Database Security Research
-
Solution Spotlight: Enforcing Mobile Security Through Secure Endpoint, Access and Applications
Sponsored by: TechTarget SecurityImplementing a sound mobile security system starts with understanding what tools are out there and how they can be used effectively. This white paper will help you understand the security controls available to protect your workers and organization. Read on to get started.
-
Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
Sponsored by: Imperva.This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
-
A “How-To” Guide on Using Cloud Services for Security-Rich Data Backup
Sponsored by: IBMAccess this resource for a cloud solution that uses a collaboration of hardware, software, and services with advanced technologies to ensure data and application security, while allowing you to focus on business priorities.
-
Big data in the cloud: How to reduce data center infrastructure costs
Sponsored by: TechTarget Cloud ComputingHow can cloud computing help companies in the new world of big data? This expert handbook looks at some possible answers to this question.
-
Advanced Performance Management for Today's Complex, Critical Databases
Sponsored by: Dell SoftwareRead this informative resource to learn about how advanced performance management can help you meet the demands of high performance and around-the-clock uptime.
-
Symantec Website Security Threat Report
Sponsored by: Symantec CorporationThis document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
-
How Red Hat Delivers a Secure Enterprise Platform for Next-Generation DataCenters
Sponsored by: Red HatThis whitepaper will introduce you to the key differentiators that set Red Hat Enterprise Linux apart in regards to security for next-generation datacenters. Read on to learn more.
-
A Proactive Approach to Compliance, Security and Audit
Sponsored by: IBMThis exclusive resource examines an integrated solution for automating the complete security and compliance lifestyle across your entire database infrastructure.
-
Creating the Ultimate Security Platform
Sponsored by: IBMThis whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
-
Secure File Transfer Tech Guide
Sponsored by: TechTarget SecurityRead this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
-
Presentation Transcript: Content Monitoring in the Enterprise
Sponsored by: LumensionThis presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
-
Expert tips and considerations for database appliances
Sponsored by: DelphixThis e-guide from SearchCIO.com takes a look at one organization's quest to find the right database appliance that suited their needs. Read now for an in-depth analysis of current database appliance offerings, as well as relevant considerations for database security.
-
MongoDB on Red Hat Enterprise Linux
Sponsored by: MongoDB, Inc.Check out this paper and discover how to deploy MongoDB onto Red Hat Enterprise 6.2. In addition to a step-by-step process for deployment, you'll also learn how to take advantage of features of the underlying system, several deployment scenarios for high performance database read and writes, and gain an in-depth look at MongoDB.
-
Webroot Secure Anywhere Business - Mobile Protection
Sponsored by: OpenText Security SolutionsLearn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.
-
Webroot Endpoint Security eBook
Sponsored by: OpenText Security SolutionsThis resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
-
Protect citizen data with IBM Rational software
Sponsored by: IBMDigital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.
-
Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
Sponsored by: Rapid7Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
-
Thinking strategically about mobility and enterprise data
Sponsored by: AppSenseIT professionals face new governance challenges as a result of the transformation of enterprise computing. The demand for mobile productivity is constantly growing, and IT leaders need to find solutions for mobility without sacrificing efficiency or governance.
-
Oracle Data Mining 11g Release 2 Competing on In-Database Analytics
Sponsored by: Oracle CorporationThis paper offers an overview of Oracle Data Mining, detailing how you can build predictive models to better target customers, develop detailed customer profiles and detect and prevent fraud. Read on and learn how this data mining tool eliminates data extraction and movement, delivers the lowest TCO compared to traditional vendors and more.
-
Download free DB2 10 Express-C software
Sponsored by: IBMView this webpage to learn about the features of IBM DB2 for Linux, UNIX, and Windows, including autonomics, storage optimization, SQL compatibility, XML support, virtualization, developer support, and more.
-
Ponemon Study: 2011 Cost of a Data Breach
Sponsored by: Symantec CorporationThis annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
-
Customers Discuss Oracle Database Security
Sponsored by: Oracle CorporationOracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.
-
Top Five Reasons Why Customers Deploy Microsoft SQL Server on EMC VNX Unified Storage
Sponsored by: EMC CorporationTop five reasons why customers deploy Microsoft SQL Server on EMC VNX Unified Storage.
-
Presentation Transcript: New Releases from Intel and IBM offer Breakthrough Database Performance
Sponsored by: Intel and IBMRead this presentation transcript now and learn about these advances that are possible by combining the Intel Xeon processor E5-2600 product family with IBM DB2 10 for Linux, Unix and Windows.
-
Analyst Whitepaper: Bloor Research: Sybase ASE Total Cost of Ownership - A Comparison to Oracle
Sponsored by: SAP America, Inc.Given that Sybase ASE can now be deployed as the foundation for SAP Business Suite and BW implementations (in addition to Oracle, Microsoft SQL Server and IBM DB2), the information is relevant to SAP customers installing a new instance of SAP or looking to migrate their existing SAP installation to a different database.