ComputerWeekly.com Research Library

Powered by Bitpipe.com

Database Security Research

  • Secure VDI with NSX

    Sponsored by: VMware International Unlimited Company

    What if you could build in a zero-trust architecture at the most granular level of the data center? And what if you could maintain that level of consistent security across dynamically created desktops? In this video, learn how you can microsegment your VDI environments with VMware NSX platform.

  • The Top 10 Reasons to Choose Oracle Autonomous Database

    Sponsored by: Oracle Cloud

    Running a quality database can be resource intensive and time consuming. To overcome menial database headaches, companies are turning to automated solutions like Oracle’s Autonomous Database. Check out this list of the top 10 reasons customers choose the Oracle Autonomous Database to see why it’s becoming an increasingly popular solution.

  • Security Best Practices for PostgreSQL

    Sponsored by: EnterpriseDB

    Securing your PostgreSQL database is a multifaceted undertaking that involves evaluating everything from physical security to authentication protocols. Read this EnterpriseDB white paper to learn PostgreSQL security best practices as well as how to implement them in your own database.

  • Creating a Multi-Layered Secured Postgres Database

    Sponsored by: EnterpriseDB

    When it comes to the mission-critical and often sensitive workloads you run on your databases, nothing short of the best security should be accepted. Watch this video to learn how you can create a multi-layered security architecture for your Posgres database, with features including authorization, authentication, and auditing.

  • Best Practices for Database Consolidation

    Sponsored by: Oracle and Intel®

    Databases are essential for nearly everything, from mission critical operations to AI and ML training. But database infrastructure can become sprawling and fractured, limiting governance and efficiency. Read this e-book to learn how you can consolidate Oracle databases and improve your database ecosystem.

  • Creating a Multi-layered Secured Postgres Database

    Sponsored by: EDB

    Creating a database with multiple layers of security isn’t easy; and in today’s world of malware, strict data regulations, and cybercrime, data security is more important than ever. Watch this webinar to learn how you can create a multi-layered security architecture for your Postgres database, with authentication, authorization, auditing, and more.

  • Securing the Data Center in Just Four Steps

    Sponsored by: VMware

    Security perimeters of yesterday are falling out of fashion due to their permeability, but securing east-west traffic can be expensive in a world of increasingly dynamic workloads. Enter a distributed, scale-out internal firewall, designed to monitor and protect east-west traffic to keep your data center secure. Read this white paper to learn more.

  • Building Secure Software in a Complex Environment

    Sponsored by: MongoDB, Inc.

    While the primary goal of databases like MongoDB is to make data accessible and easy to work with, it would be pointless to have a database that is perfect to keep data on and vulnerable to cyberattacks at the same time. Read on to learn how MongoDB was able to build security into their scalable, accessible database.

  • Tintri Introduces SQL Integrated Storage

    Sponsored by: Tintri

    To learn more about SQL integrated storage and its cross-team benefits, as well as to view a new solution from Tintri in this area, download this exclusive Storage Switzerland white paper.

  • Complexity in Cybersecurity Report

    Sponsored by: IBM

    Threats have become a board-level concern and it’s fueled a spending spree in security products over the last two years. For many organizations, disconnected point solutions have increased the complexity of their security environments, making it difficult to respond quickly to threats. Fill out this form to read more about it.

  • The Changing Face of Global Data Privacy: GDPR, CCPA, and Beyond

    Sponsored by: MongoDB, Inc.

    For companies that collect user data, the GDPR was just the beginning of a regulatory onslaught; the CCPA signifies a start of a wave of similar legislation across another country, with more to follow. Check out this white paper to learn how you can map privacy controls to databases and meet data privacy requirements with MongoDB.

  • Scale Your Startup with MongoDB

    Sponsored by: MongoDB, Inc.

    In this webcast, MongoDB Director Mike Lynn introduces MongoDB Atlas, their global database service which can simplify database scaling with the cloud in just a few clicks. Tune in to learn how to add users, manage access, and more.

  • Kingminer –a Crypto-Jacking Botnet Under the Scope

    Sponsored by: Bitdefender

    Kingminer is a piece of crypto-jacking malware that has been around since early 2018. It is an infection that begins from an SQL server process and exploits configuration flaws to obtain access to said server and schedules malicious commands for execution. Read this white paper for a technical analysis and how to know if you’ve been compromised.

  • How Modern DevOps Teams Use MongoDB Atlas to Enhance Productivity

    Sponsored by: MongoDB, Inc.

    DevOps has been a blessing for developers and companies ever since it burst onto the scene in 2008, but its use isn’t only limited to application development. Check out this white paper to learn how MongoDB is designed to integrate with DevOps teams and processes, guaranteeing high availability and unprecedented database visibility.

  • Loading DLLs for Illicit Profit: A Story About a Metamorfo Distribution Campaign

    Sponsored by: Bitdefender

    Dynamic-link libraries (DLLs) are on-ramps into a network that tend to be overlooked. Hackers can hijack an organization’s DLLs leaving valuable company data vulnerable to attack and theft. Read this white paper for a closer look at how cybercriminals hack DLLs for illicit profit and how you may be able to prevent these criminals.

  • Protecting Sensitive Data in and Around an Oracle Database

    Sponsored by: Thales

    When planning to secure sensitive data in an Oracle database, enterprises need to consider that sensitive data may reside in unanticipated locations outside of the database itself. Robust data security includes considering how to secure sensitive data surrounding the Oracle database. Read on to learn how to get started.

  • Case Study: CIO interview - Stephen Docherty on NHS data sharing

    Sponsored by: ComputerWeekly.com

    The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why

  • Europe's controversial digital vision for the next decade

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.

  • Automatic Whole Database Encryption – How It Works

    Sponsored by: NetLib Security

    In this online white paper are three diagrams that show a simplified, brief outline of how Encryptionizer works. Read on to get started.

  • Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector

    Sponsored by: NetLib Security

    In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.

  • Multitenancy Options in Postgres

    Sponsored by: EDB

    This white paper will show you the different ways that Postgres can help you achieve a multitenant database architecture. Download now for a complete architectural overview and to view these 3 multitenancy options at your disposal.

  • Disaster Recovery Planning Ahead

    Sponsored by: OffSiteDataSync and Veeam

    A disaster recovery plan will help your organization resume business operations within an acceptable timeframe should an outage or emergency occur. Access this e-book to learn why disaster recovery plans are necessary for businesses of all sizes and get guidance for putting your plan into action.

  • Dremio Security Architecture Guide

    Sponsored by: Dremio

    Because data sets and analytics systems are valuable targets for cybercriminals, it is important that your data access and analysis systems provide a variety of security options so that you can protect your organization’s data from potential threats. Read the attached guide to see some security choices that the data lake engine Dremio offers.

  • Navigating VMware and Cloud Backups

    Sponsored by: Clumio

    VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.

  • How to Implement a Strong COVID-19 Cybersecurity Plan

    Sponsored by: SearchSecurity.com

    Cybercriminals aren't slowing down during the pandemic, and neither can your security. Learn about the biggest threats right now and how to stop them cold.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.