> Technology > Data Management > Database Security
 

Database Security

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 126 - 150 of 379Sort Results By: Published Date | Title | Company Name
White Paper Published By: Viavi Solutions     Published Date: Jun 30, 2014
News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.
Tags : 
network instruments, hacks, apm, security, pci
    
Viavi Solutions
Webinar Published By: HP     Published Date: Jun 27, 2014
Following a series of in-depth interviews with Senior IT professionals in various industries this video provides their findings and the direct and in-direct value derived from using HPs Backup, Recovery and Archiving solutions.
Tags : 
backup, recovery and archiving, hp solutions, storage, database security
    
HP
Free Offer Published By: Lancope     Published Date: Jun 21, 2014
Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.
Tags : 
lancope, cyberattack, cyber criminals, network security, hackers
    
Lancope
White Paper Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack
    
Palo Alto Networks
White Paper Published By: HP     Published Date: Jun 09, 2014
A Viewpoint paper on HP Information governance
Tags : 
information governance, information storage, database security, data warehousing
    
HP
White Paper Published By: Compass Datacenters     Published Date: Apr 07, 2014
Learn about the central issues that tend to be consistent across all Request for Proposals (RFPs) and see what questions you should be asking in order to maximize the efficiency of your mission critical data center.
Tags : 
rfp, request for proposal, questions, data centers, compass datacenters
    
Compass Datacenters
White Paper Published By: Webroot Inc     Published Date: Mar 05, 2014
Learn the top 5 malware trends for 2014 and how your organization can best protect against hackers and cyber thieves.
Tags : 
malware, security, cyber thieves, malware trends, security systems
    
Webroot Inc
White Paper Published By: Dell Software     Published Date: Feb 19, 2014
Discover what you need to know to successfully manage your diverse database infrastructures in this new white paper. Topics include: • Balancing key business metrics • Understanding a DBAs challenges • Finding the right tools to monitor and manage the database environment • ...and much more!
Tags : 
database development, database security
    
Dell Software
White Paper Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution
    
Lumension
White Paper Published By: CA Technologies     Published Date: Jan 06, 2014
This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.
Tags : 
mediacom, digital identities, open business, business growth, access management
    
CA Technologies
White Paper Published By: Adobe     Published Date: Nov 25, 2013
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer? Please download to learn more.
Tags : 
it management environment, document integration, document security, mobile, mobile apps
    
Adobe
Case Study Published By: GetWellNetwork, Inc.     Published Date: Nov 22, 2013
Learn how to improve the efficiency of your pain management workflow and see how these changes will improve the day to day tasks for your nurses allowing them to work more effectively.
Tags : 
getwell network, pain management, pain management workflow, joint commission, pain assessment documentation
    
GetWellNetwork, Inc.
White Paper Published By: Arcserve     Published Date: Nov 19, 2013
Learn how to handle the hidden complexities virtualization introduces to backup and recovery requirements and how to refine your disaster recovery process.
Tags : 
backup, recovery, virtualization, storage, public cloud
    
Arcserve
White Paper Published By: Arcserve     Published Date: Nov 19, 2013
Learn why certain current practices for data protection are costing your organization money and learn the best practices for how to make the most out of your limited budget.
Tags : 
budget, virtualization, it infrastructures, hidden costs, backup
    
Arcserve
White Paper Published By: Arcserve     Published Date: Nov 19, 2013
Learn how to properly select an IT solution for your organization in 5 easy steps in order to cut costs and improve productivity.
Tags : 
backup, backup storage, cloud storage, disaster recovery, infrastructure visualization
    
Arcserve
White Paper Published By: Imperva     Published Date: Nov 07, 2013
This white paper outlines the application threat landscape; explains why next generation firewalls are ill-equipped to stop web attacks; and provides six essential requirements for protecting web applications.
Tags : 
imperva, web applications, web application security, ddos, web attack
    
Imperva
White Paper Published By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : 
qualys, security, cloud, internet ecosystem, cloud computing
    
Qualys
White Paper Published By: Qualys     Published Date: Nov 05, 2013
Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.
Tags : 
qualys, securosis, vulnerability, vulnerability management, scanning
    
Qualys
White Paper Published By: Nimble Storage     Published Date: Oct 28, 2013
Understanding the latest developments in storage technology is crucial when planning a virtual server storage architecture, and choosing the wrong storage architecture can dramatically impair your ability to provide application resources and recoverability. This best practices guide will show you how to lay the foundation for an efficient, easy-to-manage storage environment.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory
    
Nimble Storage
Case Study Published By: Mimecast     Published Date: Oct 17, 2013
Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) global enterprises may realize by using Mimecast’s Unified Email Management (UEM) solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the full Mimecast UEM service on their organizations. Mimecast UEM is a suite of email security, archiving, and continuity services, which can also be purchased separately if required.
Tags : 
mimecast, forrester research, unified email management, uem, economic impact
    
Mimecast
White Paper Published By: IBM     Published Date: Oct 10, 2013
Many IT executive view cloud computing as an attractive platform for data backup. They know cloud can help protect business-critical data and provide near-ubiquitous information access. But while having a cloud-based solution is valuable, developing one in-house is tricky. That's why many organizations want to contract with a third-party cloud provider for cloud-based data backup. Read this buyer's guide to learn how to choose a provider to suit your business needs.
Tags : 
cloud based, data backup, cloud based data, buyers guide, third-party provider
    
IBM
White Paper Published By: IBM     Published Date: Oct 10, 2013
Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster recovery strategy successful, and the key questions you need to ask before bringing disaster recovery in-house.
Tags : 
disaster recovery, do it yourself, ibm, forrester, recovery speed
    
IBM
White Paper Published By: IBM     Published Date: Oct 10, 2013
Zurich Insurance suffered a major flooding incident in 2011 that put their office out of commission for almost a month. The company invoked its disaster recovery plan and moved 120 staff to IBM’s Damastown Technology Campus. Read the case study to find out how planning and working with IBM helped Zurich Insurance cope with this serious incident.
Tags : 
disaster recovery, zurich insurance, flooding, recovery, natural disaster
    
IBM
White Paper Published By: GlobalSCAPE     Published Date: Oct 10, 2013
This whitepaper examines the "Bring Your Own Device" (BYOD) movement, from carrying around a floppy disk to today's "cloud" services.
Tags : 
globalscape, ftp, mft, secure file transfer, cloud sharing
    
GlobalSCAPE
White Paper Published By: Dell     Published Date: Aug 16, 2013
"Virtualization has changed the data center dynamic from static to fluid. While workloads used to be confined to the hardware on which they were installed, workloads today flow from host to host based on administrator-defined rules, as well as in reaction to changes in the host environment. The fluidic nature of the new data center has brought challenges to resource allocation; find out how your organization can stay ahead of the curve. Read the White Paper"
Tags : 
best practices, cpu, memory, storage, vsphere
    
Dell
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.