> Technology > Data Management > Database Security
 

Database Security

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 176 - 200 of 377Sort Results By: Published Date | Title | Company Name
White Paper Published By: Voltage Security     Published Date: Sep 13, 2012
If there are any lingering doubts that mobile de-vices-such as smartphones and tablets-have profoundly transformed today's business, one study finds that using smart devices for produc-tivity is "now the standard.
Tags : 
data security, smart devices, smart security, data security strtegy, mobile security
    
Voltage Security
White Paper Published By: EVault Inc.     Published Date: Aug 22, 2012
Go hybrid and get the best of both data protection worlds. Cloud-connected backup and recovery seamlessly combines cloud-based and onsite data protection technologies for fast, local restores and ensured, offsite disaster recovery. Read the white paper to: . Discover the benefits of transitioning from tape to disk . Learn how to get shorter backup windows and faster recovery times . Ensure your data is totally secure and easily recovered
Tags : 
white paper, cloud, connected, backup, recovery
    
EVault Inc.
White Paper Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal
    
ForeScout
White Paper Published By: SunGard     Published Date: Aug 14, 2012
When considering business continuity and disaster recovery (BC/DR), a failed recovery means discontinued business. having systems inoperable and people unavailable for a matter of days or even hours can be disastrous in terms of lost revenue, customer dissatisfaction, and negative press. it is therefore critical to understand the root-causes behind why recoveries fail the first place.
Tags : 
sungard, failed, recoveries, business, disaster
    
SunGard
White Paper Published By: SunGard     Published Date: Aug 14, 2012
CHALLENGE: Florida Hospital performs recovery tests twice a year, recovering more than 100 applications. The healthcare organization needed a recovery strategy that improved communication and efficiency, managed a complex change control process, and that would keep staff at home during a disaster. SunGard Solution: With the Managed Recovery Program, SunGard is Florida Hospital's recovery team, ensuring recovery configurations keep pace with production changes, managing recovery test execution, and providing a single point of contact for the complete recovery program.
Tags : 
sungard, expertise, management, florida, hospital
    
SunGard
White Paper Published By: HP and Intel     Published Date: Aug 13, 2012
This DCIG report details how HP 3PAR F-class midrange arrays provide enhanced levels of VMware integration and optimized virtual machine density so users experience levels of VMware efficiency, performance and visibility well beyond what other midrange arrays natively provide.
Tags : 
hp 3par storage, vsphere integration, virtualization, virtualized environments, data storage
    
HP and Intel
White Paper Published By: SunGard     Published Date: Aug 13, 2012
Most organizations today understand that a disaster recovery (DR) plan is essential to their continued survival should a natural disaster occur. But implementing a DR plan entails substantial time, effort and cost - not to mention significant investment in developing new areas of technical expertise within the organization. As a result, many organizations are turning to disaster recovery service providers (DRSPs) to offload their disaster recovery operations.
Tags : 
sungard, recovery, service, organizations, disaster
    
SunGard
White Paper Published By: Intel Corp.     Published Date: Aug 08, 2012
The report outlines the benefits of using HP StoreOnce with NetBackup's integrated Network Data Management Protocol (NDMP) backup capabilities to enhance administrators' abilities to effectively manage NDMP-enabled NAS server backup and recovery.
Tags : 
using, storeonce, ndmp, backup, symantec
    
Intel Corp.
White Paper Published By: Intel Corp.     Published Date: Aug 08, 2012
Evaluator Group worked with HP to access the features, performance and enterprise capabilities of the HP StoreOnce B6200 Backup system. HP labs and equipment were utilized, with testing under the direction of on-site Evaluator Group personnel. Testing focused on validating high availability features, performance, and application integration.
Tags : 
evaluator, group, storeonce, b5200, backup
    
Intel Corp.
White Paper Published By: Epicor     Published Date: Aug 02, 2012
Risk-averse distributors may feel that the safest and simplest IT strategy is to stay with their existing "homegrown" enterprise resource planning (ERP) solution. But just as sticking your money under the mattress offers no protection against inflation, maintaining an outdated system can rob you of a distinct competitive advantage. Modern ERP systems offer so much more in terms of data access, technology advances, and standard operating procedures. And obtaining a solution from a leading ERP provider ensures that industry best practices and the experiences of other distributors and end users have been built in. Check out this new paper and learn more about the advantages of an integrated ERP over your homegrown system.
Tags : 
white paper, homegrown, erp software, erp software solution, data management
    
Epicor
White Paper Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec
    
CDW Symantec
White Paper Published By: Equinix     Published Date: Jul 31, 2012
This GigaOM Pro paper explores what functions to consider when selecting and working with hosting providers as it relates to the entire value chain of function and performance. Get your complimentary 6-page report now.
Tags : 
gigaom, pro, enterprise, cloud, equinox
    
Equinix
White Paper Published By: Datalink     Published Date: Jul 27, 2012
Running IT as a service (ITaaS) is not necessarily a new concept. But, the era of cloud computing now places a whole new spin on ITaaS. In this white paper, you'll learn why there is so much buzz around cloud services and the role IT should play in this new cloud-based era. You'll also learn a useful model to help transform your company's IT data center into a private cloud that can ultimately manage and oversee the delivery of both internal and external cloud services to the business.
Tags : 
datalink, cloud, buy, build, itaas
    
Datalink
White Paper Published By: AMD     Published Date: Jul 23, 2012
How Microsoft Hyper-V and AMD Opteron Processors Enable True Business Agility.
Tags : 
virtualization, cloud computing, data mirgation, virtualized machines, virtual server performance
    
AMD
White Paper Published By: IBM     Published Date: Jul 13, 2012
As you move forward with your cloud initiative, it's critical to develop an effective resiliency management program so that your business remains protected in your new environment. This white paper discusses the key elements that make up a successful cloud-based strategy and examines the critical business areas and functions you'll need to assess.
Tags : 
ibm, technology, cloud, cloud computing, resiliency
    
IBM
White Paper Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Is data changing the way you do business?Is it inventory sitting in your warehouse? The good news is data-driven applications enhance online customer experiences, leading to higher customer satisfaction and retention, and increased purchasing.
Tags : 
it planning, data, data-driven applications, data challenges, data solutions
    
Red Hat, Inc.
White Paper Published By: Red Hat, Inc.     Published Date: Jul 10, 2012
Today, as IT departments struggle to design and implement solutions capable of managing exponential data growth with strict requirements for application scale and performance, many of them are turning to in-memory data grids (IMDGs).
Tags : 
it departments, data growth, managing data growth, application scale, application performance
    
Red Hat, Inc.
White Paper Published By: Box     Published Date: May 31, 2012
Read how organizations are realizing massive productivity gains by transitioning their content management solutions to cloud-based models.
Tags : 
free online storage, online storage, file sharing, online file storage, share files online
    
Box
White Paper Published By: Box     Published Date: May 31, 2012
Read how one company's continuing consolidation of file sharing technologies reaped benefits that any organization may derive by undertaking that effort.
Tags : 
sharing, dow, free online storage, online storage, file sharing
    
Box
White Paper Published By: Symantec.cloud     Published Date: May 11, 2012
The Symantec 2012 Endpoint Security Best Practices Survey reveals that organizations employing best practices are enjoying dramatically better outcomes when it comes to endpoint protection, and many of these best practices can-and should-be leveraged by SMBs.
Tags : 
symantec, cloud, endpoint security, technology, smb
    
Symantec.cloud
White Paper Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security
    
Forrester
White Paper Published By: Netezza IBM US     Published Date: May 08, 2012
As you read this paper, temporarily put aside notions of how a database management system should work, and be open to new ways of thinking. Be prepared to do less, not more, to achieve a better result.
Tags : 
teradata, netezza, ibm, data management, technology
    
Netezza IBM US
White Paper Published By: Oracle     Published Date: Apr 03, 2012
SOA implementations tend to be complex, IT decision makers should carefully consider their choice of a SOA platform in terms of its ability to simplify the fundamental development, deployment, and management tasks involved. Read on.
Tags : 
oracle soa, 11g, oracle, design, eploy
    
Oracle
White Paper Published By: Oracle     Published Date: Apr 03, 2012
Read this white paper for an explanation of how business process management melds with complex event processing. The combination nets intelligent business processes that react to changing business conditions in real time.
Tags : 
bpm, business process management, cep, complex event processing, oracle
    
Oracle
White Paper Published By: Oracle     Published Date: Apr 03, 2012
This IDC study uses the IDC MarketScape model to assess capabilities of vendors to support complex process improvement scenarios using BPM software.
Tags : 
3-6245825015, analytical applications, business intelligence, database development, data integration
    
Oracle
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.