Database Security Research
-
E-Guide: Database Tools for Auditing and Forensics
Sponsored by: TechTarget SecurityThis e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting database performance.
-
Reducing PCI DSS Scope: The Gateway Approach
Sponsored by: IntelThis White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.
-
Introducing Oracle Exadata Database Machine X2-8
Sponsored by: Oracle CorporationOracle has recently introduced the new Exadata Database Machine X-28. Listen to this podcast featuring Ron Weiss to learn more about this new product and how it can enhance your company.
-
Presentation Transcript: Deploying Database Activity Monitoring
Sponsored by: IBMDatabase Activity Monitoring tools offer an unparalleled ability to protect sensitive assets without interfering with business processes. This presentation transcript of the video “Deploying Database Activity Monitoring,” will teach you how to determine the best use cases for DAM, what you need to protect and how to select a deployment model.
-
Log Management Best Practices: Six Tips for Success
Sponsored by: Novell, Inc.The right log management tool can go a long way toward reducing the burden of managing enterprise system log data. However, the righ tool can quickly become the wrong tool unless an organization invests the time and effort required to make the most of it. Diana Kelley offers six log management best practices to ensure a successful implementation.
-
How Secure Is Your Data? Enhancing Data Security And Compliance With Oracle Database 11g
Sponsored by: Miro Consulting, Inc.Most organizations suffer from data security vulnerabilities within their databases. In addition to the need for securing business data, regulations across industries demand compliance with standards regarding data access, auditing, segregation of duties and the protection of personally identifiable information (PII).
-
Database Security Audit and Protect Critical Databases
Sponsored by: ImpervaDatabases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
-
Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
Sponsored by: ImpervaInsider threats, both careless and malicious, abound. This fact is amplified during difficult economic times. With a plethora of digitized information, and vehicles for turning credit card data, personally identifiable information and intellectual property into cash, goods, and other services, risks have increased.
-
Choosing a Cloud Provider with Confidence
Sponsored by: GeoTrust, Inc.The goal of this paper is to help enterprises make decisions about where and when to use cloud solutions by outlining issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence.
-
Trend Micro’s End-to-End Vulnerability Management: A New Approach to Layered Security
Sponsored by: Trend Micro, Inc.An explosion in system and application vulnerabilities has been met with new ways to attack these weaknesses. In this paper, EMA analysts take a look at factors driving the need for increased security, and how new approaches to mitigating vulnerabilities such as virtual patching or remediation, provide more ways to deliver vulnerability management.
-
Presentation Transcript: Protect Data and Client Trust - An End-to-End Approach to Protecting Your Client Applications and Organizations
Sponsored by: IBMThis presentation transcript of the webcast “Protect Data and Client Trust: An End-to-End Approach to Protecting Your Client Applications and Organizations” outlines the people, process, and products that should be leveraged to enhance security throughout your applications and organization.
-
Locking Down Your Enterprise: What You Need to Know About Database Security Inside and Outside Your Company
Sponsored by: Oracle CorporationThis e-Book will take a look at how database managers can evolve their security strategies to match the increasingly sophisticated technologies used by hackers to attack their mission critical data.
-
NETGEAR ProSecure STM150 Helps Prepress Solutions Provider Double its Sales Prospects
Sponsored by: NETGEAR Inc.Agfa Graphics is a world leader in prepress solutions for the printing and publishing industries. Read this case study to learn how they maximize productivity gains from virtualization technology, without sacrificing network security with NETGEAR ProSecure STM150.
-
DATA Act Protection: Effects of a Federal Breach Notification Law
Sponsored by: CDW CorporationThis E-Guide examines new reporting requirements and how your organization will have to report a breach to the FTC and what new steps you’ll have to institute to comply.
-
Tips on Implementing Database Auditing to Address Security & Compliance Requirements
Sponsored by: IBMImplementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors. You can now download Chapter 12, “Auditing Categories”. In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements.
-
Presentation Transcript: Challenges of Securing a Smarter Planet
Sponsored by: IBMIn this presentation transcript of the webcast “Challenges of Securing a Smarter Planet,” IBM Rational's Worldwide Security Executive, Jack Danahy, discusses the changing security landscape and offers guidance to teams looking for the right place to start, and missteps to avoid.
-
eBook: The Shortcut Guide to User Workspace Management - Chapter 4: Transforming to an Environment of User Workspace Management
Sponsored by: RES SoftwareYou’ve already come to understand the workspace itself, and how that workspace can be made pervasive across the spectrum of delivery mechanisms.
-
E-Book: Data Protection Plans for Complying with Privacy Laws
Sponsored by: TechTarget SecurityThis e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!
-
Backup and Recovery Performance and Best Practices for Exadata Cell and the Oracle Exadata Database Machine
Sponsored by: Oracle CorporationOne of the key operational aspects of deploying a Sun Oracle Database Machine is to ensure that database backups are performed and restoration of the Oracle Database is possible if disaster strikes. This paper describes the best practices for setting up the optimal backup and recovery strategy to protect your mission-critical data.
-
Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
Sponsored by: Information Security MagazineThis issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
-
Implementing Database Security and Auditing: Using Granular Access Control
Sponsored by: Guardium, an IBM CompanyIn this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system.
-
Database Security: Audit and Protect Critical Databases
Sponsored by: ImpervaDatabases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse.
-
Reduce Risks and Protect Critical Information with Ease - Presentation Transcript
Sponsored by: SymantecThe threat landscape is consistently evolving and today's cyber threats are getting stealthier. With these changes, businesses are finding that anti-virus only solutions are not enough to completely protect their business from risk.
-
Why Your Organization Needs to Implement DLP
Sponsored by: Trend Micro, Inc.Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
-
Video: Oracle Active Data Guard
Sponsored by: Oracle CorporationWatch this brief video for an informative explanation of how Oracle Active Data Guard makes better use of the standby database to complement the functionality of the production database and significantly increase software and hardware return on investment.