Database Security Vs Computer SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Database Security Vs Computer Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Databases
 •   Enterprise Data Protection and Privacy
 •   Database Administration
 •   Security Monitoring
 •   Access Control
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Vulnerability Assessment
 •   Database Planning and Implementation
 •   Storage Management

Related Searches
 •   Company Database
 •   Conversion Database
 •   Database Demonstrations
 •   Database Displays
 •   Database Security Consulting
 •   Database Security Vs Migration
 •   Database Virginia
 •   Introduction Database
 •   Manual Database Security
 •   Portal Database
Advertisement

ALL RESULTS
1 - 25 of 482 | Next Page

CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF by CA Technologies.

June 2008 - (Free Research)
Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation. 
(DEMO) READ ABSTRACT |

CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF by IBM

June 2008 - (Free Research)
Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation. 
(DEMO) READ ABSTRACT |

CA Mainframe Security Compliance by IBM

June 2008 - (Free Research)
In this video, learn how to combat against regulatory, staffing and audit pressures that security management shortcomings bring to the table. 
(VIDEOCAST) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva.

October 2008 - (Free Research)
This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Database Security and Compliance by Guardium, an IBM Company

February 2008 - (Free Research)
Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees. 
(WEBCAST) READ ABSTRACT |

Practical Guide to Database Security & Compliance by Sentrigo Inc.

August 2008 - (Free Research)
This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance. 
(WHITE PAPER) READ ABSTRACT |

Merging Backup and Disaster Recovery (DR) Processes by FalconStor Software

April 2011 - (Free Research)
This paper describes how continuous data protection (CDP) technology can bridge various DR methodologies to help organizations overcome the challenges of tape and achieve maximum benefits from their IT investments. 
(WHITE PAPER) READ ABSTRACT |

eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network by SearchMobileComputing

December 2008 - (Free Research)
Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware. 
(EBOOK) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

File-interface Deduplication System (FDS) Technical Whitepaper: Using FalconStor FDS as a Backup Target for Veritas NetBackup by FalconStor Software

April 2011 - (Free Research)
This document describes the basic concepts and integration guidelines for FalconStor FDS in a Veritas NetBackup environment. 
(WHITE PAPER) READ ABSTRACT |

Building A Network Foundation for Virtualization by NETGEAR Inc.

November 2010 - (Free Research)
The deployment of virtualization technology has allowed businesses of all sizes to reduce costs and optimize resources. The impact has been particularly dramatic with server virtualization. By virtualizing their servers, many organizations have dramatically reduced their IT investment in hardware procurement. Read this white paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Continuous Data Protector (CDP): Using FalconStor CDP with Microsoft Exchange 2007 by FalconStor Software

April 2011 - (Free Research)
This paper illustrates how to use FalconStor CDP to protect a Microsoft Exchange 2007 server and its email databases. It also explains how continuous real-time data journaling and periodic snapshots provide simple, rapid, and granular recovery to any point in time. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Changing the Rules of Backup and Disaster Recovery by FalconStor Software

April 2009 - (Free Research)
Join Independent Backup Expert W. Curtis Preston and Falconstor's Product Marketing Manager Peter Eichers as they explore common data protection challenges and what technologies can be used to address them. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Oracle Database Vault by Oracle Corporation

June 2007 - (Free Research)
Oracle Database Vault is the industry's leading database security solution for addressing regulatory compliance and concerns over the insider threat. 
(WHITE PAPER) READ ABSTRACT |

Technical Whitepaper - Using FalconStor CDP with Microsoft Exchange 2007 by FalconStor Software

October 2009 - (Free Research)
This paper illustrates how to use FalconStor CDP to protect a Microsoft® Exchange 2007 server and its email database(s). It also explains how continuous real-time data journaling and periodic snapshots provide simple, rapid, and granular recovery to any point in time. 
(WHITE PAPER) READ ABSTRACT |

Server Virtualization: A Game-Changer For SMB Customers by NETGEAR Inc.

November 2010 - (Free Research)
Server virtualization can address issues involving logistics and finances and also transform testing and development environments while radically changing business continuity and disaster recovery practices. Read this white paper to learn more about what server virtualization can do for you. 
(WHITE PAPER) READ ABSTRACT |

Database Security Audit and Protect Critical Databases by Imperva

February 2011 - (Free Research)
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse. 
(WHITE PAPER) READ ABSTRACT |

Database Security: Audit and Protect Critical Databases by Imperva

September 2010 - (Free Research)
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

September 2010 - (Free Research)
For each threat, the paper describes background information, general risk mitigation strategies, and the database protection provided by Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

August 2009 - (Free Research)
This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

February 2009 - (Free Research)
This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat. 
(WHITE PAPER) READ ABSTRACT |

Implementing Database Security and Auditing: Using Granular Access Control by Guardium, an IBM Company

September 2010 - (Free Research)
In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system. 
(WHITE PAPER) READ ABSTRACT |

Managing the Entire Database Security & Compliance Lifecycle by Guardium, an IBM Company

February 2010 - (Free Research)
Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle. 
(DATA SHEET) READ ABSTRACT |

Databases at Risk: Current State of Database Security (Enterprise Strategy Group) by IBM

September 2009 - (Free Research)
This ESG Research Brief analyzes the current state of database security and categorizes databases as a “dangerous and growing security gap”. Read this brief which offers steps to improve database security across the enterprise. 
(ANALYST BRIEF) READ ABSTRACT |

1 - 25 of 482 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts