White Paper Published By: GreenSQL     Published Date: Nov 11, 2014
This report provides the 10 essential SQL server security tasks
Tags : 
sql server, insider breach, insider threat, firewalls, compliance
    
GreenSQL
White Paper Published By: GreenSQL     Published Date: Nov 11, 2014
This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL server. These best practices cover operative instructions and example code snippets needed for DBAs and Server Administrators.
Tags : 
sql server, insider breach, insider threat, firewalls, compliance
    
GreenSQL
White Paper Published By: Arbor     Published Date: Sep 17, 2014
Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables
Tags : 
firewall, firewall protection, it security, cyber defense, security
    
Arbor
White Paper Published By: Dell     Published Date: Sep 17, 2014
As the 3 V’s of big data: volume, velocity and variety continue to grow, so too does the opportunity for finance sector firms to capitalize on this data for strategic advantage. Read how.
Tags : 
dell, finance data, data storage, financial records, secure finance
    
Dell
White Paper Published By: Lenovo     Published Date: Sep 16, 2014
Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve mobility and BYOD demands. Though traditional VDI vendors bring their own solutions to market, isn’t it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services can be most compatible, agencies can take a smarter approach to these difficult decisions. See the tradeoffs in plain English, and learn why more agencies are taking notice to emerging cloud technologies through this exclusive executive summary.
Tags : 
vdi, cloud alternatives, byod demands, emerging web technologies, database security
    
Lenovo
White Paper Published By: Lenovo     Published Date: Sep 16, 2014
Agency IT is tasked with building smarter and more responsive state and local government services, while CTOs look to enable government workforce mobility and address strategic issues, such as BYOD. Adding to the challenge is a rise in devices, data, and even multiple OS’s that IT must support and secure. With the decline in traditional Windows-based computing, these challenges are driving agencies toward cloud solutions that don't sacrifice security or IT manageability. See our featured cloud solution for government agencies that has IT leaders re-thinking how they enable mobile productivity.
Tags : 
agency it, workforce mobility, mobile productivity, cloud computing, it management
    
Lenovo
White Paper Published By: EMC     Published Date: Sep 11, 2014
This paper focuses on Data Domain Boost and the many benefits it provides compared to doing traditional backups. Its purpose is to explain the technical and business reasons why DD Boost will change the way you do backups.
Tags : 
data domain boost, ddb, backups, data protection, data backup
    
EMC
White Paper Published By: EMC     Published Date: Sep 11, 2014
This paper focuses on Data Domain technology leadership and differentiation and why it matters to you. The purpose of this paper is to explore the technical and financial reasons why Data Domain systems are ideal for backup and archiving in your environment.
Tags : 
data domain technology, benefits of data domain, backup and archiving emc, database security
    
EMC
White Paper Published By: Delphix     Published Date: Sep 10, 2014
Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix’s Agile Masking solution is the only product that solves both masked data creation and delivery challenges.
Tags : 
secure data, digitization, data breaches, privacy regulations, sensitive data
    
Delphix
Case Study Published By: CenturyLink Technology Solutions     Published Date: Aug 22, 2014
Read, “IEX Builds a New Class of Trading Venue Using a Range of Managed Data Center Services” now and discover how IEX partnered with CenturyLink to break the mold with its new trading system.
Tags : 
centurylink, colocation, power and cooling, data center power, infrastructure
    
CenturyLink Technology Solutions
Webinar Published By: IBM     Published Date: Jul 22, 2014
Join this session to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.
Tags : 
ibm, cloud, cloud storage, storage, storage environment efficiency
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.