ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Security Research

  • Learn How to Choose the Right Database for the Job

    Sponsored by: IBM

    Learn about the process of selecting and deploying the right multi-database solution for you. Uncover 7 types of open source databases and tools. Plus, gain access to a complimentary 30-day trial.

  • 10 Ways to Save Money and Provide More Comprehensive Availability Protection in SQL Server Environments

    Sponsored by: SIOS Technology Corp

    Check out this informative resource to uncover the 10 ways to save big on high availability protection for SQL Server environments.

  • Malware Hitching a Ride on Mobile Apps?

    Sponsored by: SearchSecurity.com

    The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.

  • Empowering the Data-Driven Organization

    Sponsored by: Hewlett Packard Enterprise

    Learn how you can ensure a smooth migration to Microsoft SQL Server, and discover how leveraging technology services can enable you to glean insights from big data, use new SQL Server capabilities to achieve greater performance, security, availability, deeper insights, and more.

  • Database on Cloud: Fast, Simple, Economical, and Secure

    Sponsored by: IBM

    This data sheet explores databases available on demand as a cloud service. Designed with security in mind, you'll uncover the variety of advantages from leveraging this nontraditional approach to database management.

  • Is your business risking a USD 100 million loss?

    Sponsored by: IBM

    Learn how to safely replicate and archive data to enable your end users while discouraging data loss. Implement technologies that give you greater visibility into your data so nobody in your organization makes the next $100 million mistake.

  • Few Fully Prepared for Software Security Risks

    Sponsored by: Hewlett Packard Enterprise

    This white paper shows you results from a recent security survey and the value of testing your security measure regularly.

  • The Essential DBA Playbook for Optimized SQL Server Management

    Sponsored by: Dell, Inc.

    Discover the essentials of optimizing SQL Server management in your organization in this comprehensive guide. Read on to determine how successful DBAs optimize their SQL Server environment, and gain exclusive insight into how to establish highly available backup and recovery, take advantage of database automation, and more.

  • Top 10 Database Security Threats

    Sponsored by: Dimension Data

    Read this paper to understand the top 10 database threats and how you can protect your most valuable assets.

  • Recognize and Respond to Cyber Attacks

    Sponsored by: Verizon

    The inability to recognize and react the lead indicators of a cyber attack can be an organization's greatest weakness. Learn how to prepare your organization to recognize and mitigate threats. Accelerate your detection capabilities so breaches can't linger.

  • Complete Data Protection (Advanced) - Data Sheet

    Sponsored by: Intel Security

    Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.

  • Modern Storage Strategies for SQL Server

    Sponsored by: Tegile

    Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.

  • A Comprehensive Guide to Securing Data with Database Encryption

    Sponsored by: Gemalto

    This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.

  • Coalfire: Cloud & Data Center Security Solution to meet PCI DSS 3.1 Compliance

    Sponsored by: TrendMicro

    In this paper, Coalfire examines the applicability of a security platform in regards to PCI DSS when used in physical or cloud environments. Access now for deep analysis on this security platform and for more PCI DSS compliance standards.

  • Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform

    Sponsored by: Gemalto

    With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.

  • A Best Practice Approach to Database Backup and Recovery

    Sponsored by: Veritas

    Examine a backup tool that improves visibility, compliance, and data protection and enforces better communication between the backup admin and database admin (DBA). Learn how your enterprise can eliminate the risk of losing time, data and money with a simplified, well-coordinated database backup and recovery solution.

  • ZK Research Report on Network Management Issues

    Sponsored by: Ixia

    ZK Research (a Zeus Kerravala company) conducted a network management survey and inside reviews the results, including the need for application strengthening and the market forces driving this need.

  • SQL Server 2016: Mission-Critical Performance

    Sponsored by: Microsoft

    In this white paper, learn how the most recent versions of SQL Server provide advanced security, availability, scalability, and performance capabilities that meet the data needs of modern, global organizations, and the potential cost impacts of this functionality.

  • Gartner Market Guide for Data-Centric Audit and Protection (DCAP).

    Sponsored by: IBM

    Use this Gartner Market Guide to help you identify emerging data-centric audit and protection tools thatCISOs can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.

  • A Foundation for Next-Generation Datacenter and Cloud-Based Security

    Sponsored by: Citrix

    Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.

  • Medical Management solutions technical case study V0.1

    Sponsored by: Cintra/Oracle

    When medical billing services provider, Medical Management, needed to upgrade their legacy Oracle database architecture they turned to this trusted Oracle partner for help. Discover how the organization was able to facilitate a smooth transition for Medical Management to boost database performance quickly and easily.

  • How Memory and Storage Technologies Are Transforming Enterprise Computing

    Sponsored by: Micron Technology

    The ability to successfully manipulate, analyze, utilize and protect data is the key competitive differentiator of today's business era. Learn how you can leverage innovation to your advantage and current trends in memory and storage.

  • Oracle’s Engineered Systems Approach to Maximizing Database Protection

    Sponsored by: Oracle, in association with Intel

    Access this white paper and discover how your organization can gain better backup and recovery performance to meet stringent RPO and RTO SLAs, reduced data loss exposure, increased data integrity, and greater application user satisfaction.

  • Demo: Oracle Zero Data Loss Recovery Appliance

    Sponsored by: Oracle, in association with Intel

    This video highlights a zero data loss recovery appliance that enables data recovery at any point in time. Watch this demo to see how this appliance can improve your backup with comprehensive, real-time visibility into your database protection.

  • Oracle's Zero Data Loss Recovery Appliance

    Sponsored by: Oracle, in association with Intel

    This white paper overviews Oracle's zero data loss recovery appliance that offers a new approach to database protection by virtually eliminating data loss and backup overhead with cloud-ready scalability. Discover how this appliance can provide your enterprise with continuous real-time protection and ensure fast recovery and shortened RTO.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.