ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Security Research

  • Helping Address GDPR Compliance

    Sponsored by: Oracle Cloud

    This white paper explores how to address GDPR with a coordinated strategy built to identify threats, reduce risk, and maintain continuous compliance. Learn about a variety of security tools, stationed both on-premise and in the cloud, that are designed to help you discover, monitor, and encrypt sensitive data.

  • 6 Reasons to Upgrade your Data Management

    Sponsored by: IBM

    Discover 6 reasons to update your data management and database strategies for modern demands.

  • The Need for Sustainable Information Governance

    Sponsored by: BackOffice Associates

    In this white paper, gain valuable insights on how you can achieve desired business outcomes with effective governance of data.

  • 6 SQL Server Backup and Recovery Best Practices

    Sponsored by: Druva Software

    Read this white paper to learn 6 tips for minimizing data loss and corruption in your SQL Server.

  • Bridging to the Cloud: The Right Database can Make the Difference

    Sponsored by: IBM

    Learn about 7 factors that you should consider when making a strategic commitment to a database platform that acts as a bridge between legacy environments and the cloud.

  • Aggregate, Protect, Share: Technologies to Help Health IT Protect and Manage

    Sponsored by: IBM

    Security breaches in healthcare organizations are climbing. Inside, discover why healthcare organizations must implement more comprehensive, integrated security solutions to stay compliant, and how using a single data protection infrastructure can protect data from security breaches.

  • Phoenix Contact's mGuard Integration with SilentDefense

    Sponsored by: SecurityMatters

    This resource uncovers the key benefits of the integration of mGuard and SilentDefense to make industrial networks more resilient to cybersecurity threats and enable users to quickly identify and react to network malfunctions.

  • Top 5 Database Security Threats

    Sponsored by: Imperva

    According to the Verizon DBIR, hackers are motivated by financial gain, espionage, ideology or grudge, and even fun. This white paper examines the top 5 database security threats and explains how risk-sensitive organizations must remain a step ahead in their security posture.

  • Data Security Under GDPR: How to Prepare for the Inevitable

    Sponsored by: Fortinet, Inc.

    Access this white paper to gain guidance on how to comply with GDPR when developing data protection policies.

  • Orlin & Cohen Orthopedic Group Updates their Database Architecture

    Sponsored by: Cintra

    Find out how Orlin & Cohen Orthopedic Group adopted a highly available database architecture built on an Oracle Engineered Systems strategy with the Oracle Database Appliance at the heart of their new design.

  • Run Critical Databases in the Cloud

    Sponsored by: Oracle Corporation UK Ltd

    This white paper explores the question of whether or not a public cloud is suitable place to house your key databases. Learn about the Oracle Database Cloud, and find out how you can leverage a secure database as a service (DBaaS) platform.

  • Empower LOB Managers with Cloud Apps and Databases

    Sponsored by: Oracle Corporation UK Ltd

    From marketing and sales to HR, finance, and beyond, many LOB managers are taking lead in incorporating more cloud technologies into their own business strategies. Find out how to craft your cloud app strategy and examine a variety of Oracle's cloud-based offerings.

  • Instaclustr Blackberry Case Study

    Sponsored by: Instaclustr

    Learn how BlackBerry deployed a NoSQL database for its IoT platform to handle data intake and application scaling requirements.

  • Cloud Computing in Healthcare: CIOs Embrace the Benefits and Value

    Sponsored by: Salesforce.com

    Healthcare orgs are now seeing the value of cloud computing and its role in value-based care, pop health and patient engagement. Inside this expert guide, uncover opinions of 4 CIOs on 3 well-known cloud computing options and benefits of cloud computing in healthcare. Plus, explore a Q&A with Joshua Newman, Chief Medical Officer at Salesforce.

  • Introducing the Delphix Dynamic Data Platform

    Sponsored by: Delphix

    IDC predicts that by 2025, worldwide data will grow to 163 ZB – majority being created and managed by enterprises. What does this mean for you now? This webcast discusses the need to rethink current data management approaches and access to data, which will require significant changes among people and processes.

  • CIOs Discuss Digital Transformation

    Sponsored by: Delphix

    Learn from CIOs about their top challenges to meet today's data demands as the need for digital transformation accelerates.

  • Need More Oomph from Oracle

    Sponsored by: Oracle & Explorer

    Find out how to control Oracle costs better while improving database performance by learning how to conduct an Oracle Architecture Review.

  • Six Essential Features for Highly Available Redis DB

    Sponsored by: Redislabs

    It's important that Redis databases remain highly available because they're supporting mission-critical business applications. Learn 6 key requirements for making Redis highly available, and 6 features essential for safeguarding service and deployment.

  • 11 Things Every Organization Needs to Know When Migrating Oracle Apps to the Cloud

    Sponsored by: Cintra

    While Oracle's cloud is engineered to work with your Oracle apps and databases, it isn't simply a case of shifting exactly what you've got on-premise to the cloud. Discover 11 things you need to consider as you plan your Oracle cloud migration.

  • Cloud Security Report

    Sponsored by: Alert Logic

    According to this Cloud Security report, application attacks account for 75% of verified security incidents beating out brute force attacks, DDoS and more. In this research report, explore an overview of these different types of attacks and how attackers choose their targets.

  • The Essential Checklist: A Practical Guide to Efficient Security Response

    Sponsored by: ServiceNow

    Find out how to detect and resolve data breaches faster by using a security operations checklist to identify which areas of your strategy could benefit most from updated methodologies like security automation.

  • The Path to GDPR Compliance

    Sponsored by: Digital Shadows

    In May 2018, GDPR comes into full force. But what does this regulation bring, and how do you prepare? This white paper outlines the 4 key steps towards GDPR compliance and 8 key changes to be aware of under GDPR.

  • Mastering the Art of Database Backup and Recovery

    Sponsored by: Oracle Corporation UK Ltd

    DBAs are usually concerned with backing up their databases, but they should spend more time focusing on database recovery as part of the backup process. Read this expert guide to learn how to cover all your DB recovery bases and how to back up data more efficiently.

  • Protect with this Endpoint Security & Save Money, Too

    Sponsored by: Symantec

    Malware is becoming harder and harder to detect. Uncover strategies of how to protect against advanced malware attacks that are designed to target you.

  • GDPR: The Race is on for Compliance

    Sponsored by: Dell SecureWorks

    Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.