Database Security Research
-
10 Reasons to Upgrade to Oracle Database 12c
Sponsored by: OracleLet Brian Peasland, a DBA with over 20 years of experience, explains why you should upgrade to Oracle Database 12c. Learn about how you can gain increased back-end support, updated hardware and OS, security patches and more inside.
-
The Enterprise Guide to SAP HANA's Cloud Models and Migration Checklist
Sponsored by: UXC Oxygen and Amazon Web ServicesIf you're considering HANA but are unsure about SAP's models of cloud computing, you'll want to fully outline your deployment options before migration. Discover three options for cloud-based HANA, as well as 6-point checklist for crafting a successful cloud migration strategy.
-
AWS Lowers Cost Barriers for SAP HANA and Database Migrations to the Cloud
Sponsored by: UXC Oxygen and Amazon Web ServicesAlthough SAP deployments are currently dominated by appliances, more companies are tapping the cloud. But is cloud deployment a smart decision for you? Download now to weigh SAP HANA on-premises options against their cloud offerings. Also, discover how AWS' new tools will lower cost barriers for database cloud migrations.
-
Building an Unstructured Data Protection Program
Sponsored by: STEALTHbitsIn this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
-
3 Steps to Secure Cloud Database-as-a-Service
Sponsored by: Oracle Corporation UK LtdDatabase-as-a-Service (DBaaS) may be easy to deploy and easy to manage, but it's not without its own security challenges. Evaluating a provider is an important first step, but where do you go from there? In this e-guide, we explore 3 key steps to ensuring secure cloud database services. Discover how to make your DBaaS migration safe and successful.
-
Information Security ANZ July 2016
Sponsored by: TechTarget SecurityAustralia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.
-
Malware Hitching a Ride on Mobile Apps?
Sponsored by: TechTarget SecurityThe latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
-
Tips to Secure your Virtualized Data Center
Sponsored by: TechData - KasperskyThis e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
-
CW Europe – May 2015
Sponsored by: TechTarget ComputerWeekly.comIn this issue, CW Europe's security editor investigates whether the legislation could strangle Europe's productivity and whether businesses see the regulations as a burden.
-
Information Security ASEAN March 2015
Sponsored by: TechTarget SecurityOrganizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
-
Why Every CIO Should Consider Vulnerability Assessment a Necessity
Sponsored by: IBMIn this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
-
Computer Weekly – 9 December 2014: The most influential people in UK IT
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we unveil the 50 most influential people in UK IT for 2014, and interview the winner of our UKtech50 list, Unilever's global CIO, Jane Moran. We examine how Cisco is responding to software-defined networking. And we hear from IT chiefs successfully implementing identity and access management. Read the issue now.
-
Protecting Your Critical Data with Integrated Security Intelligence
Sponsored by: IBMAccess this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
-
Information Security Magazine – July/August 2014
Sponsored by: TechTarget SecurityBig data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
-
SQL Safe Backup: Automate Backups Safely, and Faster
Sponsored by: IderaEliminate application downtime, automate SQL Server backup, and speed up processes. Learn about the key features of SQL Safe Backup and gain full access to a 14 day free trial.
-
Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
Sponsored by: Symantec CorporationTune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
-
How to keep your confidential information safe
Sponsored by: InformaticaAccess this concise resource to uncover the key features of a data masking tool, to ensure the security of your organization's reputation and confidential information.
-
Achieving High Oracle Performance
Sponsored by: Dell SoftwareDBAs cannot afford to rely on reactive measures anymore. They need advanced performance management tools that will enable them to catch emerging issues before they can affect end users. Discover how advanced database management can help DBAs protect the system by preventing problems from developing at all. Download the white paper to learn more.
-
Data protection tool that's easy to install & configure
Sponsored by: InformaticaRead this exclusive resource to uncover all the ins-and-outs of one industry-leading data protection tool.
-
Is your data as well protected as it should be?
Sponsored by: InformaticaRead this exclusive white paper now to discover the big data security tool capable of significantly reducing the risk of a data breach, while helping organizations comply with data regulations and policies.
-
Comparing IBM Informix and Oracle Database for High Availability and Data Replication, an ITG Management Report
Sponsored by: IBMIn this report, get an in-depth comparison between Oracle Databases and Real Application Clusters (RAC) and IBM Informix with regards to high availability and data replication.
-
New data management tool will protect your nonproduction environments
Sponsored by: InformaticaAccess this exclusive datasheet now to uncover the data management tool for nonproduction environments, as well as its key features and benefits.
-
Manage Data Security and Application Threats with a Multi-Tiered Approach
Sponsored by: IBMThis resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
Creating SANLess Microsoft SQL Server Failover Cluster Instances with SIOS DataKeeper Cluster Edition and Fusion-io
Sponsored by: SIOS Technology CorpDeploying a failover cluster instance (FCI) architecture for your SQL Server database requires expensive shared storage for data files and backups. This resource introduces an alternative to storage area networks (SANs) that provides the availability benefit of an FCI – without the high price tag.