Database Access ControlWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Database Access Control returned the following results.
RSS What is RSS?
Related Categories

 •   Access Control
 •   Data Security
 •   Security Policies
 •   Network Security
 •   Application Security
 •   Identity Management/ User Provisioning
 •   Authentication / Password Management
 •   Security Monitoring
 •   Endpoint Security
 •   Database Administration

Related Searches
 •   Codes Database
 •   Database Access Control Operational
 •   Database Automation
 •   Database Definitions
 •   Database Devices
 •   Issues With Database
 •   Measures Database Access
 •   Profile Database
 •   Retail Database Access
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Strengthening Data Privacy in PeopleSoft by Approva Corporation

May 2008 - (Free Research)
Understanding the vulnerabilities of ERPs such as Peoplesoft can help your company mitigate the risk of data breaches. This white paper discusses how automated CPM solutions can help to fight the threat of data loss. 
(WHITE PAPER) READ ABSTRACT |

Definitive Guide to Next Generation Network Access Control by ForeScout Technologies, Inc.

April 2014 - (Free Research)
This in-depth guide provides valuable insight on next-generation network access control and how it can help your network remain secure, while enhancing performance. 
(WHITE PAPER) READ ABSTRACT |

Just Released: Magic Quadrant for Network Access Control by ForeScout Technologies, Inc.

December 2013 - (Free Research)
Network access control (NAC) vendors are realizing the necessity of integration with other mobile device management (MDM) and security technologies. When choosing a NAC solution, the ability to integrate is a top concern -- but what else should you consider when evaluating various vendors? 
(ANALYST REPORT) READ ABSTRACT |

Choosing a Network Access Control (NAC) Solution that is Right for Your Network by ForeScout Technologies, Inc.

March 2011 - (Free Research)
This white paper provides a comprehensive overview between a number of available deployment, device interrogation and policy enforcement methods to help you determine which Network Access Control (NAC) solution is right for your company's network. 
(WHITE PAPER) READ ABSTRACT |

Demystifying Switch-based ACLs by Global Knowledge

February 2013 - (Free Research)
This whitepaper aims to help you better understand switch-based Access Control Lists (ACLs) by exploring what they are used for and how to best utilize them on IOS-based Catalyst devices. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

Role-Based Access Control in Avaya Aura by Global Knowledge

March 2013 - (Free Research)
Take an in-depth look at how to improve role-based access control and review the process for creating and assigning new user-roles on this advanced communications systems management tool. Learn more about how it can help enhance collaboration in your enterprise today. 
(WHITE PAPER) READ ABSTRACT |

Database Auditing Tools and Strategies by Hexis Cyber Solutions Inc

November 2008 - (Free Research)
This paper is to introduce the current options available for database auditing and trade-offs using each. 
(WHITE PAPER) READ ABSTRACT |

ESG Market Report: The EVAS Market - The Evolution of NAC by ForeScout Technologies, Inc.

July 2013 - (Free Research)
For many businesses, network access control is essential for their network security since the days of Ethernet and IP. This guide outlines the history of network access control and how you can implement more effective policies to secure your network. 
(WHITE PAPER) READ ABSTRACT |

How XenApp and XenDesktop Dramatically Simplify Data Protection, Access Control, and other Critical Security Tasks by Citrix

April 2014 - (Free Research)
This white paper examines how Citrix XenApp and Citrix XenDesktop dramatically reduce the effort required to protect mission-critical information, while giving users fast, simple remote access that enhances business productivity. 
(WHITE PAPER) READ ABSTRACT |

Securing SharePoint: SharePoint Security Best Practices by Thawte Inc.

May 2013 - (Free Research)
This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more. 
(EGUIDE) READ ABSTRACT |

On Lockdown: HMV/Waterstone’s asserts control over user activity by Safestone Technologies

September 2011 - (Free Research)
Download this case study to discover how, by deploying Safestone’s DetectIT solution, the organization can now granularly control access to areas their systems and meet their compliance requirements. 
(CASE STUDY) READ ABSTRACT |

Business-Driven Identity and Access Management: Why This New Approach Matters by Aveksa

August 2012 - (Free Research)
This informative white paper explains why today's IAM systems fail to properly reflect business context and why embracing business-driven identity and access management can help reduce costs while strengthening security. Learn more about a step-by-step process to deploy this practice in your business with this resource. 
(WHITE PAPER) READ ABSTRACT |

Automotive Dealership Takes Control and Enhances Employee Productivity with NETGEAR® UTM Appliances by NETGEAR Inc.

May 2011 - (Free Research)
Find out how Netgears UTM appliance helped an auto dealership solve all their network security issues. 
(CASE STUDY) READ ABSTRACT |

802.1x - Implementing and Deploying Methods by Global Knowledge

July 2013 - (Free Research)
You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, this can be seamless in an environment and far exceeds any compliance requirements you may have. 
(WHITE PAPER) READ ABSTRACT |

IOUG 2011 Survey: The Petabyte Challenge: 2011 IOUG Database Growth Survey by Oracle Corporation

October 2011 - (Free Research)
More than 300 database and information security professionals were recently surveyed on their data security practices. The results were disturbing with 60% saying that a data breach is likely over the next 12 months. Download this complimentary copy of the 2011 IOUG Data Security Survey Report and see how your organization measures up. 
(WHITE PAPER)

Secure by Design Protection for Application and Desktop Virtualization by Citrix

May 2014 - (Free Research)
This white paper highlights a "secure-by-design" solution that not only simplifies data protection, access control, user provisioning, and compliance for virtualized applications and desktops, but reduces the tools needed to best protect them. 
(WHITE PAPER) READ ABSTRACT |

PGP Whole Disk Encryption Workgroup Edition - The full-disk encryption solution for small companies and workgroups by PGP Corporation

February 2010 - (Free Research)
PGP Whole Disk Encryption Workgroup Edition is a comprehensive full-disk protection solution that provides industry-leading encryption for desktops, laptops, and USB devices with simple administration. With PGP Whole Disk Encryption Workgroup Edition, there are no servers or databases to configure and manage. 
(WHITE PAPER) READ ABSTRACT |

Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with Netcordia's NetMRI by Netcordia

October 2008 - (Free Research)
This paper describes the ways that Netcordia's NetMRI can help you quickly achieve and maintain PCI DSS compliance across your network. 
(WHITE PAPER) READ ABSTRACT |

Connecting Virtual Desktop and Disaster Recovery by Forsythe

November 2009 - (Free Research)
Connecting virtual desktop technology with the disaster recovery process has probably not been a major focus for organizations; however, integrating a disaster recovery plan for the virtual desktop is moving up organizational priority lists for a multitude of reasons. 
(WHITE PAPER) READ ABSTRACT |

The Technical Complexities and Risks of Public Key Authentication: The Lack of SSH User Key Management in Large Enterprises Today by SSH Communications Security Corp.

May 2012 - (Free Research)
While SSH (Secure Shell) user keys are often used for granting system access for system administrators, many organizations lack the proper processes for effectively managing them, introducing a number of security risks. This paper highlights ten (10) technical challenges and risks related to public key authentication and how to address them. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Simplifying Sharepoint 2007 Permissions Management by Idera

July 2010 - (Free Research)
Authentication to a SharePoint environment is the process in which a company’s IT architecture approves a user’s credentials. To fully understand the spectrum involved with managing permissions in a SharePoint environment, you need to know the components involved with permissions and how they work with one another. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Globalscape® WAFS Expands the Panama Canal by GlobalScape

December 2013 - (Free Research)
This case study reveals a wide area file services solution that the engineering firms working on the Panama Canal expansion chose to securely exchange large files and collaborate efficiently. 
(CASE STUDY) READ ABSTRACT |

Frost & Sullivan: Continuous Compliance and Next Generation NAC by ForeScout Technologies, Inc.

December 2013 - (Free Research)
Let's face it, cybercrime is growing and attacks are becoming far more prevalent. This guide explores the role of NAC in securing your network and how it is important to keep your network up-to-date as BYOD and mobility continue to rise. 
(WHITE PAPER) READ ABSTRACT |

PGP Encryption Platform - Delivering cost-effective, comprehensive encryption for enterprise data protection by PGP Corporation

February 2010 - (Free Research)
The PGP Encryption Platform reduces the complexities of protecting business data by enabling organizations to deploy and manage multiple encryption applications cost-effectively. The PGP Encryption Platform makes installing additional systems unnecessary when organizational needs for encryption expand. 
(WHITE PAPER) READ ABSTRACT |

Symantec Data Insight 4.0 by Symantec Corporation

May 2014 - (Free Research)
In this white paper, learn about Symantec Data Insight, a company that helps organizations improve unstructured data governance to reduce costs and risk through actionable intelligence into data ownership, usage, and access controls. 
(DATA SHEET) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts