Database Security Research
-
Stopping application layer DDoS attacks: What you need to know
Sponsored by: TechTarget SecurityWhile a DDoS attack can be damaging to any organization, DDoS attacks specifically at the application-layer can be more ominous. Understanding these attacks are the first step to keeping your organization protected. In this e-guide, explore how DDoS is being used, what you can do to stop them, the future of the web threat landscape and more.
-
Introducing the Next Generation of SPARC Servers E-Book
Sponsored by: Oracle CorporationDiscover the benefits of Oracle's new SPARC T4 servers and how they deliver world record performance for a wide range of enterprise applications, and offer enhanced reliability and security, improved virtualization tools, and reduced costs. View this e-book packed with valuable information, customer success stories, and a 3D demo.
-
IOUG 2011 Survey: The Petabyte Challenge: 2011 IOUG Database Growth Survey
Sponsored by: Oracle CorporationMore than 300 database and information security professionals were recently surveyed on their data security practices. The results were disturbing with 60% saying that a data breach is likely over the next 12 months. Download this complimentary copy of the 2011 IOUG Data Security Survey Report and see how your organization measures up.
-
Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements
Sponsored by: Oracle CorporationAlthough most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy.
-
Oracle Database 11g Release 2 High Availability
Sponsored by: Oracle CorporationThis white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
-
Server Optimization, Hardware and Virtualization
Sponsored by: DELL TECHNOLOGIES AND MICROSOFTIn this expert e-guide, find out how to optimize SQL Server with the right choices for hardware, storage devices, and virtualization. Inside, find articles on: what not to do when purchasing hardware; if solid-state storage devices are worth the cost; hardware and risk considerations for an inevitable virtualization initiative.
-
Data Masking Best Practices for Copying Sensitive Data Into Non-Production Environments
Sponsored by: Oracle CorporationDownload this paper to learn data masking best practices and enable your organization to safely use production data for development, testing, and sharing with out-source or off-shore partners, without risking a sensitive data breach.
-
IBM DB2 Webcast Series for Oracle Professionals
Sponsored by: IBMDue to PL/SQL and a range of other compatibilty features, Oracle applications are much more easily enabled for DB2. Use this short webcast to get level-set on terms. Part of a series, this short webcast replay is an overview of DB2 terms and terminology for those most familiar with the Oracle environment.
-
SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools
Sponsored by: IBMAuditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.
-
SearchCompliance.com E-guide: A lesson in database security: What every compliance officer needs to know
Sponsored by: IBMToo many enterprise databases are leaking sensitive information. Yet the solution to these problems is simple: user education, coupled with a new breed of database activity monitoring tools. This e-guide provides guidelines for establishing a data protection framework and teaching the right way to handle data.
-
SearchSecurity.com E-Guide: 5 Simple Steps to Secure Database Development
Sponsored by: IBMDatabases and the information they hold are always an attractive target for hackers looking to exploit weaknesses in database applications. This expert e-guide explains the 5 most common database-related vulnerabilities and offers technical advice on how to avoid them.
-
Discover What’s New in Oracle Data Integrator and Oracle GoldenGate
Sponsored by: Oracle CorporationJoin Oracle data integration experts as they discuss the new versions of Oracle Data Integrator and Oracle GoldenGate.
-
SearchSecurity.com E-Guide: Database monitoring best practices: How to use DAM tools
Sponsored by: IBMProtecting databases and the data they contain is a challenging task for every IT security professional. This expert e-guide provides best practices for database activity monitoring and explains a step by step process for prioritizing data and protecting transactions.
-
E-Guide: Improving Oracle Database Performance
Sponsored by: SAVVISRead this E-guide to learn how to move mission-critical Oracle application to virtualized environments with little disruption or pain.
-
IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
Sponsored by: IBMAs hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance. Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
-
Employing IBM Database Encryption Expert to meet encryption and access control requirements for the Payment Card Industry Data Security Standards (PCI DSS)
Sponsored by: IBMThis white paper explores the challenges of compliance with PCI and how organizations must take a holistic approach to protecting and securing their business-critical information.
-
Controlling Risk Through Software Code Governance
Sponsored by: Coverity by SynopsysSoftware code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain.
-
Oracle Advanced Security with Oracle Database 11g Release 2
Sponsored by: Oracle CorporationThis white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
-
E-Guide: Writing secure SQL database code
Sponsored by: IBMWhen developing and deploying a database, organizations should never rely solely on their developers to provide security. This expert e-guide offers tips for writing secure SQL database code to ensure you build appropriate security controls for the specific features and functionality you need.
-
E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options
Sponsored by: IBMCreating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization.
-
E-Guide: Data Retention and Business Continuity Best Practices
Sponsored by: IBMThis SearchStorage.com E-Guide focuses on retention issues that can’t be ignored, how to go about aligning your data protection strategy with business continuity, and leveraging overlooked backup strategies to your advantage. Download this informative e-guide to learn more!
-
Implementing Database Security and Auditing - Authentication and Password Security
Sponsored by: IBMIn order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.
-
Presentation Transcript: Disaster Recovery Planning and Security for the IT Industry
Sponsored by: IBMThe biggest security issues are the ones that you don’t know about – and the reality is many businesses don’t truly know where they stand. Check out this presentation transcript from a SearchDisasterRecovery.com webcast to learn about today’s biggest security concerns and best practices for protecting your IT center.
-
SearchStorage eGuide: A smarter approach to data protection: 4 best practices
Sponsored by: IBMThere's a big difference between backup and business continuity. When it comes to protecting business critical information, the digital era has brought with it exposure to more threats from more directions than ever before. Download this SearchStorage.com E-Guide to learn all about protecting the use of information and data files.
-
Presentation Transcript: Client-Side Security Issues - The Twilight Zone of Web Security
Sponsored by: IBMThis presentation transcript discusses the various types of JavaScript client-side issues that exist in today’s Web applications, their prevalence on the internet and how to locate and fix them.