ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Security Research

  • CW Europe: December 2016 - February 2017

    Sponsored by: ComputerWeekly.com

    Security continues to be a huge pan-European challenge for governments and businesses harnessing the latest technologies. In this quarter's CW Europe, we feature two articles focusing on security in Europe and what authorities and IT firms are doing to reduce risks.

  • How To Build A Strong Data Foundation With A Scalable Relational Database

    Sponsored by: IBM

    Investigate the resources provided in this flipbook to discover more about a relational database program that can provide a secure environment for real-time analytics that you can scale to fit your business needs.

  • 5 Ways to Achieve Big Data Protection

    Sponsored by: Commvault

    Take a look at 5 key issues you must consider as you begin to embrace Big Data protection. Discover why organizations see Big Data protection as a huge challenge and learn the best strategies for protecting Big Data assets the same as you would "regular" data assets.

  • The Enterprise Guide to SAP HANA's Cloud Models and Migration Checklist

    Sponsored by: UXC Oxygen and Amazon Web Services

    If you're considering HANA but are unsure about SAP's models of cloud computing, you'll want to fully outline your deployment options before migration. Discover three options for cloud-based HANA, as well as 6-point checklist for crafting a successful cloud migration strategy.

  • AWS Lowers Cost Barriers for SAP HANA and Database Migrations to the Cloud

    Sponsored by: UXC Oxygen and Amazon Web Services

    Although SAP deployments are currently dominated by appliances, more companies are tapping the cloud. But is cloud deployment a smart decision for you? Download now to weigh SAP HANA on-premises options against their cloud offerings. Also, discover how AWS' new tools will lower cost barriers for database cloud migrations.

  • Improving Mobile Sales With a MySQL Replacement

    Sponsored by: Clustrix

    In this datasheet you'll learn about ClustrixDB, a drop-in replacement for MySQL which offers scale-out performance, providing you with in-memory processing, full containerization for easy installation and deployment, heightened security protocols, and more.

  • Don't Guess. Test. Uncover Your Security Vulnerabilities

    Sponsored by: Trustwave

    Learn how to get full visibility and insight into your organization's security weaknesses. Discover the robust tools you need to get an accurate assessment of your databases and applications and avoid annoying false positives.

  • Targeted cyber attacks in the UK and Europe

    Sponsored by: ComputerWeekly.com

    This research from Quocirca examines the perceptions and experiences related to targeted cyber attacks across 600 European organisations.

  • Best Practices for Deploying Data Protection Solutions

    Sponsored by: TechTarget

    Check out this guide to review some of the challenges associated with deploying data protection technology and highlights some of the initial pitfalls encountered by early adopters. But not only that, read solutions on how to better manage your data protection.

  • Modern Storage Strategies for SQL Server

    Sponsored by: Tegile

    Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.

  • How To Combat The Mounting Complexity of Big Data With SQL Server

    Sponsored by: Microsoft

    Recent big data complexity is taxing IT resources beyond what they were originally designed to handle. Learn how different versions of SQL Server provide advanced security, availability, scalability, and performance capabilities that meet the data needs of modern organizations, and the potential cost impacts of this functionality.

  • Medical Management solutions technical case study V0.1

    Sponsored by: Cintra/Oracle

    When medical billing services provider, Medical Management, needed to upgrade their legacy Oracle database architecture they turned to this trusted Oracle partner for help. Discover how the organization was able to facilitate a smooth transition for Medical Management to boost database performance quickly and easily.

  • Case Study: Revolutionizing Healthcare Analytics and Transforming User Experience

    Sponsored by: Cintra/Oracle

    This case study discusses how HANY, a healthcare organization, updated their Oracle database architecture with the help of a managed service provider. Find out how they were able to enhance their database security and management, and gain valuable insight into their data.

  • Surfing the flash flood of data growth

    Sponsored by: ComputerWeekly.com

    The rate of exponential growth in single databases is eclipsed by the overall rate of data growth. Analyst Clive Longbottom explains how you can survive the deluge.

  • Database in the Cloud: Discover More About Database as a Service

    Sponsored by: Oracle

    Learn about the Oracle Database Cloud Service. Discover its unique characteristics, like the ability to scale workloads across multiple database instances, a secure private network that remains flexible enough to open network ports when needed, integration with familiar SQL Loader, and more.

  • Oracle Database Cloud: Scale Fast. Simplify Now.

    Sponsored by: Oracle

    Use this white paper to discover how Oracle Database Cloud Service can not only help you to easily migrate from a legacy server to your new DBaaS, but also grants you access to a built-in backup program to help your protect your data.

  • Database as a Service(DBaaS): Use Cases and Adoption Patterns

    Sponsored by: Oracle

    This 451 Research report explores some of the trends in DBaaS adoption, as well as weighs the potential benefits and challenges which DBaaS brings to the table such as long-term savings, either real or imagined security issues facing cloud software, the immense flexibility that DBaaS offers compared to that of physical servers, and more.

  • Building an Unstructured Data Protection Program

    Sponsored by: STEALTHbits

    In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.

  • 3 Steps to Secure Cloud Database-as-a-Service

    Sponsored by: Oracle Corporation UK Ltd

    Database-as-a-Service (DBaaS) may be easy to deploy and easy to manage, but it's not without its own security challenges. Evaluating a provider is an important first step, but where do you go from there? In this e-guide, we explore 3 key steps to ensuring secure cloud database services. Discover how to make your DBaaS migration safe and successful.

  • Unified Infrastructure Management for Databases: An Overview

    Sponsored by: CA Technologies

    Discover unified database infrastructure management that delivers comprehensive monitoring across multiple database servers, as well as will uncover performance bottlenecks. Access now to ensure database integrity with a solution that supports Oracle, IBM DB2, SQL Server, Sybase, and IBM Informix.

  • Information Security ANZ July 2016

    Sponsored by: SearchSecurity.com

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • Learn How to Choose the Right Database for the Job

    Sponsored by: IBM

    Learn about the process of selecting and deploying the right multi-database solution for you. Uncover 7 types of open source databases and tools. Plus, gain access to a complimentary 30-day trial of IBM's Compose Enterprise multi-DB toolkit.

  • Malware Hitching a Ride on Mobile Apps?

    Sponsored by: SearchSecurity.com

    The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.

  • Database on Cloud: Fast, Simple, Economical, and Secure

    Sponsored by: IBM

    This data sheet explores databases available on demand as a cloud service. Designed with security in mind, you'll uncover the variety of advantages from leveraging this nontraditional approach to database management.

  • Tips to Secure your Virtualized Data Center

    Sponsored by: TechData - Kaspersky

    This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.