ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Security Research

  • The case for backing up Office 365 data

    Sponsored by: Veeam Software

    Veeam Backup for Microsoft Office 365 backs up and recover’s data quickly and seamlessly. Watch this webcast to learn the 6 critical reasons for Office 365 backup and the Office 365 Shared Responsibility Model and to watch an overall demo of it in action.

  • Winning the War on Ransomware: Backup Is Part of Your Defense

    Sponsored by: Veeam Software

    Veeam utilizes several strategies when it comes to securing backups, which include offline/air gapped storage. Watch this webcast to learn how to protect your organization against ransomware with several such tools and strategies.

  • Understanding the Must-haves of Modern Data Protection

    Sponsored by: IBM

    This e-book outlines the key must-haves for modern data protection solutions and the business benefits they can provide. Read on to see what you should be looking for in a modern protection solution and to learn why simple backup can no longer cut it.

  • State of the Firewall

    Sponsored by: FireMon

    While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.

  • Vormetric Data Security Platform Architecture

    Sponsored by: Thales

    As enterprise security teams struggle to defend against more frequent & intricate attacks, data encryption has become a vital safeguard. When it comes to encryption, configuration is a constant trade-off between security & complexity. Read on for an overview of the advantages & limitations of different encryption approaches.

  • Don’t Let Misconfigurations Leave a Hole in Your Firewall

    Sponsored by: FireMon

    Human error is inevitable in manual processes. In this product overview, discover the 10 misconfigurations that cause data breaches and how FireMon Automation can help to eliminate them.

  • Elevating Enterprise Security with Fidelis Cybersecurity: Network and Deception

    Sponsored by: Fidelis

    As organizations adopt cloud technologies and regulatory requirements, networks grow increasingly complex. Security teams are finding it difficult to defend their networks without holistic insight into the environment. Does your security team have the visibility and investigative ability to defend your network? Read on to find out.

  • IBM Security Guardium Analyzer Overview Demo

    Sponsored by: IBM

    Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.

  • IBM Security Guardium Analyzer Overview Demo

    Sponsored by: IBM

    Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.

  • KuppingerCole Report Leadership Compass Database and Big Data Security

    Sponsored by: IBM

    This Leadership Compass from analyst firm KuppingerCole provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection products that best meet client’s requirements.

  • KuppingerCole Report Leadership Compass Database and Big Data Security

    Sponsored by: IBM

    This Leadership Compass from analyst firm KuppingerCole provides an overview of the market for database and big data security solutions along with guidance and recommendations for finding the sensitive data protection products that best meet client’s requirements.

  • Effective Data Management for NoSQL and Hadoop Environments

    Sponsored by: Cohesity

    The following ESG paper digs into the most important data protection and orchestration considerations for Hadoop and NoSQL deployments. Access now for more on the impact of Hadoop and NoSQL data loss and how to establish more flexible protection for these workloads in your organization.

  • Learn How to Control Access to Sensitive Data in Your Data Lake

    Sponsored by: Okera

    In this webinar, explore how you can better control access to sensitive data at scale in your data lake with Okera Active Data Access Platform. Discover how Okera can help resolve the longstanding friction between access and governance, and decide if Okera is right for your organization.

  • Security and Governance for Amazon S3 Data Lakes

    Sponsored by: Okera

    In this white paper, learn about Amazon S3 data lake security concerns for fine-grained access control and governance, and discover how an Okera Active Data Access Platform can help your organization achieve complete data access control and governance in modern data lakes.

  • The New Wave of Database Automation is Self-Driving

    Sponsored by: Oracle Corporation

    In this featured Oracle webinar, learn about the business trends driving automation. Discuss what makes an autonomous database, and explore how an autonomous database can benefit your organization.

  • Case Study: CIO interview - Stephen Docherty on NHS data sharing

    Sponsored by: ComputerWeekly.com

    The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why

  • Avoid Cyberattacks and Save Money by Holding Less Data

    Sponsored by: Evident

    Now more than ever before, data is at the heart of every organization. However, cybercriminals have increasingly targeted data because it's both monetarily lucrative and easier to steal than actual dollars. In this white paper, learn how your company can protect itself from a breach, and how data minimization can reduce the risks of cyberattacks.

  • Computer Weekly – 26 March 2019: A 'stunning victory' in Post Office Horizon trial

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we report on the latest news from the court case about the controversial Post Office Horizon IT system. IT leaders share their views on creating a strategy for the digital age. And the CIO of Halfords talks about cloud, data analytics and emerging technologies. Read the issue now.

  • The future of databases in APAC

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the promises of autonomous databases, why relational databases are poor at running digital transformation projects, and why Amazon Web Services decided to switch off its Oracle data warehouse.

  • Oracle - Autonomous computing that declines a special name

    Sponsored by: ComputerWeekly.com

    In this e-guide, follow Oracle's twin paths to adding AI and delivering software over the cloud – on its own platform and infrastructure as a service, from 2017 to 2018. An over-arching theme of Oracle's case regarding its infusion of machine learning and its declared re-architecting of its cloud delivery has been security, security, security.

  • Best Practices for Data Protection and Security in the Couchbase Data Platform

    Sponsored by: Couchbase

    Download this white paper to explore 3 security drivers in depth and find out how a data platform can provide end-to-end security control from the "core" (data center or cloud) to the "edge" (mobile device or embedded system).

  • A Managed Platform for Open-Source Applications

    Sponsored by: Instaclustr

    When it comes to open source applications, an integrated managed platform can help provide this foundation, and can provide 24/7 support, management of thousands of nodes, and more. Download this white paper to learn more about a managed platform option for open source applications.

  • Deploy your Database with Flexibility, Security, and Performance

    Sponsored by: Red Hat

    Microsoft SQL Server 2017 already provides the database management you need for your critical data, application, and analytics workloads. Explore this resource to learn how you can use supplemental open-source software with SQL Server 2017 for additional benefits, such as speed, consistency, cost efficiency and more.

  • Jargon buster guide to database management

    Sponsored by: ComputerWeekly.com

    This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.

  • Cloud Computing in Healthcare: CIOs Embrace the Benefits and Value

    Sponsored by: Salesforce.com

    Healthcare orgs are now seeing the value of cloud computing and its role in value-based care, pop health and patient engagement. Inside this expert guide, uncover opinions of 4 CIOs on 3 well-known cloud computing options and benefits of cloud computing in healthcare. Plus, explore a Q&A with Joshua Newman, Chief Medical Officer at Salesforce.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.