ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Security Research

  • Cloud Security Report

    Sponsored by: Alert Logic

    In this research report conducted by Alert Logic, explore an overview of the different types of attacks and how attackers choose their targets. Then, find out how a security-as-a-service (SaaS) provider can help prevent future security attacks.

  • Getting Ready for the EU General Data Protection Regulation

    Sponsored by: Ivanti

    The EU General Data Protection Regulation (GDPR) set to be effective May 25th 2018, involves many new regulatory compliance initiatives that organizations must be aware of. Download this webcast for answers to critical questions around the GDPR.

  • SQL Server 2017 on Linux: Top 6 Reasons Companies Make the Move

    Sponsored by: Microsoft

    Find out how to deploy SQL Server 2017 on Linux with whatever language, platform, and on-premise or cloud deployment that suits your organization's needs best.

  • How SQL Server 2016 Measures Up: Business Value, Database Performance, and Security

    Sponsored by: Microsoft

    Uncover Crimson Consulting's findings about the potential business value of Microsoft SQL Server 2016 and how it performs when it comes to high speed analytics, database security, big data, cloud integration, and beyond.

  • Information Security Certifications

    Sponsored by: TechTarget

    There are only 3 easy steps to follow when choosing which security certification to pursue. Find out what they are in are in our information security certifications expert guide. You'll explore many vendor-specific, as well as vendor-neutral, security-related certification programs that occupy this landscape and find out which one is right for you.

  • The Essential Checklist: A Practical Guide to Efficient Security Response

    Sponsored by: ServiceNow

    Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.

  • 7 Steps to Achieve Database Security in the Cloud

    Sponsored by: Trustwave

    As organizations increasingly move databases to the cloud to take advantage of the cost savings and flexibility, it's more important than ever to factor in security. Learn 7 steps to cost effective database security in the cloud.

  • The 2017 DevSecOps Global Skills Survey

    Sponsored by: Veracode, Inc.

    In Veracode's 2017 DevSecOps Global Skills Survey, 400 DevOps professionals discussed their views of today's workforce. Uncover the results of the survey conducted to study working professionals' preparedness of dealing with security in the workforce.

  • Protect with this Endpoint Security & Save Money, Too

    Sponsored by: Symantec

    Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.

  • Oil and Gas Producer Implements Strong Security Controls

    Sponsored by: Trustwave

    Check out this case study and learn about how one of the largest energy companies in the world reduced their exposure to malicious attack by implementing a database security tool.

  • Global Bank Achieves Database Security Success

    Sponsored by: Trustwave

    Check out how one international banking organization overcame the challenge of protecting their databases with their existing technology that was complex and difficult to deploy.

  • Discover a Database and Big Data Scanner

    Sponsored by: Trustwave

    This white paper explores the capabilities of a database scanner that allows you to immediately discover, assess, and report on the security, risk, or compliance posture of any database or big data store within your environment (on premise or in the cloud) in minutes.

  • Take Your SIEM to the Cloud

    Sponsored by: Splunk

    90% of U.S. CEOs indicate that they have seen the financial, reputational and career consequences of falling victim to a cyberattack. Check out this expert white paper to uncover how a security operations center can improve your security posture.

  • Leading Health Insurer Scales Security across More than 2500 Databases

    Sponsored by: Trustwave

    Mitigating database security threats and meeting compliance requirements can be difficult. Check out this case study to uncover how one health insurer streamlined its database security and compliance efforts, helping them save time and money.

  • End of Support Doesn't Have to Mean End of Security

    Sponsored by: TrendMicro

    Does end of support mean end of security? Explore the security risks facing organizations running end of life (EOL) platforms like Windows Server 2003. Uncover 5 options to address those risks.

  • The Future of I.T. Security starts with Virginia Tech

    Sponsored by: Virginia Tech Online

    Data breaches are costly – in revenue and reputation – and organizations are actively looking for talented professionals who can help protect data stores. Learn what issues are keeping CIOs up at night, and the career opportunities available in this growing field.

  • Secure Coding Practices: Avoid SQL Injection

    Sponsored by: WhiteHat Security

    SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.

  • The State of DBaaS: How Managed Services are Transforming Database Administration

    Sponsored by: IBM

    This State of DBaaS Report, commissioned by IBM, assesses the business and technical impact of database-as-a-service according to 680 executive and technical enterprise users. Learn how NoSQL DBaaS can help you save time, boost productivity, and simplify database management for developers.

  • Help Your Database Run at Top Speed, Not Out of Gas

    Sponsored by: TechTarget

    In-memory processing, big data applications and NoSQL technologies are pushing traditional database systems to the limit. To make it today, they need to run at top speed. Access our exclusive guide, Help Your Database Run at Top Speed, Not Out of Gas, and learn how to boost your performance management planning.

  • How Transactional Analytics is Enabling Digital Payments Transformation

    Sponsored by: Aerospike

    Learn how transactional analytics can help you keep up with the rapid changes wrought on eCommerce by technologies like mobile payment apps and non-banking payment service providers (FinTech). Discover how to leverage a database with a hybrid memory architecture and machine learning to transform digital payments.

  • Data protection: Not just about personal data and compliance

    Sponsored by: ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • GDPR: The Race is on for Compliance

    Sponsored by: Dell SecureWorks

    Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.

  • Six Reasons to Upgrade Your Database

    Sponsored by: IBM

    Access this white paper to uncover 6 reasons to change your database, including opinions from industry analysts and real-world companies.

  • Bridging to the Cloud: The Right Database Makes the Difference

    Sponsored by: IBM

    Nowadays you can't really avoid working in hybrid environments that mix on-premise with cloud deployments to develop and deliver apps. Find out how implementing the right database platform can increase your flexibility and improve your cloud adoption strategy.

  • How to Manage Oracle E-Business Suite Apps and Databases

    Sponsored by: Data Intensity

    In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.