Research Library

Powered by

Database Security Research

  • Trustwave Managed Security Testing - DON’T GUESS. TEST.

    Sponsored by: Trustwave

    Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.

  • Building an Unstructured Data Protection Program

    Sponsored by: STEALTHbits

    In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.

  • 2016 State of the Channel Ransomware Report

    Sponsored by: Datto

    93% of IT service providers reported that their clients were successfully attacked by ransomware despite having anti-virus/malware software in place. Access this report to learn about the state of ransomware in 2016 and how to stay ahead of these impending malware attacks.

  • Ransomware Made MSPeasy

    Sponsored by: Datto

    In the first 3 months of 2016, companies lost $200 million to ransomware. Learn about today's leading ransomware threats and how to educate your customers on the importance of investing in security, backup and recovery solutions.

  • 3 Steps to Secure Cloud Database-as-a-Service

    Sponsored by: Oracle Corporation UK Ltd

    Database-as-a-Service (DBaaS) may be easy to deploy and easy to manage, but it's not without its own security challenges. Evaluating a provider is an important first step, but where do you go from there? In this e-guide, we explore 3 key steps to ensuring secure cloud database services. Discover how to make your DBaaS migration safe and successful.

  • Introducing Microsoft SQL Server 2016

    Sponsored by: Microsoft

    This robust e-book explores SQL Server 2016. Learn about its newest capabilities that can enable you to boost performance with: faster queries, an improved database engine, integrated reporting and analytics, and more.

  • Simplify Data Management: Internet of Things

    Sponsored by: Oracle Corporation UK Ltd

    In this infographic, you'll learn how Oracle's enterprise-scale cloud platform can offer scalable real-time data insights in the era of big data and IoT.

  • Tick! Tock! Have You Detected the Intruder Inside Your Network Yet?

    Sponsored by: Dell Software

    In this precautionary white paper, get in the mind of a cyber attacker and learn the key ways for preventing a breach by quickly identifying suspicious behavior and containing the attackers inside your network. Also, learn about key benefits and limitations of both native tools and security information and event management (SIEM) solutions.

  • 10 Principles of Database Security Program Design

    Sponsored by: Trustwave

    Learn 10 solid principles of database security program design, giving your enterprise a leg up in protecting its customer information, intellectual property, and proprietary secrets.

  • Retail Tip Sheet

    Sponsored by: Trustwave

    It's easy to assume your organization won't fall victim if you've check off all compliance requirements. But hackers are always evolving their methods to get what you don't want them to have. Discover 10 practices you can enact to avoid costly data breaches.

  • Targeted cyber attacks in the UK and Europe

    Sponsored by:

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Unified Infrastructure Management for Databases: An Overview

    Sponsored by: CA Technologies

    Discover unified database infrastructure management that delivers comprehensive monitoring across multiple database servers, as well as will uncover performance bottlenecks. Access now to ensure database integrity with a solution that supports Oracle, IBM DB2, SQL Server, Sybase, and IBM Informix.

  • The General Data Protection Regulation Challenge

    Sponsored by: Close Brothers Technology Services

    This paper examines some of the problems caused by The General Data Protection Regulation and how it can be used as a catalyst for improvements in security. Find out how you'll be able to turn compliance with this new legislation into an opportunity for to improve data portability, retention, classification and more.

  • Onapsis Research Labs: SAP Systems Security Analysis

    Sponsored by: Onapsis

    This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.

  • Extend Your Storage Options without Compromising on Security, Reliability

    Sponsored by: BT

    Cloud-based object storage ensures data delivery, provides enhanced security and durability that cloud storage solutions typically do not offer. Discover the benefits your enterprise can reap with this storage solution, including easy data migration, automated data replication, and more.

  • Best Practices for Deploying Data Protection Solutions

    Sponsored by: TechTarget

    Check out this guide to review some of the challenges associated with deploying data protection technology and highlights some of the initial pitfalls encountered by early adopters. But not only that, read solutions on how to better manage your data protection.

  • Is your business risking a USD 100 million loss?

    Sponsored by: IBM

    Learn how to safely replicate and archive data to enable your end users while discouraging data loss. Implement technologies that give you greater visibility into your data so nobody in your organization makes the next $100 million mistake.

  • Modern Storage Strategies for SQL Server

    Sponsored by: Tegile

    Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.

  • SQL Server 2016: Mission-Critical Performance

    Sponsored by: Microsoft

    In this white paper, learn how the most recent versions of SQL Server provide advanced security, availability, scalability, and performance capabilities that meet the data needs of modern, global organizations, and the potential cost impacts of this functionality.

  • Gartner Market Guide for Data-Centric Audit and Protection (DCAP).

    Sponsored by: IBM

    Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.

  • Medical Management solutions technical case study V0.1

    Sponsored by: Cintra/Oracle

    When medical billing services provider, Medical Management, needed to upgrade their legacy Oracle database architecture they turned to this trusted Oracle partner for help. Discover how the organization was able to facilitate a smooth transition for Medical Management to boost database performance quickly and easily.

  • Oracle’s Engineered Systems Approach to Maximizing Database Protection

    Sponsored by: Oracle Corporation UK Ltd

    Access this white paper and discover how your organization can gain better backup and recovery performance to meet stringent RPO and RTO SLAs, reduced data loss exposure, increased data integrity, and greater application user satisfaction.

  • Case Study: Revolutionizing Healthcare Analytics and Transforming User Experience

    Sponsored by: Cintra/Oracle

    This case study discusses how HANY, a healthcare organization, updated their Oracle database architecture with the help of a managed service provider. Find out how they were able to enhance their database security and management, and gain valuable insight into their data.

  • Information Security ANZ July 2016

    Sponsored by:

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • Learn How to Choose the Right Database for the Job

    Sponsored by: IBM

    Learn about the process of selecting and deploying the right multi-database solution for you. Uncover 7 types of open source databases and tools. Plus, gain access to a complimentary 30-day trial of IBM's Compose Enterprise multi-DB toolkit.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.