ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Security Research

  • Unified Infrastructure Management for Databases: An Overview

    Sponsored by: CA Technologies

    Discover unified database infrastructure management that delivers comprehensive monitoring across multiple database servers, as well as will uncover performance bottlenecks. Access now to ensure database integrity with a solution that supports Oracle, IBM DB2, SQL Server, Sybase, and IBM Informix.

  • Onapsis Research Labs: SAP Systems Security Analysis

    Sponsored by: Onapsis

    This Onapsis Research Labs report helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.

  • ESG Instagraphic: Integration with EMC Data Domain and EMC Avamar

    Sponsored by: Richardson Eyres

    Access this infographic from ESG Lab Validation to find out how you can gain performance, scalability, reliability, and deduplication benefits for your data backups and how this same technology can enable protection of your entire environment.

  • Extend Your Storage Options without Compromising on Security, Reliability

    Sponsored by: BT

    Cloud-based object storage ensures data delivery, provides enhanced security and durability that cloud storage solutions typically do not offer. Discover the benefits your enterprise can reap with this storage solution, including easy data migration, automated data replication, and more.

  • Definitive Guide: Securing the Mobile Enterprise

    Sponsored by: Aruba Networks

    While mobility and IoT offer potential rewards for organizations the thought of all of these unknown devices connecting to the network can be worrisome for security and IT managers This informational white paper offers an outline for the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT.

  • How to Secure Your Oracle Database 12c

    Sponsored by: Oracle Corporation

    In this webcast, discover how to handle attacks on your Oracle database with preventive, detective, and administrative security controls, as well as how to employ a stratified data protection strategy. Also find out how Epsilon takes care of their data—both improving business for its customers and for database performance, security, and reporting.

  • Best Practices for Deploying Data Protection Solutions

    Sponsored by: TechTarget

    Check out this guide to review some of the challenges associated with deploying data protection technology and highlights some of the initial pitfalls encountered by early adopters. But not only that, read solutions on how to better manage your data protection.

  • Information Security ANZ July 2016

    Sponsored by: SearchSecurity.com

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • Learn How to Choose the Right Database for the Job

    Sponsored by: IBM

    Learn about the process of selecting and deploying the right multi-database solution for you. Uncover 7 types of open source databases and tools. Plus, gain access to a complimentary 30-day trial of IBM's Compose Enterprise multi-DB toolkit.

  • Is your business risking a USD 100 million loss?

    Sponsored by: IBM

    Learn how to safely replicate and archive data to enable your end users while discouraging data loss. Implement technologies that give you greater visibility into your data so nobody in your organization makes the next $100 million mistake.

  • Modern Storage Strategies for SQL Server

    Sponsored by: Tegile

    Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.

  • Coalfire: Cloud & Data Center Security Solution to meet PCI DSS 3.1 Compliance

    Sponsored by: TrendMicro

    In this paper, Coalfire examines the applicability of a security platform in regards to PCI DSS when used in physical or cloud environments. Access now for deep analysis on this security platform and for more PCI DSS compliance standards.

  • A Best Practice Approach to Database Backup and Recovery

    Sponsored by: Veritas

    Examine a backup tool that improves visibility, compliance, and data protection and enforces better communication between the backup admin and database admin (DBA). Learn how your enterprise can eliminate the risk of losing time, data and money with a simplified, well-coordinated database backup and recovery solution.

  • Gartner Market Guide for Data-Centric Audit and Protection (DCAP).

    Sponsored by: IBM

    Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.

  • Medical Management solutions technical case study V0.1

    Sponsored by: Cintra/Oracle

    When medical billing services provider, Medical Management, needed to upgrade their legacy Oracle database architecture they turned to this trusted Oracle partner for help. Discover how the organization was able to facilitate a smooth transition for Medical Management to boost database performance quickly and easily.

  • Case Study: Revolutionizing Healthcare Analytics and Transforming User Experience

    Sponsored by: Cintra/Oracle

    This case study discusses how HANY, a healthcare organization, updated their Oracle database architecture with the help of a managed service provider. Find out how they were able to enhance their database security and management, and gain valuable insight into their data.

  • Covering the Security Aspect of Software Asset Management

    Sponsored by: Snow Software

    Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.

  • Database on Cloud: Fast, Simple, Economical, and yes, Secure

    Sponsored by: IBM

    This data sheet explores databases available on demand as a cloud service. Designed with security in mind, you'll uncover the variety of advantages from leveraging this nontraditional approach to database management.

  • Surfing the flash flood of data growth

    Sponsored by: ComputerWeekly.com

    The rate of exponential growth in single databases is eclipsed by the overall rate of data growth. Analyst Clive Longbottom explains how you can survive the deluge.

  • The Global Risks Report 2016

    Sponsored by: ComputerWeekly.com

    This report from the World Economic Forum identifies the most pressing global risks countries and organisations will face in 2016, including sections on technology and cyber crime.

  • A Guide to Cyber Risk

    Sponsored by: ComputerWeekly.com

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

  • Building confidence in data security

    Sponsored by: ComputerWeekly.com

    Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.

  • Top 10 Database Security Threats

    Sponsored by: Imperva

    Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.

  • Tips to Secure your Virtualized Data Center

    Sponsored by: TechData - Kaspersky

    This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.

  • Encryption-at-Rest: Keep Inactive Data Protected

    Sponsored by: Rackspace

    Learn how to protect inactive data with an encryption-at-rest solution.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.