ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Quest

  • Nine Best Practices for Active Directory Security

    It is often assumed that threats come from outside an organization. However, a lapse in internal security is often what enabled an attack to succeed. In this white paper, explore how a typical insider threat unfolds. The white paper also details 9 critical security best practices that minimize the risk of an internal threat.

  • Moving Your Oracle Database to the Cloud

    In this overview of the current cloud landscape, get the what, why, when, where and how of database cloud computing.

  • Three Ways a Privileged User Can Hose Your Active Directory

    Discover three possible ways a disgruntled privileged user – or an intruder with stolen credentials – could quickly cripple your Active Directory environment. Then, read through eight best practices designed to help reduce this risk and improve on your existing AD recovery measures.

  • Managing the Economic and Operational Costs of Active Directory

    In this how-to guide, learn how to calculate the operational and opportunity costs your Active Directory environment could be incurring if your admins are strictly relying on native Windows AD tools.

  • The Future of the DBA in the Era of the Autonomous Database

    How does the future look for DBA responsibilities in the world of the autonomous database? Download this white paper to examine autonomous databases from the perspectives of companies interested in adopting them and of the DBAs they will most affect.

  • Autonomous Databases Are Here

    How does the future look for DBA responsibilities in the world of the autonomous database? How can DBAs position themselves to thrive in such a future? Download this white paper to examine autonomous databases from the perspectives of companies interested in adopting them and of the DBAs they will most affect.

  • How to Migrate the Insider Threat

    More and more IT pros are getting wise to the true nature of the insider threat. They understand that the insider threat is much more than a disgruntled admin sabotaging systems or stealing data. This white paper explains how organizations can up their game. It details 3 key best practices that will help you mitigate the insider threat.

  • Active Directory Recovery in a Cloud World

    Objects can be unintentionally deleted. Hard drives can fail. Attributes can be accidentally overwritten. There's a lot that can go wrong in an Active Directory environment. Inside, find out how cloud-imbued backup and recovery can help.

  • Simplify Your Migrations and Upgrades

    The process of migrating and upgrading hardware, operating systems, databases and software applications has become inextricably linked to risk and downtime. For the DBA, this process is a stressful one. Tap into this e-book to learn about a product that can help you alleviate the stress and risks of migration.

  • Using Data Replication to Upgrade Your Oracle Database

    An Oracle migration can save businesses big bucks—but without the right approach, migrations can cause more problems than there were to begin with. Download now to get a step-by-step guide to a flawless database migration, and learn how data replication technology can help your businesses minimize risk and maximize cost efficiency.

  • 7 Active Directory Migration Life Lessons

    There's a lot of moving pieces to consider during an Active Directory migration. In this guide, learn seven AD migration best practices, straight from various IT pros that have been in the trenches with these challenges themselves.

  • Moving your Database to the Cloud

    Explore how to move your databases to the cloud as well as what the consequences of that that move are. Deepen your understanding of the cloud, from its elasticity to potential for self-service, and learn about different deployment and service models for the cloud.

  • Active Directory Disasters and Tools to Prevent Them

    Microsoft Active Directory (AD) is the source of nearly all authentication and authorization in most Windows environments, which means it's critical to keep up and running. While AD's features can protect against some failures, there are others it can't recover from on its own. So what do you do when that dreaded day of disaster arrives?

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.