Databases Security Design PlanningWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Databases Security Design Planning returned the following results.
RSS What is RSS?
Related Categories

 •   Databases
 •   Database Planning and Implementation
 •   Database Administration
 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Data Warehousing
 •   Enterprise Data Protection and Privacy
 •   Data Center Management
 •   Business Intelligence Solutions
 •   Database Tuning

Related Searches
 •   Buying Databases Security Design
 •   Databases Paper
 •   Databases Security Benefit
 •   Databases Security Design Arizona
 •   Databases Security Design Managers
 •   Databases Security Order
 •   Databases Security Policies
 •   Databases Security Portal
 •   Databases Security Record
 •   Databases Security Trend
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..
WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Database Security: Audit and Protect Critical Databases by Imperva

September 07, 2010 - (Free Research)
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

September 02, 2010 - (Free Research)
For each threat, the paper describes background information, general risk mitigation strategies, and the database protection provided by Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

Database Security Audit and Protect Critical Databases by Imperva

February 04, 2011 - (Free Research)
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

August 03, 2009 - (Free Research)
This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

February 10, 2009 - (Free Research)
This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats by Imperva

February 04, 2011 - (Free Research)
The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten as identified by Imperva’s Application Defense Center. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 10, 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of a Database Attack by Imperva

November 12, 2009 - (Free Research)
Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures. 
(WEBCAST) READ ABSTRACT |

Why Your Organization Needs to Implement DLP by Trend Micro, Inc.

July 15, 2010 - (Free Research)
Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Database Crime Scene Prevention by Imperva

February 20, 2009 - (Free Research)
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Next Generation Web Application Firewalls (NG-WAF) by Imperva

June 02, 2010 - (Free Research)
This paper describes Imperva's vision for the next generation of WAFs. It details Web application security problems and solutions today, and gives perspectives on the future. 
(WHITE PAPER) READ ABSTRACT |

Replay for BlackBerry® Enterprise Server by AppAssure Software, Inc.

March 02, 2009 - (Free Research)
This data sheet details Replay for BlackBerry, an advanced backup and recovery application that protects your entire messaging ecosystem, not just the BlackBerry data, like other products. 
(DATA SHEET) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Quicktour Demo: Key Differentiators between Microstrategy and Hyperion by MicroStrategy Incorporated

November 2008 - (Free Research)
This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise BI capabilities and illustrates the 12 key differentiators between MicroStrategy and Hyperion. 
(WHITE PAPER) READ ABSTRACT |

SIEM IT Decision Center- Checklist #1 by SearchSecurity.com

January 2013 - (Free Research)
If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms. 
(EGUIDE) READ ABSTRACT |

10 Tips for Creating Your Web Site by Global Knowledge Network, Inc.

March 2006 - (Free Research)
The most helpful information and best content will have little impact without simple protocols that make your Web site easier to use and more visually appealling. This paper focuses on 10 tips you can employ to ensure your web site is effective from the day it goes live. 
(WHITE PAPER) READ ABSTRACT |

Oracle Solaris and Oracle SPARC T4 Servers— Engineered Together for Enterprise Cloud Deployments by Oracle Corporation

June 2012 - (Free Research)
Read this paper to learn how Oracle Solaris and the SPARC T4 processor can help you manage your costs for existing infrastructures or for new enterprise cloud infrastructure design. Discover how Solaris works cohesively with SPARC T4 systems and other Oracle software to enable a handful of cloud-ready solutions. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

NoSQL Does Not Have to Mean No Security by IBM

July 2013 - (Free Research)
This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems. 
(WHITE PAPER) READ ABSTRACT |

Take Advantage of Oracle's 2 Day DBA Course by Oracle Corporation

February 2009 - (Free Research)
This course is designed to complement the Oracle 2 Day DBA documentation. In this course you will find detailed information on the tasks outlined in the chapters of the Oracle 2 Day DBA manual, including step-by-step instructions. 
(TRAINING GUIDE) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

IBM Information Management: Manage your data and control risk to develop information you can trust by IBM

November 2011 - (Free Research)
The IBM Information Management portfolio offers a complete set of solutions designed to help you not only manage your data, but also master it. Read on to learn more about: Data management, information integration, data warehousing and more. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme? by ComputerWeekly.com

April 2014 - (Free Research)
In this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now. 
(EZINE) READ ABSTRACT |

SQL Anywhere: Industry-leading database management and data movement technologies built for frontline environments by Sybase, an SAP company

June 2010 - (Free Research)
SQL Anywhere® is a comprehensive package providing data management and data movement technologies that enable the rapid development and deployment of database-powered applications. SQL Anywhere offers enterprise caliber databases that scale from 64-bit servers with thousands of users down to small handheld devices. 
(DATA SHEET) READ ABSTRACT |

The Executive Guide to Data Loss Prevention by Websense, Inc.

August 2009 - (Free Research)
Data Loss Prevention is designed to protect information assets with minimal interference in business processes. It provides new insights into how information is used, and enforces protective controls to prevent unwanted incidents. Read on to learn how DLP can reduce risk, improve data management practices, and even lower certain compliance costs. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts