ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Security Research

  • Webinar: You Need Live Patching to Achieve SOC2 Compliance

    Sponsored by: CloudLinux

    In this webinar, join industry experts as they share best practices and use cases of data protection and vulnerability management for maintaining compliance in their Linux-based systems. Continue to view the webinar.

  • Ransomware - Protect Your Data

    Sponsored by: Commvault

    One trend that is gaining popularity in ransomware recovery is a holistic solution with an ability to align recovery operations to the value of the data. Tune into this webcast to view the key takeaways from this Gartner research, analyze real-world ransomware case studies, and discover the 4 key elements of a risk mitigation strategy.

  • Cost Efficient Backups for the Enterprise

    Sponsored by: Druva

    Access this white paper for a rundown of the pros and cons of each type of deduplication and to view a solution that unifies data protection with global dedupe to break up operational silos and simplify administration.

  • 9 Steps to Critical Event Management Improvement

    Sponsored by: EverBridge Inc.

    By leveraging a holistic approach to CEM, organizations can look forward to a more unified, distributed, automated, and collaborative process. Access this white paper to discover an essential 9-step CEM process that organizations can use to improve their responses to critical events.

  • Enterprise Family Guide

    Sponsored by: TechData - Seagate

    Access this white paper to learn about a family of vertically integrated Enterprise Data Solutions from Seagate, including the Exos Enterprise Hard Drives and the Nytro Enterprise Solid-State Drives, that are fit to accommodate zettabyte-level data capacity and performance.

  • Cloud Data Protection for VMware Cloud on AWS

    Sponsored by: Druva

    Organizations can implement Druva and VMware Cloud on AWS to move and protect applications as needed, accelerate and simplify data migration, and utilize robust DR. Watch this webcast to learn how AWS, VMware, and Druva fit together to streamline your data backup and restoration needs.

  • Your SAP Applications Belong on NetApp

    Sponsored by: NetApp

    Read this solution brief to view several storage solutions with which you can boost SAP performance and app efficiency and learn the 10 benefits your organization can realize by partnering with NetApp.

  • State of the Firewall

    Sponsored by: FireMon

    While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.

  • Vormetric Data Security Platform Architecture

    Sponsored by: Thales

    As enterprise security teams struggle to defend against more frequent & intricate attacks, data encryption has become a vital safeguard. When it comes to encryption, configuration is a constant trade-off between security & complexity. Read on for an overview of the advantages & limitations of different encryption approaches.

  • Don’t Let Misconfigurations Leave a Hole in Your Firewall

    Sponsored by: FireMon

    Human error is inevitable in manual processes. In this product overview, discover the 10 misconfigurations that cause data breaches and how FireMon Automation can help to eliminate them.

  • Effective Data Management for NoSQL and Hadoop Environments

    Sponsored by: Cohesity

    The following ESG paper digs into the most important data protection and orchestration considerations for Hadoop and NoSQL deployments. Access now for more on the impact of Hadoop and NoSQL data loss and how to establish more flexible protection for these workloads in your organization.

  • Learn How to Control Access to Sensitive Data in Your Data Lake

    Sponsored by: Okera

    In this webinar, explore how you can better control access to sensitive data at scale in your data lake with Okera Active Data Access Platform. Discover how Okera can help resolve the longstanding friction between access and governance, and decide if Okera is right for your organization.

  • Security and Governance for Amazon S3 Data Lakes

    Sponsored by: Okera

    In this white paper, learn about Amazon S3 data lake security concerns for fine-grained access control and governance, and discover how an Okera Active Data Access Platform can help your organization achieve complete data access control and governance in modern data lakes.

  • Case Study: CIO interview - Stephen Docherty on NHS data sharing

    Sponsored by: ComputerWeekly.com

    The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why

  • Computer Weekly – 26 March 2019: A 'stunning victory' in Post Office Horizon trial

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we report on the latest news from the court case about the controversial Post Office Horizon IT system. IT leaders share their views on creating a strategy for the digital age. And the CIO of Halfords talks about cloud, data analytics and emerging technologies. Read the issue now.

  • The future of databases in APAC

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about the promises of autonomous databases, why relational databases are poor at running digital transformation projects, and why Amazon Web Services decided to switch off its Oracle data warehouse.

  • Oracle - Autonomous computing that declines a special name

    Sponsored by: ComputerWeekly.com

    In this e-guide, follow Oracle's twin paths to adding AI and delivering software over the cloud – on its own platform and infrastructure as a service, from 2017 to 2018. An over-arching theme of Oracle's case regarding its infusion of machine learning and its declared re-architecting of its cloud delivery has been security, security, security.

  • Best Practices for Data Protection and Security in the Couchbase Data Platform

    Sponsored by: Couchbase

    Download this white paper to explore 3 security drivers in depth and find out how a data platform can provide end-to-end security control from the "core" (data center or cloud) to the "edge" (mobile device or embedded system).

  • A Managed Platform for Open-Source Applications

    Sponsored by: Instaclustr

    When it comes to open source applications, an integrated managed platform can help provide this foundation, and can provide 24/7 support, management of thousands of nodes, and more. Download this white paper to learn more about a managed platform option for open source applications.

  • Jargon buster guide to database management

    Sponsored by: ComputerWeekly.com

    This Jargon Buster e-guide to contemporary database management is an aid to stepping back and thinking afresh about an area of enterprise IT that has many decades of heritage. Or, as many sometimes (arguably rudely) put it, legacy.

  • Data protection: Not just about personal data and compliance

    Sponsored by: ComputerWeekly.com

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

  • Cloud Computing in Healthcare: CIOs Embrace the Benefits and Value

    Sponsored by: Salesforce.com

    Healthcare orgs are now seeing the value of cloud computing and its role in value-based care, pop health and patient engagement. Inside this expert guide, uncover opinions of 4 CIOs on 3 well-known cloud computing options and benefits of cloud computing in healthcare. Plus, explore a Q&A with Joshua Newman, Chief Medical Officer at Salesforce.

  • Mastering the Art of Database Backup and Recovery

    Sponsored by: Oracle Corporation UK Ltd

    DBAs are usually concerned with backing up their databases, but they should spend more time focusing on database recovery as part of the backup process. Read this expert guide to learn how to cover all your DB recovery bases and how to back up data more efficiently.

  • GDPR: The Race is on for Compliance

    Sponsored by: Dell SecureWorks

    Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.

  • How to Manage Oracle E-Business Suite Apps and Databases

    Sponsored by: Data Intensity

    In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.