Database Security White Papers

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 1 - 25 of 254Sort Results By: Published Date | Title | Company Name
By: Sourcefire, LLC     Published Date: Sep 30, 2014

Download this infographic today to gain a better understanding of integrated threat defense and the visibility to discover and protect against socially engineered exploits.

Tags : cisco, sourcefire, network security, integrated threat defense, big data analysis, real-time monitoring, security, business analytics
    
By: Arbor     Published Date: Sep 17, 2014

Dans la lutte contre les menaces qui se joue actuellement, les analyses de sécurité deviennent de plus en plus indispensables

Tags : firewall, firewall protection, it security, cyber defense, security, it management, business activity monitoring, business intelligence
    
By: Lenovo     Published Date: Sep 16, 2014

Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve mobility and BYOD demands. Though traditional VDI vendors bring their own solutions to market, is it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services are most compatible, agencies can take a smarter approach to these difficult decisions. Understand the tradeoffs, and learn why more agencies are taking notice to emerging web technologies through this executive summary.

Tags : vdi, cloud alternatives, byod demands, emerging web technologies, business intelligence, data protection, database security, productivity
    
By: Lenovo     Published Date: Sep 16, 2014

Agency IT is tasked with building smarter and more responsive state and local government, with CTOs looking to enable government workforce mobility and address strategic issues like BYOD. Adding to the challenge is a rise in devices and data that IT must deliver, support, and secure. Combined with the decline in traditional Windows-based computing, these challenges are driving agencies toward web and cloud solutions that don't sacrifice security or manageability. See the solution that has government agencies re-thinking how they enable mobile productivity.

Tags : agency it, workforce mobility, mobile productivity, cloud computing, it management, project management, web services, database security
    
By: Delphix     Published Date: Sep 10, 2014

Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix’s Agile Masking solution is the only product that solves both masked data creation and delivery challenges.

Tags : secure data, digitization, data breaches, privacy regulations, sensitive data, internal, customer information, application landscapes
    
By: IBM     Published Date: Jul 22, 2014

Join this session to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.

Tags : ibm, cloud, cloud storage, storage, storage environment efficiency, environment efficiency, data protection, data driven analytics
    
By: Kaspersky     Published Date: Feb 14, 2014

Whether they are working in your headquarters, a home office, or on the road, employees, partners, and vendors need to have confidential data at their fingertips to conduct business effectively. The likelihood of this data becoming exposed through unsecured transfers or lost devices is a frightening reality.

Tags : encypt, encryption, secure file transfer, cyber security, cybersecurity, security, it protection, kaspersky
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection".

Tags : business protection, data protection, business security, it security, business continuity, database security, secure content management
    
By: EMC     Published Date: Sep 11, 2014

This paper focuses on Data Domain Boost and the many benefits it provides compared to doing traditional backups. Its purpose is to explain the technical and business reasons why DD Boost will change the way you do backups.

Tags : data domain boost, ddb, backups, data protection, data backup, benefits of ddb, emc, backup and recovery
    
By: EMC     Published Date: Sep 11, 2014

This paper focuses on Data Domain technology leadership and differentiation and why it matters to you. The purpose of this paper is to explore the technical and financial reasons why Data Domain systems are ideal for backup and archiving in your environment.

Tags : data domain technology, benefits of data domain, backup and archiving emc, backup and recovery, storage management, storage virtualization, data protection, database security
    
By: Network Instruments     Published Date: Jun 30, 2014

News of recent credit card hacks has rocked consumer confidence. Even talk of a security breach can bring on a PR firestorm. What can you do to make sure your customers and clients are protected? The 12 Payment Card Industry (PCI) Data Security Standard (DSS) requirements along with the right Application Performance Monitoring (APM) solution can help keep you one step ahead of the hackers.

Tags : network instruments, hacks, apm, security, pci, dss, hackers, database security
    
By: HP     Published Date: Jun 27, 2014

Following a series of in-depth interviews with Senior IT professionals in various industries this video provides their findings and the direct and in-direct value derived from using HPs Backup, Recovery and Archiving solutions.

Tags : backup, recovery and archiving, hp solutions, storage, backup and recovery, storage area networks, storage management, storage virtualization
    
By: Lancope     Published Date: Jun 21, 2014

Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.

Tags : lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
By: HP     Published Date: Jun 09, 2014

A Viewpoint paper on HP Information governance

Tags : information governance, information storage, backup and recovery, storage management, storage virtualization, data protection, database security, data warehousing
    
By: Compass Datacenters     Published Date: Apr 07, 2014

Learn about the central issues that tend to be consistent across all Request for Proposals (RFPs) and see what questions you should be asking in order to maximize the efficiency of your mission critical data center.

Tags : rfp, request for proposal, questions, data centers, compass datacenters, big business, data, business intelligence
    
By: Code 42     Published Date: Mar 20, 2014

Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn't provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data.

Tags : code42 software, endpoint backup, data migration, data loss, data management, data risk, encryption, network security
    
By: Webroot Inc     Published Date: Mar 05, 2014

Learn the top 5 malware trends for 2014 and how your organization can best protect against hackers and cyber thieves.

Tags : malware, security, cyber thieves, malware trends, security systems, webroot, networking, wireless
    
By: Dell Software     Published Date: Feb 19, 2014

Discover what you need to know to successfully manage your diverse database infrastructures in this new white paper. Topics include: • Balancing key business metrics • Understanding a DBAs challenges • Finding the right tools to monitor and manage the database environment • ...and much more!

Tags : database development, database security
    
By: Lumension     Published Date: Feb 07, 2014

Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.

Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
By: CA Technologies     Published Date: Jan 06, 2014

This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.

Tags : mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
    
By: Adobe     Published Date: Nov 25, 2013

In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer? Please download to learn more.

Tags : it management environment, document integration, document security, mobile, mobile apps, personal devices, define data, mobile workforce
    
By: GetWellNetwork, Inc.     Published Date: Nov 22, 2013

Learn how to improve the efficiency of your pain management workflow and see how these changes will improve the day to day tasks for your nurses allowing them to work more effectively.

Tags : getwell network, pain management, pain management workflow, joint commission, pain assessment documentation, pain management workflow, performance improvement, managing patient pain levels
    
By: Qualys     Published Date: Nov 05, 2013

Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.

Tags : qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
    
By: Qualys     Published Date: Nov 05, 2013

Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.

Tags : qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End