Database Security White Papers

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 1 - 25 of 245Sort Results By: Published Date | Title | Company Name
By: Lumension     Published Date: Feb 07, 2014

Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.

Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
By: Compass Datacenters     Published Date: Apr 07, 2014

Learn about the central issues that tend to be consistent across all Request for Proposals (RFPs) and see what questions you should be asking in order to maximize the efficiency of your mission critical data center.

Tags : rfp, request for proposal, questions, data centers, compass datacenters, big business, data, business intelligence
    
By: Code 42     Published Date: Mar 20, 2014

Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn't provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data.

Tags : code42 software, endpoint backup, data migration, data loss, data management, data risk, encryption, network security
    
By: Webroot Inc     Published Date: Mar 05, 2014

Learn the top 5 malware trends for 2014 and how your organization can best protect against hackers and cyber thieves.

Tags : malware, security, cyber thieves, malware trends, security systems, webroot, networking, wireless
    
By: Dell Software     Published Date: Feb 19, 2014

Discover what you need to know to successfully manage your diverse database infrastructures in this new white paper. Topics include: • Balancing key business metrics • Understanding a DBAs challenges • Finding the right tools to monitor and manage the database environment • ...and much more!

Tags : database development, database security
    
By: Kaspersky     Published Date: Feb 14, 2014

Whether they are working in your headquarters, a home office, or on the road, employees, partners, and vendors need to have confidential data at their fingertips to conduct business effectively. The likelihood of this data becoming exposed through unsecured transfers or lost devices is a frightening reality.

Tags : encypt, encryption, secure file transfer, cyber security, cybersecurity, security, it protection, kaspersky
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection".

Tags : business protection, data protection, business security, it security, business continuity, database security, secure content management
    
By: CA Technologies     Published Date: Jan 06, 2014

This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.

Tags : mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
    
By: Adobe     Published Date: Nov 25, 2013

In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer? Please download to learn more.

Tags : it management environment, document integration, document security, mobile, mobile apps, personal devices, define data, mobile workforce
    
By: GetWellNetwork, Inc.     Published Date: Nov 22, 2013

Learn how to improve the efficiency of your pain management workflow and see how these changes will improve the day to day tasks for your nurses allowing them to work more effectively.

Tags : getwell network, pain management, pain management workflow, joint commission, pain assessment documentation, pain management workflow, performance improvement, managing patient pain levels
    
By: CA Technologies     Published Date: Nov 19, 2013

Learn how to handle the hidden complexities virtualization introduces to backup and recovery requirements and how to refine your disaster recovery process.

Tags : backup, recovery, virtualization, storage, public cloud, disaster recovery, ca arcserve backup, server virtualization
    
By: CA Technologies     Published Date: Nov 19, 2013

Learn why certain current practices for data protection are costing your organization money and learn the best practices for how to make the most out of your limited budget.

Tags : budget, virtualization, it infrastructures, hidden costs, backup, backup storage, cloud storage, disaster recovery
    
By: CA Technologies     Published Date: Nov 19, 2013

Learn how to properly select an IT solution for your organization in 5 easy steps in order to cut costs and improve productivity.

Tags : backup, backup storage, cloud storage, disaster recovery, infrastructure visualization, ca arcserve backup, server virtualization, storage virtualization
    
By: Qualys     Published Date: Nov 05, 2013

Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.

Tags : qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
    
By: Qualys     Published Date: Nov 05, 2013

Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.

Tags : qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
    
By: Mimecast     Published Date: Oct 17, 2013

Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) global enterprises may realize by using Mimecast’s Unified Email Management (UEM) solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the full Mimecast UEM service on their organizations. Mimecast UEM is a suite of email security, archiving, and continuity services, which can also be purchased separately if required.

Tags : mimecast, forrester research, unified email management, uem, economic impact, return on investment, roi, evaluate financial impact
    
By: IBM     Published Date: Oct 10, 2013

Many IT executive view cloud computing as an attractive platform for data backup. They know cloud can help protect business-critical data and provide near-ubiquitous information access. But while having a cloud-based solution is valuable, developing one in-house is tricky. That's why many organizations want to contract with a third-party cloud provider for cloud-based data backup. Read this buyer's guide to learn how to choose a provider to suit your business needs.

Tags : cloud based, data backup, cloud based data, buyers guide, third-party provider, business development, cloud computing, information access
    
By: IBM     Published Date: Oct 10, 2013

Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster recovery strategy successful, and the key questions you need to ask before bringing disaster recovery in-house.

Tags : disaster recovery, do it yourself, ibm, forrester, recovery speed, disaster recovery management, disaster recovery management, backup and recovery
    
By: IBM     Published Date: Oct 10, 2013

Zurich Insurance suffered a major flooding incident in 2011 that put their office out of commission for almost a month. The company invoked its disaster recovery plan and moved 120 staff to IBM’s Damastown Technology Campus. Read the case study to find out how planning and working with IBM helped Zurich Insurance cope with this serious incident.

Tags : disaster recovery, zurich insurance, flooding, recovery, natural disaster, disaster recovery plan, ibm, backup and recovery
    
By: Oracle Corporation     Published Date: Apr 01, 2013

Discover how to accelerate database performance, handle change and growth in scalable, incremental steps, and deliver mission-critical data availability and protection with this unique commercial solution.

Tags : database, oracle, storage, data, data warehousing, high availability, database development, data protection
    
By: Oracle Corporation     Published Date: Apr 01, 2013

This paper focuses on configuring Oracle GoldenGate to run on Oracle Exadata. The Oracle Exadata Database Machine can act as the source database, as the target database, or in some cases as both source and target databases for GoldenGate processing.

Tags : database, goldengate, oracle, maximum availability architecture, arcitecture, high availability, configuration management, database development
    
By: McAfee     Published Date: Mar 07, 2013

McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
By: McAfee     Published Date: Feb 06, 2013

This paper addresses the Big Security Data challenge and highlights the key criteria organizations need to consider for processing security information in light of today’s dynamic threat landscape.

Tags : big data, big security data, mcafee siem, intrusion detection systems, security monitoring, anti spyware, anti virus, application security
    
By: Datto Inc.     Published Date: Feb 05, 2013

In this white paper Datto explores the different types of risk in IT infrastructure and the ways intelligent business continuity can best mitigate that risk.

Tags : backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
    
By: Lumension     Published Date: Jan 18, 2013

HIPAA and the HITECH Act put pressure on your organization to maintain the privacy and security of patient data, with the potential legal liability for non-compliance. So how does your healthcare organization meet industry best practices?

Tags : hipaaa, hitech act, compliance, cyber liability, healthcare data, data compliance, access control, application security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End