> Technology > Data Management > Database Security
 

Database Security

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 1 - 25 of 376Sort Results By: Published Date | Title | Company Name
Case Study Published By: Astaro     Published Date: Jan 19, 2011
Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.
Tags : 
astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy
    
Astaro
White Paper Published By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : 
ounce labs, it securitym it risk, software applications, pci dss, hipaa
    
Ounce Labs, an IBM Company
White Paper Published By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : 
vision, high availability, ibm, aix, cdp
    
Vision Solutions
White Paper Published By: Raritan     Published Date: Jul 26, 2017
In this eBook, we will discuss the cost and security implications of maintaining a data center and the importance of having a reliable PDU to help you achieve continuous uptime.
Tags : 
raritan, pdu, data center, data security, data center power
    
Raritan
White Paper Published By: Kaspersky     Published Date: Feb 06, 2017
As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.
Tags : 
ransomware, malware, encryption, cyberthreat, database security
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: Feb 06, 2017
The total amount of damage caused by cryptomalware can be divided into two parts: the ransom and the related losses. Drawing from our survey of over 4,000 small- and medium-sized companies conducted by Kaspersky Lab and B2B International, we take a closer look at the numbers behind the damage.
Tags : 
cryptor, ransomware, malware, encryption, business security
    
Kaspersky
White Paper Published By: Raritan     Published Date: Nov 09, 2016
This white paper addresses five key aspects of IT that are inextricably tied to computing’s physical realities.
Tags : 
raritan, legrand, data center, virtualization, data center power
    
Raritan
White Paper Published By: Dell EMC     Published Date: Nov 03, 2016
IT managers are struggling to keep up with the “always available” demands of the business. Data growth and the nearly ubiquitous adoption of server virtualization among mid-market and enterprise organizations are increasing the cost and complexity of storage and data availability needs. This report documents ESG Lab testing of Dell EMC Storage SC Series with a focus on the value of enhanced Live Volume support that provides always-available access with great ease of use and economics.
Tags : 
storage, data, sql, architecture, data integration
    
Dell EMC
White Paper Published By: HPE & Intel®     Published Date: Oct 10, 2016
What if you could reduce the cost of running Oracle databases and improve database performance at the same time? What would it mean to your enterprise and your IT operations?
Tags : 
database, hpe, intel, data, oracle database
    
HPE & Intel®
White Paper Published By: Oracle     Published Date: Sep 06, 2016
Innovation is the growth engine of the modern enterprise. Continuous innovation in products and services is vital to drive revenue growth, stay ahead of competitors, and meet rising customer demands.
Tags : 
innovation, oracle, innovation service, oracle cloud, cloud
    
Oracle
White Paper Published By: Dell EMC     Published Date: Jul 05, 2016
EMC Global Data Protection Index 2016 Key Findings and Results Report
Tags : 
data management, business practices, data center. data application, enterprise applications, business intelligence
    
Dell EMC
White Paper Published By: HPE     Published Date: Jun 06, 2016
This white paper presents a comprehensive guide to improving data backup and recovery, and looks at 5 key considerations for small and midsized businesses when looking at the modernization of different aspects of their production.
Tags : 
data, data recovery, data backup, midsized business, database security
    
HPE
White Paper Published By: MobileIron     Published Date: May 23, 2016
Managing your device keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron make your life much simpler by streaming many traditional PC management responsibilities.
Tags : 
security, mobile device, windows, best practices, streaming
    
MobileIron
White Paper Published By: Riverbed     Published Date: May 19, 2016
Data protection, application performance, and business continuity are essential to staying competitive and profitable.
Tags : 
data, data protection, data centre, security, data security
    
Riverbed
White Paper Published By: IBM     Published Date: May 17, 2016
Is your data architecture up to the challenge of the big data era? Can it manage workload demands, handle hybrid cloud environments and keep up with performance requirements? Here are six reasons why changing your database can help you take advantage of data and analytics innovations. 
Tags : 
ibm, business analytics, business intelligence, data, analytics
    
IBM
White Paper Published By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : 
data protection, code 42, data security, intellectual property, database security
    
Code42
White Paper Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
White Paper Published By: Silver Peak     Published Date: Apr 12, 2016
This white paper reveals how with an SD-WAN, enterprises can improve the resiliency of their WAN, dynamically balance traffic across multiple paths and increase application performance.
Tags : 
wan, connectivity, wide area network, data, sd-wan
    
Silver Peak
White Paper Published By: Cisco     Published Date: Feb 16, 2016
Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats.
Tags : 
technology, security, security management, malware analysis, business intelligence
    
Cisco
Webinar Published By: IBM     Published Date: Feb 04, 2016
Disruptors are reinventing business processes and leading their industries with digital transformations. Learn more about personalized front-line decision making, real time insight driven processes, and ecosystem-based innovation.
Tags : 
ibm, middleware, solutions, digital, security
    
IBM
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors.
Tags : 
citrix, security, data, database security
    
Citrix Systems, Inc.
White Paper Published By: AlienVault     Published Date: Nov 10, 2015
Implement and maintain PCI DSS compliance at your organization
Tags : 
operations, structure, compliance, security, management
    
AlienVault
White Paper Published By: IBM     Published Date: Oct 06, 2015
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : 
ibm, zero trust model, zero trust, information security, intrusion prevent systems
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x force, threat intelligence, data protection, ibm security
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Tags : 
behavior based protection, behavior based protection strategy, ibm, data protection, network protection
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.