> Technology > Data Management > Database Security
 

Database Security

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 276 - 300 of 381Sort Results By: Published Date | Title | Company Name
White Paper Published By: Tripwire     Published Date: Jun 30, 2009
Find out how a robust configuration audit and control system can enable electronic submissions and signatures, and validate electronic data, in compliance with the FDA's mandatory submission of clinical trials records.
Tags : 
tripwire, integrity, data, clinical, electronic
    
Tripwire
White Paper Published By: IBM     Published Date: Jun 16, 2009
Establish and Maintain Secure Cardholder Data with IBM Payment Card Industry Solutions.
Tags : 
pci dss, ibm, mmdg, payment card industry, assessment
    
IBM
White Paper Published By: SafeData, LLC     Published Date: May 05, 2009
Surprisingly, 50% of small to medium sized businesses that have invested in a data availability and recovery solution may still be vulnerable to downtime. Download this free white paper to learn what you can do to avoid the same risk.  You'll also learn what your options are for reliable IBM iSeries data protection and recovery that make sense for your size business.
Tags : 
virtualization, safedata, safe, data, ibm iseries recovery
    
SafeData, LLC
White Paper Published By: VMware     Published Date: Mar 16, 2009
Mid-sized businesses have long struggled to protect their IT systems. Many firms are inadequately protected and mistakenly think that a disaster is rare and won’t happen to them anytime soon. This custom Yankee Group Report uses customer interviews, statistical data and Yankee Group SMB survey results to examine disaster recovery (DR) issues.
Tags : 
vmware, disaster recovery, smb, it system, it infastructure
    
VMware
White Paper Published By: InMage     Published Date: Feb 24, 2009
This paper describes a series of tests run to determine the viability of continuous data protection (CDP) using InMage DR Scout along with Agami Systems AIS 3000 series of unified storage systems.
Tags : 
inmage, dr scout, accenture, cdp, continuous data protection
    
InMage
White Paper Published By: InMage     Published Date: Feb 24, 2009
Leveraging DR-Scout: Howard Rice Lowers TCO and Streamlines Backups with a Disas­ter Recovery Solution Howard Rice Nemerovski Canady Falk & Rabkin P.C. is a San Francisco-based law firm with leading national and international practices, representing entities and individuals across a comprehensive range of practice areas.
Tags : 
inmage, backup windows, rising tco, dr-scout, disaster recovery
    
InMage
White Paper Published By: InMage     Published Date: Feb 24, 2009
Banking on DR: HeritageBank of the South’s Investment in Disaster Recovery Software Yields High Returns HeritageBank of the South is a community-oriented regional bank serving southwest Georgia and north central Florida. Founded in 1955, the company offers personal banking, commercial banking and investment services through eight full-service offices.
Tags : 
inmage, dr scout, heritage bank, disaster recovery software, data backup
    
InMage
Webinar Published By: IBM     Published Date: Feb 23, 2009
This webcast features addresses the challenges of protecting corporate and confidential data. It focuses on the untold story of data privacy and many of the compliance challenges that companies now face. The webcast features Dennis Gaughan and Cynthia Babb and is 55 minutes and 33 seconds.
Tags : 
ibm idm, data privacy, data security, database security, confidential data
    
IBM
White Paper Published By: IBM     Published Date: Feb 18, 2009
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Tags : 
ibm integrated data management, data privacy, data security, ibm optim data privacy solution, hackers
    
IBM
White Paper Published By: InMage     Published Date: Feb 18, 2009
Business-critical data and applications must be available around the clock or serious business disruption could result.
Tags : 
inmage, practical business protection, dr-scout, continuous data protection, cdp
    
InMage
White Paper Published By: InMage     Published Date: Feb 18, 2009
Enterprises Applications - the Challenge Businesses today rely on enterprise applications such as SAP, PeopleSoft, Siebel, Oracle and Microsoft SQL to provide day to day business operations.
Tags : 
inmage, dr-scout protection, database applications, tcp/ip, cost-effective disaster recovery
    
InMage
White Paper Published By: InMage     Published Date: Feb 18, 2009
It’s a fact: nearly 48 percent of first-time Disaster Recovery (DR) plan implementations fail due to inaccurate estimates of necessary resources. Due in large part to faulty methods of estimating resource requirements, such as analyzing logs generated by tape backup software, organizations come to conclusions that are drastically wrong.
Tags : 
inmage, dr implementation, rpo, recovery point objectives, drscout
    
InMage
White Paper Published By: InMage     Published Date: Feb 18, 2009
Companies of all sizes realize that near real-time business recovery is no longer a nice-to-have – it is becoming a new corporate must have. Competition, regulations and the 24x7 nature of businesses all push for continual application and data availability under almost any circumstances.
Tags : 
inmage, service level agreements, slas, enterprise business continuity, dcig
    
InMage
White Paper Published By: InMage     Published Date: Feb 18, 2009
During challenging economic times, companies are increasingly questioning every budget dollar they spend. Furthermore, companies are reviewing their core vendor relationships to assess which partnerships have lived up to their expectations vs. which have overpromised and under delivered.
Tags : 
inmage, roi, data protection, it spend management, drscout
    
InMage
White Paper Published By: InMage     Published Date: Feb 18, 2009
Disaster recovery involves continuous data availability and much more. Companies that understand the key steps to ensuring smooth recovery from a disaster can choose solutions that meet today’s need and tomorrow’s. This white paper explains the five steps that are necessary to develop and implement a disaster recovery plan, and recommends tools, techniques and best practices to make your efforts a success.
Tags : 
inmage, drp, disaster recovery plan, data management, rpo
    
InMage
White Paper Published By: InMage     Published Date: Feb 18, 2009
The concept of Continuous Data Technologies (CDT) emerged on the scene two years ago, and is now transforming the data storage industry. Nearly every major storage vendor has one or more CDT products in their offering roadmap, in addition to a vital community of emerging vendors who are the true innovators in this space.
Tags : 
inmage, taneja group, continuous data technologies, cdt, dr scout
    
InMage
White Paper Published By: InMage     Published Date: Feb 18, 2009
Replication has become a catchall phrase that while gaining in allure is also gaining in confusion – especially in the mid-tier where data is just as important as the high-end, but IT staffing and budgets are far more limited. IT people as well as vendors have a tendency to lump all data movement functions together as replication, regardless of the method or the reason.
Tags : 
inmage, esg, replication methodologies, replication applications, disaster recovery
    
InMage
Webinar Published By: IBM     Published Date: Feb 18, 2009
Let’s face it, DBAs have a tough job.  DBAs must manage a complex set of tasks including ensuring high performance and availability, maintaining business critical production applications and managing changes. 
Tags : 
: ibm integrated data management, dbas, performance monitoring, data management tools, data retention
    
IBM
White Paper Published By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : 
qualys, vm solution, vulnerability management, saas, database security
    
Qualys
White Paper Published By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…
Tags : 
secnap, network security, data security, compliance, osi
    
SECNAP Network Security Corporation
White Paper Published By: DataMotion     Published Date: Oct 02, 2008
This white paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and discusses the steps that an organization should take to mitigate the risks it faces from employee use of communication tools. Also included in this document are brief descriptions of the companies that have co-sponsored it.
Tags : 
certifiedmail, borderware, postini, symantec, workshare
    
DataMotion
White Paper Published By: CA Mainframe     Published Date: Sep 12, 2008
Data Professionals are now being asked to perform higher-level tasks and interact with businesses as “data stewards”.  In this survey, you will learn the challenges as outlined by over 850 data professionals. Get this CA-sponsored survey of the International DB2 Users Group (IDUG) conducted by Unisphere Research. The closer link between corporate performance and database performance is increasing pressure on data professionals to provide higher-level services to enterprise business customers.
Tags : 
database administrator, dba, database, data management, ca mainframe
    
CA Mainframe
White Paper Published By: Utimaco     Published Date: Aug 18, 2008
Data protection programs at most organizations are concerned with protecting sensitive data from external malicious attacks, relying on technical controls that include perimeter security, network/wireless surveillance and monitoring, application and point security management, and user awareness and education. In this paper, the different leakage points are mapped with regulations and best practices.
Tags : 
leak, leakage, data protection, pci, cardholder
    
Utimaco
White Paper Published By: Utimaco     Published Date: Aug 18, 2008
Despite the advances in encryption techniques and vastly improved computer capabilities, however, many of the fallacies and outdated understanding about encryption persist. Sometimes these myths are even being perpetuated in popular technology publications where some authors and editorial staff fail to do their research thoroughly.
Tags : 
data protection, data security, database security, protecting data, utimaco
    
Utimaco
White Paper Published By: Utimaco     Published Date: Aug 18, 2008
Most of today’s standards and compliance regulations are concerned largely with the protection of private data at rest, during transactions, and while it traverses network connections. Some of these regulations make specific recommendations or require particular technologies for compliance. For all of them, however, encryption can be employed to satisfy the protection requirements.
Tags : 
leak, leakage, data protection, pci, cardholder
    
Utimaco
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.