ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Security Research

  • Definitive Guide: Securing the Mobile Enterprise

    Sponsored by: Aruba Networks

    While mobility and IoT offer potential rewards for organizations the thought of all of these unknown devices connecting to the network can be worrisome for security and IT managers This informational white paper offers an outline for the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT.

  • Securing Oracle Database 12c

    Sponsored by: Oracle Corporation

    Discover how to handle attacks on your Oracle Database with preventive, detective, and administrative security controls, as well as how to employ a stratified data protection strategy. Also find out how Epsilon takes care of their data—both to improve business for its customers but also in the sense of database performance, security, and reporting.

  • Best Practices for Deploying Data Protection Solutions

    Sponsored by: TechTarget

    Check out this guide to review some of the challenges associated with deploying data protection technology and highlights some of the initial pitfalls encountered by early adopters. But not only that, read solutions on how to better manage your data protection.

  • Information Security ANZ July 2016

    Sponsored by: SearchSecurity.com

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • Learn How to Choose the Right Database for the Job

    Sponsored by: IBM

    Learn about the process of selecting and deploying the right multi-database solution for you. Uncover 7 types of open source databases and tools. Plus, gain access to a complimentary 30-day trial of IBM's Compose Enterprise multi-DB toolkit.

  • 10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments

    Sponsored by: SIOS Technology Corp

    Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.

  • Malware Hitching a Ride on Mobile Apps?

    Sponsored by: SearchSecurity.com

    The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.

  • Empowering the Data-Driven Organization

    Sponsored by: Hewlett Packard Enterprise

    Learn how you can ensure a smooth migration to Microsoft SQL Server, and discover how leveraging technology services can enable you to glean insights from big data, use new SQL Server capabilities to achieve greater performance, security, availability, deeper insights, and more.

  • Few Fully Prepared for Software Security Risks

    Sponsored by: Hewlett Packard Enterprise

    This white paper shows you results from a recent security survey and the value of testing your security measure regularly.

  • Top 10 Database Security Threats

    Sponsored by: Dimension Data

    Read this paper to understand the top 10 database threats and how you can protect your most valuable assets.

  • Recognize and Respond to Cyber Attacks

    Sponsored by: Verizon

    The inability to recognize and react the lead indicators of a cyber attack can be an organization's greatest weakness. Learn how to prepare your organization to recognize and mitigate threats. Accelerate your detection capabilities so breaches can't linger.

  • Modern Storage Strategies for SQL Server

    Sponsored by: Tegile

    Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Gemalto

    This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.

  • Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform

    Sponsored by: Gemalto

    With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.

  • A Best Practice Approach to Database Backup and Recovery

    Sponsored by: Veritas

    Examine a backup tool that improves visibility, compliance, and data protection and enforces better communication between the backup admin and database admin (DBA). Learn how your enterprise can eliminate the risk of losing time, data and money with a simplified, well-coordinated database backup and recovery solution.

  • SQL Server 2016: Mission-Critical Performance

    Sponsored by: Microsoft

    In this white paper, learn how the most recent versions of SQL Server provide advanced security, availability, scalability, and performance capabilities that meet the data needs of modern, global organizations, and the potential cost impacts of this functionality.

  • Gartner Market Guide for Data-Centric Audit and Protection (DCAP).

    Sponsored by: IBM

    Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.

  • How Memory and Storage Technologies Are Transforming Enterprise Computing

    Sponsored by: Micron Technology

    The ability to successfully manipulate, analyze, utilize and protect data is the key competitive differentiator of today's business era. Learn how you can leverage innovation to your advantage and current trends in memory and storage.

  • Covering the Security Aspect of Software Asset Management

    Sponsored by: Snow Software

    Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.

  • Surfing the flash flood of data growth

    Sponsored by: ComputerWeekly.com

    The rate of exponential growth in single databases is eclipsed by the overall rate of data growth. Analyst Clive Longbottom explains how you can survive the deluge.

  • Securing Valuable Data at the Edge

    Sponsored by: Riverbed Technology, Inc.

    This solution brief discusses protecting the valuable data that you have spread out over multiple offices and databases.

  • Top 10 Database Security Threats

    Sponsored by: Imperva

    Read this paper to understand the top 10 database threats and how you can protect your most valuable assets.

  • Support Your Innovation Needs with SQL Server

    Sponsored by: Microsoft

    Access this white paper now and find out how your company can take advantage of the 'data dividend' through the next wave of innovation on the Microsoft SQL Server platform including improvements in performance, security and compliance, availability, scalability and cloud capabilities.

  • Tips to Secure your Virtualized Data Center

    Sponsored by: TechData - Kaspersky

    This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.

  • Encryption-at-Rest: Keep Inactive Data Protected

    Sponsored by: Rackspace

    Learn how to protect inactive data with an encryption-at-rest solution.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.