Database Security White Papers

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 1 - 25 of 331Sort Results By: Published Date | Title | Company Name
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals the reason why people love E2E tests.

Tags : end to end testing, testing, test, e2e testing, manual testing, it landscapes, test environment, e2e tests
    
By: Hitachi Consulting EMEA     Published Date: Jun 18, 2015

This whitepaper explores why it is important for companies to adopt a new way of thinking about how technology can create an extension or re-invention of the organisation’s strategy, mission, processes and behaviors.

Tags : digitisation, techess models, it architecture, customer engagement, putting digital at the heart, digital technology, democratisation of digital technology, create your digital enterprise
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: Lumension     Published Date: Jun 05, 2015

The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.

Tags : anti-virus, security, application, management, patch, anti virus, application security, patch management
    
By: Kaseya     Published Date: Mar 12, 2015

TechValidate invited over 6,300 IT Professionals to participate in a survey and provide insight about the current Backup and Disaster Recovery landscape.

Tags : backup, disaster recovery, it challenges, it solutions, automated data management, virtualization, big data, backup and recovery
    
By: F5 Networks Inc     Published Date: Feb 18, 2015

As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.

Tags : ddos attacks, ddos protection, ddos solutions, mitgation, security, it management, business intelligence, data protection
    
By: Simplivity     Published Date: Jul 02, 2015

SimpliVity’s solution is a great fit for today’s midmarket data center. This hyperconverged infrastructure simplifies an otherwise complex system that would require frequent maintenance and upgrades. SimpliVity offers an affordable solution that addresses major challenges of midmarket I&O teams.

Tags : hyperconvergence, midmarket, virtualization, deduplication, compression, optimization, data management, data protection
    
By: CDW     Published Date: Jun 26, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
    
By: Lumension     Published Date: Jun 03, 2015

Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.

Tags : it security, data center, patch, software, application, analytical applications, database development, database security
    
By: Lumension     Published Date: Jun 03, 2015

The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.

Tags : anti-virus, security, application, management, patch, anti virus, application security, patch management
    
By: Riverbed     Published Date: May 29, 2015

EARTHQUAKE PROMPTS MANUFACTURING COMPANY TO PROTECT ITS BUSINESS WITH RIVERBED STEELFUSION

Tags : data, infrastructure, applications, data security, business continuity, analytical applications, business intelligence, data quality
    
By: Acronis EMEA     Published Date: May 21, 2015

This Case Study reveals how companies are addressing today's Disaster Recovery challenges across physical, virtual and cloud environments.

Tags : data protection, cloud, cloud computing, disaster recovery, technologies, recovery, infrastructure, data security
    
By: Acronis EMEA     Published Date: May 18, 2015

This book is a guide to modern data protection for IT professionals that covers the simplest file backup scenarios to comprehensive protection strategies for businesses with complex IT environments.

Tags : backup, data protection, data security, protection strategies, recovery, cloud computing, virtualization, backup types
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this case study to learn about the backup product they chose and how it gave them with a unified data and application database backup solution that simplified the procuring, learning and integrating of additional products, while saving time, lowering costs, and more.

Tags : backup, data protection, database backup application solution, data security, unified data, recovery, backup data, application security
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this case study now to find out about choosing Acronis backup solution and the benefits it came with.

Tags : acronis backup solution, backup solution, backup, recovery, protection, recovery services, benefits of acronis backup solution, remote recovery services
    
By: Netapp EMEA     Published Date: May 15, 2015

Combine Performance, Agility, and Control of Private NetApp Storage with Efficiency and Elasticity of AWS Public Cloud

Tags : netapp private storage, leveraging private data resources, aws, data protection, database security, web service management, cloud computing, design and facilities
    
By: Netapp EMEA     Published Date: May 15, 2015

Combine Performance, Agility, and Control of Private NetApp Storage with efficiency and Elasticity of AWS Public Cloud

Tags : netapp private storage, aws, data protection, database security, web service management, data center
    
By: Netapp EMEA     Published Date: May 15, 2015

NetApp Private Storage for AWS has the unique opportunity to change the way organizations consume cloud resources and open the market up to high-performance workloads.

Tags : netapp private storage, cloud resources, aws, private cloud, data protection, data quality, database security, cloud computing
    
By: IBM     Published Date: May 12, 2015

This white paper describes a holistic approach to healthcare cybersecurity, which incorporates sophisticated big data analytics to help better protect and secure the vast array of data healthcare organizations maintain.

Tags : healthcare, cybersecurity, big data, security, security management, quality assurance, data quality, database security
    
By: IBM     Published Date: May 12, 2015

The security threat landscape is rapidly evolving: from risks with the proliferation of mobile devices to the increased sophistication of organized cyber criminals and geopolitical threats. Healthcare has a significant burden with the dubious distinction of having the highest per record data breach cost among all regulated industries.

Tags : ibm, healthcare, security, data, cybercrime, encryption, firewalls, hacker detection
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.

Tags : fiberlink, mobile users, strategy, app enabled, scalability, security, device management, enterprise
    
By: VMware, Inc.     Published Date: Apr 08, 2015

Wish you could get to hybrid cloud—fast?More than 30% of organizations expect that within three years, they’ll access 45.5% of IT resources through some form of cloud—public, private, or hybrid.* That’s an impressive number, and there’s a reason for it: the cloud is packed with benefits. If you’re a VMware customer, you’re already halfway there. vCloud Air is built on the trusted VMware vSphere® platform, so it’s simply an extension of your current data center.

Tags : vmware, hybrid cloud, cloud computing, data center, virtual network, web service security, data integration, database security
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This Guide will help companies to improve the effectiveness of their existing strategy or are looking to make their first move into the cloud.

Tags : virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud, cloud solutions
    
By: Internap     Published Date: Mar 30, 2015

In this white paper, Cloud Spectator reveals the results from a normalized comparison of performance between two cloud providers’ services, Amazon Web Services (AWS) EC2 and Internap AgileCLOUD. The analysis considered each provider’s IaaS functionality, price, and performance in typical cloud-hosted workloads.

Tags : internap, agile, iaas, public cloud, infrastructure, storage, cloud, agile
    
By: Arbor Networks     Published Date: Mar 13, 2015

Having the right tools and establishing key processes in advance can help prevent or mitigate the impact of a DDoS attack. Learn more by downloading this complimentary toolkit with research and best practices from Gartner and Arbor Networks.

Tags : arbor, arbor networks, ddos, denial of service, ddos attack, cloud ddos protection, network security, web service security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End