ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Security Research

  • EU GDPR - The Path to Compliance

    Sponsored by: MarkLogic

    What are the key data challenges your company faces with GDPR compliance? This white paper addresses key issues related to GDPR and provides practical guidance into solving them in a timely and cost-effective way.

  • Zero Impact Database Migration

    Sponsored by: Quest

    Discover how to navigate the most common pitfalls of migrating from Oracle to SQL Server with tools that enable seamless data replication across platforms.

  • Moving your Database to the Cloud

    Sponsored by: Quest

    Explore how to move your databases to the cloud as well as what the consequences of that that move are. Deepen your understanding of the cloud, from its elasticity to potential for self-service, and learn about different deployment and service models for the cloud.

  • 2018 Database DevOps Survey

    Sponsored by: DBMaestro

    Inside, uncover key findings from DBmaestro's annual Database DevOps Report, along with the challenges and best practices of companies using or looking to implement DevOps for databases.

  • Modernizing Your Database Processes With DevSecOps

    Sponsored by: DBMaestro

    Uncover 4 pillars to building the infrastructure you need to shift your database development into high gear via DevSecOps.

  • Need More Oomph from Oracle

    Sponsored by: Oracle & Explorer

    Find out how to control Oracle costs better while improving database performance by learning how to conduct an Oracle Architecture Review.

  • Q&A: How to Think Smarter About Database Security

    Sponsored by: Trustwave

    Inside this Q&A with Raul Gutierrez, principal global security architect at Trustwave uncover steps to take to maintain compliance with the new data protection and privacy laws, and help eliminate vulnerabilities in your environment.

  • 4 Steps to Kick-Start Your Security Program

    Sponsored by: LogMeIn Rescue

    Your customers trust you to protect their data, so it is crucial to retain that trust by making security a top priority. Learn how you can protect customers and provide a better overall experience.

  • Mastering the Art of Database Backup and Recovery

    Sponsored by: Oracle Corporation UK Ltd

    DBAs are usually concerned with backing up their databases, but they should spend more time focusing on database recovery as part of the backup process. Read this expert guide to learn how to cover all your DB recovery bases and how to back up data more efficiently.

  • Six Essential Features for Highly Available Redis DB

    Sponsored by: Redislabs

    It's important that Redis databases remain highly available because they're supporting mission-critical business applications. Learn 6 key requirements for making Redis highly available, and 6 features essential for safeguarding service and deployment.

  • Reducing Risk in the Face of Cyberattacks and Data Loss Exposure

    Sponsored by: Oracle Corporation UK Ltd

    In this white paper, you'll find guidance on eliminating exposure to the risks of database data loss with a backup appliance that enables a sub-second recovery point. Access now to see how this appliance combats threats like ransomware by continually validating backups, and more.

  • Database Recovery Without The Drama

    Sponsored by: Oracle Corporation UK Ltd

    Check out this infographic to hear one this disaster recovery appliance helped 4 companies across several industries recover their Oracle databases in as little as 1 hour, gain sub-second RPOs, and more.

  • Overview of AWS Security: Database Services

    Sponsored by: Amazon Web Services

    While the cloud has improved security overall, AWS, aware that it is a large target for cyberattackers hunting for data, has stepped up to the challenge. This white paper gives you an overview of the database security services that AWS provides.

  • Harnessing the Potential of SAP HANA with IBM Power Systems

    Sponsored by: EOH IBM

    Discover how you can increase the flexibility of your SAP HANA deployment to capitalize on its disruptive potential and get the facts about IBM's Power Systems.

  • 11 Things Every Organization Needs to Know When Migrating Oracle Apps to the Cloud

    Sponsored by: Cintra

    While Oracle's cloud is engineered to work with your Oracle apps and databases, it isn't simply a case of shifting exactly what you've got on-premise to the cloud. Discover 11 things you need to consider as you plan your Oracle cloud migration.

  • Cloud Security Report

    Sponsored by: Alert Logic

    According to this Cloud Security report, application attacks account for 75% of verified security incidents beating out brute force attacks, DDoS and more. In this research report, explore an overview of these different types of attacks and how attackers choose their targets.

  • Data Protection Steps for Ransomware

    Sponsored by: TechTarget

    Forrester Research predicts that ransomware attacks and privacy breaches will escalate in 2017. That means organizations without ransomware protection are taking a huge risk. Access our new guide, Two Quick Data Protection Steps for Ransomware, and find out why it's more important than ever to be proactive in the fight against this epidemic.

  • The Essential Checklist: A Practical Guide to Efficient Security Response

    Sponsored by: ServiceNow

    Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.

  • 7 Steps to Achieve Database Security in the Cloud

    Sponsored by: Trustwave

    As organizations increasingly move databases to the cloud to take advantage of the cost savings and flexibility, it's more important than ever to factor in security. Learn 7 steps to cost effective database security in the cloud.

  • The 2017 DevSecOps Global Skills Survey

    Sponsored by: Veracode, Inc.

    In Veracode's 2017 DevSecOps Global Skills Survey, 400 DevOps professionals discussed their views of today's workforce. Uncover the results of the survey conducted to study working professionals' preparedness of dealing with security in the workforce.

  • Oil and Gas Producer Implements Strong Security Controls

    Sponsored by: Trustwave

    Check out this case study and learn about how one of the largest energy companies in the world reduced their exposure to malicious attack by implementing a database security tool.

  • Global Bank Achieves Database Security Success

    Sponsored by: Trustwave

    Check out how one international banking organization overcame the challenge of protecting their databases with their existing technology that was complex and difficult to deploy.

  • Take Your SIEM to the Cloud

    Sponsored by: Splunk

    90% of U.S. CEOs indicate that they have seen the financial, reputational and career consequences of falling victim to a cyberattack. Check out this expert white paper to uncover how a security operations center can improve your security posture.

  • Discover a Database and Big Data Scanner

    Sponsored by: Trustwave

    This white paper explores the capabilities of a database scanner that allows you to immediately discover, assess, and report on the security, risk, or compliance posture of any database or big data store within your environment (on premise or in the cloud) in minutes.

  • Leading Health Insurer Scales Security across More than 2500 Databases

    Sponsored by: Trustwave

    Mitigating database security threats and meeting compliance requirements can be difficult. Check out this case study to uncover how one health insurer streamlined its database security and compliance efforts, helping them save time and money.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.