Database User Security MaintenanceWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Database User Security Maintenance returned the following results.
RSS What is RSS?
Related Categories

 •   Application Management and Maintenance
 •   Data Security
 •   Databases
 •   Data and Application Distribution
 •   Virtualization
 •   Storage Management
 •   Enterprise Systems Management
 •   Database Administration
 •   Identity Management/ User Provisioning
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Balancing Database
 •   Benefits Database User
 •   Database Layout
 •   Database Technologies
 •   Database User Hawaii
 •   Database User Policies
 •   Database User Processing
 •   Do Database
 •   Manufacturer Database User
 •   Offices Database User
Advertisement

ALL RESULTS
1 - 25 of 464 | Next Page

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory by Oracle Corporation

August 01, 2008 - (Free Research)
This paper illustrates how you can now centrally administer database users and role memberships leveraging your existing LDAP directories. 
(WHITE PAPER) READ ABSTRACT |

InterBase® SMP: Proven, Low-Cost Database for Your Business by Embarcadero Technologies, Inc.

March 27, 2009 - (Free Research)
InterBase® SMP is a proven, highly-reliable, low-cost database that can easily support hundreds of concurrent users and gigabytes of data with no support during normal operation. 
(WHITE PAPER) READ ABSTRACT |

Maximizing the Power of Your Desktop Database: Top business advantages of moving your data online by Intuit QuickBase

February 24, 2009 - (Free Research)
Many organizations that rely on desktop solutions to house data are frustrated with their lack of flexibility and scalability. This paper shows how online databases are an alternative to desktop products, combining speed and ease of use with the collaborative functions required to power organizations' unique business processes and performance. 
(WHITE PAPER) READ ABSTRACT |

Implementing Database Security and Auditing: Using Granular Access Control by Guardium, an IBM Company

September 27, 2010 - (Free Research)
In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system. 
(WHITE PAPER) READ ABSTRACT |

Migrating Users from Physical Workstations to XenDesktop by Citrix

October 05, 2009 - (Free Research)
This document provides recommendations and best practices for moving a user’s data from their physical corporate workstations into the virtual Citrix XenDesktop environment. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

Minimizing Downtime in SAP Environments by Sun Microsystems, Inc.

October 2008 - (Free Research)
Learn how to use standard features of Solaris 10, Containers and Zones and ZFS to optimize your SAP data centre, virtualize your infrastructure and drive down cost and raise flexibility. 
(WHITE PAPER) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

March 2011 - (Free Research)
Application intelligence and control is available along with SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention as a one, two or three year subscription, or is included in SonicWALL Comprehensive Gateway Security Suite subscriptions for the TZ 210, Network Security Appliance (NSA) and E-Class NSA Series firewalls. 
(WHITE PAPER) READ ABSTRACT |

Granular application control, intelligence and real-time visualization by SonicWALL

February 2011 - (Free Research)
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or completely blocked. 
(WHITE PAPER) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Intelligent real-time protection and application control by SonicWALL

March 2011 - (Free Research)
It is no longer sufficient to rely on outdated firewall technology that only looks at the port, protocol, source IP and destination IP to determine if a session from the outside should be allowed inside the network. 
(WHITE PAPER) READ ABSTRACT |

Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment by XTS

April 2008 - (Free Research)
This white paper provides an analytical perspective on how to best manage your Citrix environment. 
(WHITE PAPER) READ ABSTRACT |

The BI Survey The Customer Verdict the worlds largest survey of business intelligence software users by Board International

December 2012 - (Free Research)
BOARD offers a combined BI and performance management product with its new In-Memory, multidimensional database server and the user interface to go with it. Access this white paper today to gain expert insights, findings from various research surveys, performance rankings, customer feedback, and much more regarding all things BOARD. 
(WHITE PAPER) READ ABSTRACT |

Protect citizen data with IBM Rational software by IBM

July 2012 - (Free Research)
Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data. 
(WHITE PAPER) READ ABSTRACT |

Understanding High Availability for the BlackBerry Enterprise Server by BlackBerry

August 2009 - (Free Research)
Read this technical white paper to learn about the evolution of mobile devices and the introduction of high availability in a mobile context. Also learn about the Blackberry as well as load balancing, failover thresholds, and limited downtime upgrades. 
(WHITE PAPER) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Delivering OLTP Database Technology Aimed at Optimal Business Outcomes: IBM PureData for Transactions by IBM

September 2013 - (Free Research)
Most enterprise datacenters are so cluttered with individually constructed servers. Access this white paper today to learn about how integrated systems are assisting in the deployment of database transaction processing. 
(WHITE PAPER) READ ABSTRACT |

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

Recovery Manager for SharePoint by Dell Software

Recovery Manager for SharePoint is an enterprise recovery solution that provides emergency access to all SharePoint content all the time. With Recovery Manager, any recovered content can be restored to any SharePoint instance or saved to a file system. Get your business-critical data back online before the entire server farm comes back. 
(ASP & SOFTWARE PRODUCT)

CW Special Report on IBM by ComputerWeekly.com

April 2012 - (Free Research)
This special nine-page report from Computer Weekly analyses the challenges facing IBM, its financial performance, the services it offers. 
(IT BRIEFING) READ ABSTRACT |

Data Discovery and Risk in the Datacenter by Tizor

October 2008 - (Free Research)
Learn how database activity monitoring (DAM) solutions mitigate data risk by discovering critical data in the data center, monitoring and analyzing activity, providing detailed auditing trails, and reporting on all user access. 
(WHITE PAPER) READ ABSTRACT |

Directory Services Integration with Database Enterprise User Security by Oracle Corporation

April 2008 - (Free Research)
This paper presents the EUS deployment options available using Oracle Internet Directory and Oracle Virtual Directory and the use cases will help determine when one is more appropriate than the other based on customer environment. 
(WHITE PAPER) READ ABSTRACT |

Businesses are ready for a new approach to IT by IBM

April 2012 - (Free Research)
Integrated systems are based on "patterns of expertise," which can dramatically improve the responsiveness of the business. This paper details two types of integrated systems - platform and infrastructure - the benefits of each, such as agility, efficiency, simplicity and control, and so much more. 
(WHITE PAPER) READ ABSTRACT |

Implementing Database Security and Auditing - Authentication and Password Security by IBM

May 2011 - (Free Research)
In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management. 
(EBOOK) READ ABSTRACT |

CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF by IBM

June 2008 - (Free Research)
Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation. 
(DEMO) READ ABSTRACT |

1 - 25 of 464 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts