Database Security White Papers

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 1 - 25 of 304Sort Results By: Published Date | Title | Company Name
By: Enterprise DB     Published Date: Mar 03, 2015

The magic Quadrant for Operational Database Management Systems is used to best illustrate the steady and substantial technical advances of Postgres.

Tags : database management systems, database vendors, postgres plus, database development, data protection, database security
    
By: CDW     Published Date: Feb 24, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
    
By: CDW     Published Date: Feb 24, 2015

Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.

Tags : software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization, network security
    
By: Intel Security     Published Date: Feb 23, 2015

This White Paper illustrates a magic quadrant analysis including vendors that have technologies designed for SIEM purposes.

Tags : gartner, magic quadrant, security connected framework, big security data, big data, log management, siem, security information
    
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how managing risk today means making sense of more data: vulnerability scans, application and database logs, flows, access and session records, alerts, and trending analysis.

Tags : security connected framework, big security data, big data, log management, siem, security event management, risk, cyber-hacking
    
By: Intel Security     Published Date: Feb 23, 2015

This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.

Tags : security information, security connected framework, big security data, big data, log management, siem, security event management, application security
    
By: Docusign     Published Date: Feb 18, 2015

This paper illustrates the risks of using "wet-ink" signatures in the Cloud and the reason why e-signature is the best solution.

Tags : wet-ink risks, wet-ink risks in the cloud, e-signature, e-signature best solution, cloud technology, risks of putting data in the clouds, digital signature, application security
    
By: F5 Networks Inc     Published Date: Feb 18, 2015

As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.

Tags : ddos attacks, ddos protection, ddos solutions, mitgation, security, it management, business intelligence, data protection
    
By: IBM     Published Date: Feb 11, 2015

IBM Security Identity Governance and Administration provides an integrated, business-centric approach to help organizations improve security and reduce costs for managing accounts, groups, policies, credentials and access rights throughout the user lifecycle.

Tags : ibm security, business-centric strategies, security solutions, it policies, security, it management, business intelligence, business management
    
By: IBM     Published Date: Feb 11, 2015

IBM solutions provide security intelligence across the enterprise with integrated threat analysis, real-time alerts, audit consolidation and compliance reporting to help protect against threats with a single view into the risks affecting mainframe and distributed systems.

Tags : security intelligence, mainframe environments, ibm solutions, integrated threat analysis, distributed systems, security, business intelligence, risk management
    
By: IBM     Published Date: Feb 11, 2015

IBM Security provides integrated access management solutions to validate who is who when users connect from inside or outside the enterprise, and to enable proactive access policies on cloud, social and mobile channels, helping improve control and security in complex online environments.

Tags : ibm security, access management solutions, mobile channel security, advanced threats, byod, security, it management, mobile data systems
    
By: Windstream     Published Date: Feb 09, 2015

Windstream brings you the latest Nemertes report on how to use network security to create more business opportunities and remove stumbling blocks to progress.

Tags : windstream, solutions, smart, personalized, service, enterprise technology, security, threats
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: Entrust     Published Date: Jan 16, 2015

Small- or medium-sized businesses run on hard work, dedication and loyal customers. But size shouldn’t exclude SMBs from using the proper security technology to protect online customer identities. That’s why Entrust offers nine simple tips to improve security for SMBs and end-customers alike. From basic techniques like updating software to more advanced authentication strategies, this guide ensure your business is establishing the proper security foundation in today’s hyper-connected world.

Tags : entrust, security, certificate, b2b, application, browser, applications, saas
    
By: Comcast     Published Date: Jan 15, 2015

For most small and mid-sized businesses the future is all about growth, and a cloud-based approach to information technology is inherently supportive of growth strategies.

Tags : comcast, technology, business, blueprint, plan, start-up, start, future
    
By: Lenovo     Published Date: Sep 16, 2014

Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve mobility and BYOD demands. Though traditional VDI vendors bring their own solutions to market, isn’t it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services can be most compatible, agencies can take a smarter approach to these difficult decisions. See the tradeoffs in plain English, and learn why more agencies are taking notice to emerging cloud technologies through this exclusive executive summary.

Tags : vdi, cloud alternatives, byod demands, emerging web technologies, business intelligence, data protection, database security, productivity
    
By: Lenovo     Published Date: Sep 16, 2014

Agency IT is tasked with building smarter and more responsive state and local government services, while CTOs look to enable government workforce mobility and address strategic issues, such as BYOD. Adding to the challenge is a rise in devices, data, and even multiple OS’s that IT must support and secure. With the decline in traditional Windows-based computing, these challenges are driving agencies toward cloud solutions that don't sacrifice security or IT manageability. See our featured cloud solution for government agencies that has IT leaders re-thinking how they enable mobile productivity.

Tags : agency it, workforce mobility, mobile productivity, cloud computing, it management, project management, web services, database security
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection".

Tags : business protection, data protection, business security, it security, business continuity, database security, secure content management
    
By: Juniper Networks     Published Date: Feb 18, 2015

Find out why an open, scalable network architecture is essential for enhanced IT security in the cloud era. This eBook explains how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.

Tags : juniper, juniper networks, security, network security, firewalls, intrusion prevention, security management, data protection
    
By: Juniper Networks     Published Date: Feb 18, 2015

Discover how a dynamic, intelligent firewall can improve your security. This webinar talks about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall solutions.

Tags : firewall, network, business assets, security, management, network security, firewalls, security management
    
By: Juniper Networks     Published Date: Feb 18, 2015

Learn about the challenges as you deploy hybrid clouds. The Forrester report analyzes the views and approaches of IT decision-makers who have already begun their journey to the hybrid cloud.

Tags : hybrid clouds, network, data center, automation, network virtualization, firewalls, database security, virtualization
    
By: Juniper Networks     Published Date: Feb 18, 2015

Get expert advise on how to keep your private cloud secure with our Top 10 Considerations slideshow. If you are looking to build a secure foundation for your private cloud infrastructure, this slideshow offers important considerations for securing your private cloud environment.

Tags : cloud, private cloud, security, password, virtualization, business intelligence, database development, database security
    
By: Juniper Networks     Published Date: Feb 18, 2015

Find out how network virtualization can help you move seamlessly to a private cloud in this Webinar. You will hear about the challenges the Tribune Broadcasting had to solve in order to achieve a smooth transition to high-performance, scalable private cloud.

Tags : private cloud, juniper, cloud computing, virtualization, infrastructure, network management, network performance, database development
    
By: IBM     Published Date: Feb 11, 2015

As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data analytics and mobility. In this paper, we will look at how the growing adoption of cloud computing is changing the way organizations are implementing security.

Tags : security strategies, ibm, deployment model, cloud security, data analytics, security, business analytics, data protection
    
By: IBM     Published Date: Feb 11, 2015

In this analyst report, EMA compare IBM Security QRadar Incident Forensics vs other industry tool and shows why IBM scored the highest overall rating with a score of 3.92.

Tags : data capture, network forensices, ibm, incident forensics, it security tools, security, it management, enterprise applications
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End