> Technology > Data Management > Database Security
 

Database Security

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 76 - 100 of 381Sort Results By: Published Date | Title | Company Name
White Paper Published By: Docusign     Published Date: Feb 18, 2015
This paper illustrates the risks of using "wet-ink" signatures in the Cloud and the reason why e-signature is the best solution.
Tags : 
wet-ink risks, wet-ink risks in the cloud, e-signature, e-signature best solution, cloud technology
    
Docusign
White Paper Published By: Juniper Networks     Published Date: Feb 18, 2015
Find out why an open, scalable network architecture is essential for enhanced IT security in the cloud era. This eBook explains how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.
Tags : 
juniper, juniper networks, security, network security, database security
    
Juniper Networks
Webinar Published By: Juniper Networks     Published Date: Feb 18, 2015
Discover how a dynamic, intelligent firewall can improve your security. This Webinar talks about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall solutions.
Tags : 
firewall, network, business assets, security, management
    
Juniper Networks
White Paper Published By: Juniper Networks     Published Date: Feb 18, 2015
Learn about the challenges as you deploy hybrid clouds. The Forrester Report analyzes the views and approaches of IT decision-makers who have already begun their journey to the hybrid cloud.
Tags : 
hybrid clouds, network, data center, automation, network virtualization
    
Juniper Networks
White Paper Published By: Juniper Networks     Published Date: Feb 18, 2015
Get expert advice on how to keep your private cloud secure with our Top 10 Considerations Slideshow. If you are looking to build a secure foundation for your private cloud infrastructure, this slideshow offers important considerations for securing your private cloud environment.
Tags : 
cloud, private cloud, security, password, virtualization
    
Juniper Networks
Webinar Published By: Juniper Networks     Published Date: Feb 18, 2015
Find out how network virtualization can help you move seamlessly to a private cloud in this Webinar. You will hear about the challenges the Tribune Broadcasting had to solve in order to achieve a smooth transition to high-performance, scalable private cloud.
Tags : 
private cloud, juniper, cloud computing, virtualization, database development
    
Juniper Networks
Case Study Published By: F5 Networks Inc     Published Date: Feb 18, 2015
As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.
Tags : 
ddos attacks, ddos protection, ddos solutions, mitgation, security
    
F5 Networks Inc
White Paper Published By: IBM     Published Date: Feb 11, 2015
As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data analytics and mobility. In this paper, we will look at how the growing adoption of cloud computing is changing the way organizations are implementing security.
Tags : 
security strategies, ibm, deployment model, cloud security, data analytics
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
In this analyst report, EMA compare IBM Security QRadar Incident Forensics vs other industry tool and shows why IBM scored the highest overall rating with a score of 3.92.
Tags : 
data capture, network forensices, ibm, incident forensics, it security tools
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : 
network security, threat landscape, network security solutions, network defense, security challenges
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
This white paper explains how organizations can use behavior-based protection strategies to help disrupt malicious attacks in real time. It looks at how integrated, intelligent solutions from IBM can detect and help prevent threats - from the network perimeter to remote endpoints.
Tags : 
behavior-based protection strategies, remote endpoints, ibm, network perimeter, vulnerability decodes
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.
Tags : 
intrusion prevention, ibm, appliance market, ips, network traffic
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
IBM has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for Application Security.
Tags : 
application security testing, application security, ibm, iast, binary code
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.
Tags : 
ibm security, business-centric strategies, security solutions, it policies, security
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.
Tags : 
security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.
Tags : 
ibm security, access management solutions, mobile channel security, advanced threats, byod
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
This paper explores how companies can more safely introduce employee - or corporate-owned mobile devices into the workplace, identify the risks inherent in their broader access to corporate data, and derive enhanced business value.
Tags : 
corporate data, business value, mobile devices, client services, security
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
Securely connect people, applications and devices to cloud environments. While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is different. Read this whitepaper to learn more about how: · Threat-aware identity and access management can strengthen security in each of the cloud delivery models · Self-service IAM solution can provide higher level of Security in Cloud as compared to on-premise
Tags : 
cloud environment, iaas, paas, saas, access management
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
Maintain visibility and control with proven security solutions for public, private and hybrid clouds. IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.
Tags : 
security solutions, layered protection, protect data, advanced analytics, ibm
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
Strengthen application protection—from design to deployment—to proactively address cloud security risks.
Tags : 
cloud environment, web application, cloud-based security, ibm, ibm security
    
IBM
White Paper Published By: IBM     Published Date: Feb 11, 2015
Why strong, effective security can and should both enhance the customer experience and lower operational costs.
Tags : 
customer experience, holistic fraud prevention, operational costs, increased transactions, fraud identification
    
IBM
White Paper Published By: ThreatTrack Security     Published Date: Jan 22, 2015
Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.
Tags : 
threattrack, security, threat, track, information
    
ThreatTrack Security
White Paper Published By: Entrust Datacard     Published Date: Jan 16, 2015
Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.
Tags : 
entrust, security, certificate, b2b, application
    
Entrust Datacard
White Paper Published By: Comcast Business     Published Date: Jan 15, 2015
For most small and mid-sized businesses the future is all about growth, and a cloud-based approach to information technology is inherently supportive of growth strategies.
Tags : 
comcast, technology, business, blueprint, plan
    
Comcast Business
White Paper Published By: CA Technologies     Published Date: Jan 09, 2015
This White Paper provides information on how enhance delivery secure and improve customer experience.
Tags : 
security demands, ways to enhance delivery of secure, protect the business, new security services, delivery security solutions
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.