> Technology > Data Management > Database Security
 

Database Security

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 251 - 275 of 377Sort Results By: Published Date | Title | Company Name
White Paper Published By: Websense     Published Date: Oct 18, 2010
Data Loss Prevention (DLP) solutions are moving targets. They keep changing to meet evolving regulatory requirements and business needs. It's tough to select the best DLP solution. This white paper from leading information security research firm Securosis gives you an overview of the DLP industry, technologies, and architectures.
Tags : 
websense, dlp, data loss prevention, securosis, security
    
Websense
White Paper Published By: Iron Mountain     Published Date: Sep 13, 2010
Today, more organizations than ever recognize the value and convenience of using cloud backup to protect their data.
Tags : 
iron mountain, cloud, pc backup, recovery, connected
    
Iron Mountain
White Paper Published By: IBM     Published Date: Aug 30, 2010
Vendors in this market have been challenged in their attempts to gain market visibility and awareness for their products and for the benefits they can provide compared with just throwing more hardware at the problem.
Tags : 
ibm, database application, vendor, data archiving, erp
    
IBM
White Paper Published By: IBM     Published Date: Aug 30, 2010
Adopting an Integrated Data Management strategy can be a highly effective way to help IT support business growth, facilitate data governance and manage costs.
Tags : 
ibm, back-up, data quality, database management, knowledge and data management
    
IBM
White Paper Published By: IBM     Published Date: Aug 30, 2010
All enterprises dealing with private data in test environments should mask or generate test data to comply with regulations such as Payment Card Industry (PCI), the Health Insurance Portability and Accountability Act (HIPAA), Sarbanes-Oxley (SOX), and European Union (EU) as well as to protect against internal and external attacks.
Tags : 
ibm, test data privacy, compliance, data masking, payment card industry
    
IBM
White Paper Published By: IBM     Published Date: Aug 30, 2010
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
Tags : 
ibm, database security, enterprise, private data, privacy
    
IBM
White Paper Published By: IBM Software     Published Date: Aug 09, 2010
The following are what we believe to be the top findings in this study. We organized these findings according to five major themes that emerged: perceived threats to sensitive and confidential information, responsibility and accountability, impact on the organization, perceived value of a data protection program, and perception gaps between CEOs and other C-level executives.
Tags : 
ibm ouncelab, data protection, c-level executive uk, compliance, roi
    
IBM Software
White Paper Published By: IBM Software     Published Date: Aug 04, 2010
The path to creating a secure application begins by rigorously testing source code for all vulnerabilities and ensuring that use of the application does not compromise or allow others to compromise data privacy and integrity.
Tags : 
ibm ouncelab, secure application, testing source code, data privacy, security
    
IBM Software
White Paper Published By: IBM Software     Published Date: Aug 04, 2010
New research reveals that C-level executives feel good data protection efforts support organizational goals such as compliance, reputation, management or customer trust, but there is a lack of confidence in the ability to safeguard sensitive information.
Tags : 
ibm ouncelab, data protection, c-level executive us, compliance, roi
    
IBM Software
Webinar Published By: IBM Software     Published Date: Aug 04, 2010
Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why application security is a critical priority for 2010 and beyond. He will highlight the drivers in the marketplace, define what application security encompasses, explain the business impact of developing an application security strategy, provide insight into how to get started on implementing an application security process, and give examples of best practices of a solid application security approach.
Tags : 
ibm ouncelab, application security tools, best practices, database management, network security
    
IBM Software
White Paper Published By: Proofpoint     Published Date: Apr 23, 2010
Email security and compliance issues related to HIPAA healthcare privacy regulations for 2012.
Tags : 
database security
    
Proofpoint
White Paper Published By: Tripwire     Published Date: Apr 21, 2010
This paper includes key research findings, from a recent IDG survey, and strategies to overcome this legacy challenge.
Tags : 
tripwire, legacy log management, data security, compliance automation solutions, it security
    
Tripwire
White Paper Published By: Tripwire, Inc     Published Date: Mar 10, 2010
How to comply with the global standard without breaking the bank
Tags : 
tripwire, pci dss, payment card industry, data security standard, risk management
    
Tripwire, Inc
White Paper Published By: EMC Backup & Recovery Solutions     Published Date: Feb 05, 2010
Read this IDC white paper to understand the various approaches to solving today's backup and recovery challenges leveraging deduplication. The paper discusses how to dramatically improve IT economics by optimizing network bandwidth, backup windows, and storage footprint requirements in distributed and datacenter locations alike.
Tags : 
emc, data domain, efficiency, backup, recovery
    
EMC Backup & Recovery Solutions
White Paper Published By: Vertica     Published Date: Feb 01, 2010
How the Vertica Analytic Database is powering the new wave of commercial software, SaaS and appliance-based applications and creating new value and competitive differentiation for solution developers and their customers.
Tags : 
vertica, ec2, cdr, elastic, saas
    
Vertica
White Paper Published By: Tripwire     Published Date: Jan 26, 2010
Learn why that's so, why traditional log and event management solutions don't provide the answer, and how a modern integrated product does.
Tags : 
tripwire log center, event management, security event analysis, database, graphical tool
    
Tripwire
White Paper Published By: IBM     Published Date: Jan 05, 2010
Find out where you stand on the path to PCI compliance with our checklist of the"digital dozen" requirements.
Tags : 
ibm mmdg, credit card security, pci compliance, secure network, cardholder data
    
IBM
White Paper Published By: IBM     Published Date: Oct 23, 2009
In the IBM white paper, "Achieving end-to-end information security: Five critical steps," you'll learn a more sophisticated approach to information security.
Tags : 
data security, ibm, information security, data retention, service management
    
IBM
White Paper Published By: IBM     Published Date: Sep 10, 2009
With ever-increasing data growth worldwide, organizations must find smarter ways to store and manage their massive volumes of data. Learn how IBM® Tivoli® Storage Management software solutions help to maximize your current storage environment and reduce operational and capital costs while improving service and managing risks.
Tags : 
storage management, ibm, ibmtivoli, fastback, san
    
IBM
White Paper Published By: IBM     Published Date: Aug 25, 2009
Facing tough IT decisions? Get insight from midsize businesses like yours.
Tags : 
opinion research corporation, midmarket, ibm, midsize companies, it infrastructure
    
IBM
White Paper Published By: Neverfail Group     Published Date: Aug 21, 2009
This white paper discusses Windows high availability, with a focus on business drivers and benefits. Cost and real-world benefits are considered the two most important elements in choosing the right high availability solution.
Tags : 
database, microsoft, ms windows, windows, application security
    
Neverfail Group
White Paper Published By: Tripwire     Published Date: Jun 30, 2009
Find out how a robust configuration audit and control system can enable electronic submissions and signatures, and validate electronic data, in compliance with the FDA's mandatory submission of clinical trials records.
Tags : 
tripwire, integrity, data, clinical, electronic
    
Tripwire
White Paper Published By: IBM     Published Date: Jun 16, 2009
Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions.
Tags : 
pci dss, ibm, mmdg, payment card industry, assessment
    
IBM
White Paper Published By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : 
virtualization, safedata, safe, data, ibm iseries recovery
    
SafeData, LLC
White Paper Published By: VMware     Published Date: Mar 16, 2009
Mid-sized businesses have long struggled to protect their IT systems. Many firms are inadequately protected and mistakenly think that a disaster is rare and won’t happen to them anytime soon. This custom Yankee Group Report uses customer interviews, statistical data and Yankee Group SMB survey results to examine disaster recovery (DR) issues.
Tags : 
vmware, disaster recovery, smb, it system, it infastructure
    
VMware
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.