Database Security White Papers

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 1 - 25 of 276Sort Results By: Published Date | Title | Company Name
By: Comcast     Published Date: Jan 15, 2015

For most small and mid-sized businesses the future is all about growth, and a cloud-based approach to information technology is inherently supportive of growth strategies.

Tags : comcast, technology, business, blueprint, plan, start-up, start, future
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, database security, data loss prevention
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage virtualization, database security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 19, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 19, 2014

This report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response of a data security breach.

Tags : the cost of a data breach, business costs of a data breach, responses to a data breach, firewalls, internet security, intrusion detection, intrusion prevention, data protection
    
By: Symantec     Published Date: Nov 19, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, disaster recovery
    
By: Symantec     Published Date: Nov 19, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, data protection, database security, virtualization
    
By: Lenovo     Published Date: Sep 16, 2014

Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve mobility and BYOD demands. Though traditional VDI vendors bring their own solutions to market, isn’t it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services can be most compatible, agencies can take a smarter approach to these difficult decisions. See the tradeoffs in plain English, and learn why more agencies are taking notice to emerging cloud technologies through this exclusive executive summary.

Tags : vdi, cloud alternatives, byod demands, emerging web technologies, business intelligence, data protection, database security, productivity
    
By: Lenovo     Published Date: Sep 16, 2014

Agency IT is tasked with building smarter and more responsive state and local government services, while CTOs look to enable government workforce mobility and address strategic issues, such as BYOD. Adding to the challenge is a rise in devices, data, and even multiple OS’s that IT must support and secure. With the decline in traditional Windows-based computing, these challenges are driving agencies toward cloud solutions that don't sacrifice security or IT manageability. See our featured cloud solution for government agencies that has IT leaders re-thinking how they enable mobile productivity.

Tags : agency it, workforce mobility, mobile productivity, cloud computing, it management, project management, web services, database security
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection".

Tags : business protection, data protection, business security, it security, business continuity, database security, secure content management
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular thirdparty applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: Entrust     Published Date: Jan 16, 2015

Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.

Tags : entrust, security, certificate, b2b, application, browser, applications, saas
    
By: CA Technologies     Published Date: Jan 09, 2015

This White Paper provides information on how enhance delivery secure and improve customer experience.

Tags : security demands, ways to enhance delivery of secure, protect the business, new security services, delivery security solutions, access control, anti spam, application security
    
By: Firehost     Published Date: Jan 07, 2015

This Webinar covers all of the details you will need to know about PCI DSS 3.0.

Tags : pci dss 3.0, data security program, risk management practices, pci, backup and recovery, access control, anti virus, application security
    
By: Samsung     Published Date: Dec 11, 2014

This White Paper explores how the proliferation of smartphones and tablets (the global installed base of smartphones alone is set to hit 3 billion devices by 2017) has led consumers to adopt new behaviours, and develop expectations around what experiences mobile computing can offer.

Tags : mobile computing, cloud computing, network performance, security management, mobile workers, smart phones, database security, content integration
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, database security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, database security, virtualization, data loss prevention
    
By: GreenSQL     Published Date: Nov 11, 2014

This report provides the 10 essential SQL server security tasks

Tags : sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection
    
By: GreenSQL     Published Date: Nov 11, 2014

This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL server. These best practices cover operative instructions and example code snippets needed for DBAs and Server Administrators.

Tags : sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End