Database Security White Papers

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 1 - 25 of 315Sort Results By: Published Date | Title | Company Name
By: VMware, Inc.     Published Date: Apr 08, 2015

Wish you could get to hybrid cloud—fast?More than 30% of organizations expect that within three years, they’ll access 45.5% of IT resources through some form of cloud—public, private, or hybrid.* That’s an impressive number, and there’s a reason for it: the cloud is packed with benefits. If you’re a VMware customer, you’re already halfway there. vCloud Air is built on the trusted VMware vSphere® platform, so it’s simply an extension of your current data center.

Tags : vmware, hybrid cloud, cloud computing, data center, virtual network, web service security, data integration, database security
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This Guide will help companies to improve the effectiveness of their existing strategy or are looking to make their first move into the cloud.

Tags : virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud, cloud solutions
    
By: Arbor Networks     Published Date: Mar 13, 2015

Having the right tools and establishing key processes in advance can help prevent or mitigate the impact of a DDoS attack. Learn more by downloading this complimentary toolkit with research and best practices from Gartner and Arbor Networks.

Tags : arbor, arbor networks, ddos, denial of service, ddos attack, cloud ddos protection, network security, web service security
    
By: Kaseya     Published Date: Mar 12, 2015

To get the most out of their computer automation initiatives, financial institutions must take a step back, assess their current IT environments, adjust as needed and make important decisions regarding the future of their IT infrastructures.

Tags : financial institutions, it automation, it environments, it infrastructure, maintenance, network compliance, network security, software management
    
By: Kaseya     Published Date: Mar 12, 2015

Banks want to use technology to work smarter, better and faster to maintain regulatory compliance, reduce risk and increase productivity. Automated IT systems management is helping them reach those goals in a seamless, efficient manner.

Tags : automated management systems, software management, it automation, financial institutions, regulatory compliance, security management, software patches, audit violations
    
By: Kaseya     Published Date: Mar 12, 2015

TechValidate invited over 6,300 IT Professionals to participate in a survey and provide insight about the current Backup and Disaster Recovery landscape.

Tags : backup, disaster recovery, it challenges, it solutions, automated data management, virtualization, big data, backup and recovery
    
By: Cloudera     Published Date: Mar 10, 2015

The greatest promise of the information-driven enterprise resides in the business-relevant questions financial services firms have historically been unable or afraid to ask, related to data consolidation and multi-tenancy, full-fidelity analytics and regulatory compliance, and Big Data.

Tags : big data, enterprise data hub, data consolidation, regulatory compliance, data management, data security, storage management, business intelligence
    
By: IBM     Published Date: Feb 11, 2015

This paper explores how companies can more safely introduce employee - or corporate-owned mobile devices into the workplace, identify the risks inherent in their broader access to corporate data, and derive enhanced business value.

Tags : corporate data, business value, mobile devices, client services, security, it management, business intelligence, data protection
    
By: IBM     Published Date: Feb 11, 2015

Securely connect people, applications and devices to cloud environments. While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is different. Read this whitepaper to learn more about how: · Threat-aware identity and access management can strengthen security in each of the cloud delivery models · Self-service IAM solution can provide higher level of Security in Cloud as compared to on-premise

Tags : cloud environment, iaas, paas, saas, access management, security, it management, data protection
    
By: IBM     Published Date: Feb 11, 2015

Maintain visibility and control with proven security solutions for public, private and hybrid clouds. IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.

Tags : security solutions, layered protection, protect data, advanced analytics, ibm, security, it management, business intelligence
    
By: Windstream     Published Date: Feb 09, 2015

Windstream brings you the latest Nemertes report on how to use network security to create more business opportunities and remove stumbling blocks to progress.

Tags : windstream, solutions, smart, personalized, service, enterprise technology, security, threats
    
By: Dell     Published Date: Apr 27, 2015

Viele Backup-und Recovery-Lösungen sind gescheitert die Gefahr von Datenverlust zu verringern und die Kosten sind deutlich höher.

Tags : backup and recovery solutions, data loss prevention, security, backup, dell, security solution, data security, automated backup
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: Enterprise DB     Published Date: Mar 03, 2015

The magic Quadrant for Operational Database Management Systems is used to best illustrate the steady and substantial technical advances of Postgres.

Tags : database management systems, database vendors, postgres plus, database development, data protection, database security
    
By: CDW     Published Date: Feb 24, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
    
By: CDW     Published Date: Feb 24, 2015

Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.

Tags : software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization, network security
    
By: Intel Security     Published Date: Feb 23, 2015

This White Paper illustrates a magic quadrant analysis including vendors that have technologies designed for SIEM purposes.

Tags : gartner, magic quadrant, security connected framework, big security data, big data, log management, siem, security information
    
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, security event management, risk, cyber-hacking
    
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.

Tags : security information, security connected framework, big security data, big data, log management, siem, security event management, application security
    
By: Docusign     Published Date: Feb 18, 2015

This paper illustrates the risks of using "wet-ink" signatures in the Cloud and the reason why e-signature is the best solution.

Tags : wet-ink risks, wet-ink risks in the cloud, e-signature, e-signature best solution, cloud technology, risks of putting data in the clouds, digital signature, application security
    
By: Juniper Networks     Published Date: Feb 18, 2015

Find out why an open, scalable network architecture is essential for enhanced IT security in the cloud era. This eBook explains how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.

Tags : juniper, juniper networks, security, network security, firewalls, intrusion prevention, security management, data protection
    
By: Juniper Networks     Published Date: Feb 18, 2015

Discover how a dynamic, intelligent firewall can improve your security. This Webinar talks about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall solutions.

Tags : firewall, network, business assets, security, management, network security, firewalls, security management
    
By: Juniper Networks     Published Date: Feb 18, 2015

Learn about the challenges as you deploy hybrid clouds. The Forrester Report analyzes the views and approaches of IT decision-makers who have already begun their journey to the hybrid cloud.

Tags : hybrid clouds, network, data center, automation, network virtualization, firewalls, database security, virtualization
    
By: Juniper Networks     Published Date: Feb 18, 2015

Get expert advice on how to keep your private cloud secure with our Top 10 Considerations Slideshow. If you are looking to build a secure foundation for your private cloud infrastructure, this slideshow offers important considerations for securing your private cloud environment.

Tags : cloud, private cloud, security, password, virtualization, business intelligence, database development, database security
    
By: Juniper Networks     Published Date: Feb 18, 2015

Find out how network virtualization can help you move seamlessly to a private cloud in this Webinar. You will hear about the challenges the Tribune Broadcasting had to solve in order to achieve a smooth transition to high-performance, scalable private cloud.

Tags : private cloud, juniper, cloud computing, virtualization, infrastructure, network management, network performance, database development
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End