Database Security White Papers

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 1 - 25 of 348Sort Results By: Published Date | Title | Company Name
By: CDW     Published Date: Aug 07, 2015

Like many, you may find that you lack the time and resources to adequately extend Disaster Recovery (DR) to safeguard all aspects of your organization. As a result, gaps in DR coverage put your business at risk.

Tags : cloud, storage, data center, disaster recovery, database security, data warehousing, data center design and management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Protect against advanced attacks.

Tags : threat, data, security, it management, budget, firewall, intrusion detection, intrusion prevention
    
By: Vectra Networks     Published Date: Aug 03, 2015

Protect prominent securities.

Tags : firewall, intrusion detection, intrusion prevention, ips, ids, advanced persistent threat, apt, identity management
    
By: Simplivity     Published Date: Jul 02, 2015

SimpliVity’s solution is a great fit for today’s midmarket data center. This hyperconverged infrastructure simplifies an otherwise complex system that would require frequent maintenance and upgrades. SimpliVity offers an affordable solution that addresses major challenges of midmarket I&O teams.

Tags : hyperconvergence, midmarket, virtualization, deduplication, compression, optimization, data management, data protection
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals the reason why people love E2E tests.

Tags : end to end testing, testing, test, e2e testing, manual testing, it landscapes, test environment, e2e tests
    
By: Kaseya     Published Date: Mar 12, 2015

TechValidate invited over 6,300 IT Professionals to participate in a survey and provide insight about the current Backup and Disaster Recovery landscape.

Tags : backup, disaster recovery, it challenges, it solutions, automated data management, virtualization, big data, backup and recovery
    
By: F5 Networks Inc     Published Date: Feb 18, 2015

As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.

Tags : ddos attacks, ddos protection, ddos solutions, mitgation, security, it management, business intelligence, data protection
    
By: Cisco     Published Date: Aug 27, 2015

A data center fabric is critical to a next-generation data center.

Tags : application integration, business intelligence, database security, virtualization
    
By: Workday     Published Date: Aug 17, 2015

This case study outlines the benefits experienced by TripAdvisor to the solutions offered by Workday.

Tags : workday solutions, financial management, payroll software, unified hr and financial mangement, database security, cloud computing
    
By: SnapLogic     Published Date: Aug 17, 2015

This report summarizes the changes that are occurring, new and emerging patterns of data integration, as well as data integration technology that you can buy today that lives up to these new expectation

Tags : data integration, cloud computing, mass data storage, integration requirements, integration strategies, non-persisted data streaming, device native data, data encryption
    
By: SnapLogic     Published Date: Aug 17, 2015

This whitepaper addresses new elastic iPaaS requirements in detail while highlighting the importance of each.

Tags : elastic ipaas requirements, hybrid deployments, minimal lifecycle management, future-proofing, metadata-driven integration, error management, transactional support, pre-built connectivity
    
By: SnapLogic     Published Date: Aug 17, 2015

Learn how SnapLogic and Amazon Web Services helped Earth Networks create a responsive, self-service cloud for data integration, preparation and analytics.

Tags : data management, self-service clouding, data integration, data analytics, data storage, data encryption, data warehousing, database services
    
By: TriNet     Published Date: Jul 28, 2015

The future of HR lies in technological advances and implementation for businesses of all sizes.

Tags : hr technology, hr data, technology providers, hr trends, mobility, cloud data security, hr terminology, business performance management
    
By: IBM     Published Date: Jul 22, 2015

Driving transformation in the healthcare industry as it navigates technological, regulatory, legislative and cultural changes.

Tags : it healthcare, cloud computing, cloud security, hybrid cloud, regulatory compliance, it infrastructure, healthcare organizations, data management
    
By: CDW     Published Date: Jun 26, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
    
By: Hitachi Consulting EMEA     Published Date: Jun 18, 2015

This whitepaper explores why it is important for companies to adopt a new way of thinking about how technology can create an extension or re-invention of the organisation’s strategy, mission, processes and behaviors.

Tags : digitisation, techess models, it architecture, customer engagement, putting digital at the heart, digital technology, democratisation of digital technology, create your digital enterprise
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: Lumension     Published Date: Jun 05, 2015

The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.

Tags : anti-virus, security, application, management, patch, anti virus, application security, patch management
    
By: Lumension     Published Date: Jun 03, 2015

Microsoft's System Center Configuration Manager doesn't handle every aspect of Linux/UNIX and third-party application security. Here's how to augment and leverage SCCM to close the gaps.

Tags : it security, data center, patch, software, application, analytical applications, database development, database security
    
By: Lumension     Published Date: Jun 03, 2015

The volume and sophistication of malware is skyrocketing, and traditional anti-virus approaches are struggling to keep up. It’s time to rethink how we protect our endpoints. Instead of trying to build a better anti-virus “mousetrap,” without any shift in the underlying management model for vetting change in endpoint environments, security professionals should investigate more innovative approaches to endpoint security that can automate trusted change policies. This paper discusses an innovative approach to application whitelisting – one that integrates application control, anti-virus, patch management and a trusted change management engine into one unified solution – to improve endpoint security and provide the necessary flexibility to optimize IT operations and user productivity.

Tags : anti-virus, security, application, management, patch, anti virus, application security, patch management
    
By: Riverbed     Published Date: May 29, 2015

EARTHQUAKE PROMPTS MANUFACTURING COMPANY TO PROTECT ITS BUSINESS WITH RIVERBED STEELFUSION

Tags : data, infrastructure, applications, data security, business continuity, analytical applications, business intelligence, data quality
    
By: Acronis EMEA     Published Date: May 21, 2015

This Case Study reveals how companies are addressing today's Disaster Recovery challenges across physical, virtual and cloud environments.

Tags : data protection, cloud, cloud computing, disaster recovery, technologies, recovery, infrastructure, data security
    
By: Acronis EMEA     Published Date: May 18, 2015

This book is a guide to modern data protection for IT professionals that covers the simplest file backup scenarios to comprehensive protection strategies for businesses with complex IT environments.

Tags : backup, data protection, data security, protection strategies, recovery, cloud computing, virtualization, backup types
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this case study to learn about the backup product they chose and how it gave them with a unified data and application database backup solution that simplified the procuring, learning and integrating of additional products, while saving time, lowering costs, and more.

Tags : backup, data protection, database backup application solution, data security, unified data, recovery, backup data, application security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End