Distributed Database Security SoftwareWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Distributed Database Security Software returned the following results.
RSS What is RSS?
Related Categories

 •   Database Administration
 •   Databases
 •   Database Planning and Implementation
 •   Data Warehousing
 •   Data Security
 •   Virtualization
 •   Application Security
 •   Security Monitoring
 •   Data Center Management
 •   Network Security

Related Searches
 •   Demand Distributed
 •   Distributed Consultancy
 •   Distributed Database Budget
 •   Distributed Database Order
 •   Distributed Database Printable
 •   Distributed Database Security Display
 •   Distributed Database Web
 •   Distributed Review
 •   Papers Distributed
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva.

October 2008 - (Free Research)
This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center. 
(WHITE PAPER) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Securing PostgreSQL from External Attack by EnterpriseDB Corporation

November 2009 - (Free Research)
Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets. 
(WEBCAST) READ ABSTRACT |

Recovery Manager for Active Directory by Dell Software

Quest Recovery Manager for Active Directory offers an easy-to-use solution for fast, granular, online recovery of Active Directory (AD) in the event of inadvertent modification of AD due to software failure or human error. 
(ASP & SOFTWARE PRODUCT)

The Benefits of an Objectivity/DB and Panasas Scale-Out NAS Storage High Throughput Solution: A Benchmark Report  by Panasas, Inc.

August 2010 - (Free Research)
Objectivity/DB uses a powerful, distributed processing architecture to manage localized, centralized or distributed object databases. This white paper describes a benchmark that compares the performance of Objectivity/DB running against a local file system versus using files stored on a Panasas PAS 8 configuration. Read this white paper for more. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Helix Energy Solutions Replicates Data and Content to Geo-Distributed SharePoint Farms & Sea Vessels with DocAve by AvePoint, Inc.

August 2011 - (Free Research)
This case study covers how Helix Energy Solutions, an offshore energy production service firm, leveraged DocAve to replicate data to globally distributed SharePoint server farms and ships at sea. 
(CASE STUDY) READ ABSTRACT |

Logs: Data Warehouse Style by LogLogic, Inc.

September 2008 - (Free Research)
The LogLogic Log Management Data Warehouse enables organizations to centralize log data for easy, efficient access -- ensuring IT security, regulatory compliance, and operational efficiency. 
(WHITE PAPER) READ ABSTRACT |

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment by Dell Software

October 2009 - (Free Research)
This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs. 
(WHITE PAPER) READ ABSTRACT |

Stopping application layer DDoS attacks: What you need to know by SearchSecurity.com

March 2012 - (Free Research)
While a DDoS attack can be damaging to any organization, DDoS attacks specifically at the application-layer can be more ominous. Understanding these attacks are the first step to keeping your organization protected. In this e-guide, explore how DDoS is being used, what you can do to stop them, the future of the web threat landscape and more. 
(EGUIDE) READ ABSTRACT |

Guided Analytics-Transferring Best Practice Analytics from Experts to Everyone by TIBCO Spotfire Division

February 2008 - (Free Research)
View this webcast to learn systematic techniques for quickly capturing an analysis workflow and distributing it throughout an organization to users of all skill levels. 
(WEBCAST)

Distributed Caching: Why It Matters For Predictable Scalability on the Web, and Where It’s Proving Its Value by Oracle Corporation

December 2010 - (Free Research)
This paper explains why it’s imperative for any Web-based organization to learn about the distributed caching technology and Oracle Coherence Data Grid technology to combat the increasing demand on the database. 
(WHITE PAPER) READ ABSTRACT |

Be as Agile as you can be by IBM

April 2011 - (Free Research)
Join Elizabeth Woodward, IBM Agile Practice Expert, as she discusses how software development leaders and agile teams can identify the impact of choices in organizing their team structure to optimize a distributed Agile methodology.  
(WEBCAST)

IBM DB2 pureScale: Unlimited Capacity with Continuous Availability by IBM

March 2011 - (Free Research)
Designed for organizations that run online transaction processing (OLTP) applications on distributed systems, IBM® DB2® pureScale™ offers clustering technology that helps deliver high availability and exceptional scalability transparent to applications. 
(WHITE PAPER) READ ABSTRACT |

The top 10 misconceptions about performance and availability monitoring by Hewlett-Packard Company

December 2011 - (Free Research)
This white paper examines the 10 common misunderstandings about monitoring of today's complex, distributed, and service-oriented applications and offers suggestions for implementing complete business-focused, adaptable monitoring strategies. 
(WHITE PAPER) READ ABSTRACT |

How to Effectively Manage Data and Distribute it to Multiple Targets in Real Time by Dell Software

February 2013 - (Free Research)
Adding geographically disbursed or consolidated real-time reporting, business intelligence and analytics doesn't have to add a financial burden or strain on IT. SharePlex® delivers efficient, high-speed and low-latency data replication that enables real-time data distribution and consolidation. 
(WHITE PAPER) READ ABSTRACT |

A Cloud Computing E-Book: Re-make or Re-model? by Salesforce.com

August 2011 - (Free Research)
The upsurge in cloud computing presents development teams with challenges that may require them to rethink established ways of building applications. Read this SearchSOA.com E-Book to get an overview of issues and strategies surrounding application development in the cloud. 
(EBOOK)

Best Practices for NT to Active Directory Migration by Dell Software

April 2008 - (Free Research)
This document provides best practices for migration from NT to Active Directory. Note that it is not a substitute for Aelita Domain Migration Wizard's User's Guide and on-line help, which contain detailed information on the tool and its options. 
(WHITE PAPER) READ ABSTRACT |

Breaking the Scalability Barrier with Infinite Cache by EnterpriseDB Corporation

September 2009 - (Free Research)
Infinite Cache™ from EnterpriseDB revolutionizes distributed cache management on commodity blade server hardware by substantially increasing the amount of memory available to hold data including entire databases with outstanding performance. 
(WHITE PAPER) READ ABSTRACT |

Wales & West Utilities Distributes Data Entry Savings across the Company with Winshuttle by Winshuttle, LLC

December 2008 - (Free Research)
Wales & West Utilities uses Winshuttle to streamline SAP data loading and extraction in multiple business areas, from finance to asset management. 
(CASE STUDY) READ ABSTRACT |

Implementing an identity management solution by SAP America, Inc.

June 2008 - (Free Research)
This document describes the SAP NetWeaver Identity Management products, which cover most of the core functionality for implementing an identity management solution, including a virtual directory. 
(WHITE PAPER) READ ABSTRACT |

Postgres Plus 8.4 vs. MySQL 5.5: Feature Comparison and Commentary by EnterpriseDB Corporation

September 2010 - (Free Research)
This paper compares Postgres Plus Standard Server and Postgres Plus Advanced Server 8.4 against MySQL 5.5. The comparison is broken down into a number of sections with a short commentary following each section. Read on to learn how the Postgres Plus 8.4 stacks up against MySQL 5.5 on all the above topics and learn which one comes out on top. 
(WHITE PAPER) READ ABSTRACT |

KPN Automates with Parallels Automation to Maintain Hosting Leadership in the Netherlands by Parallels, Inc.

April 2010 - (Free Research)
KPN was looking to add features such as database support, automated scripting, and applications to their shared hosting environment. Learn how KPN came to select Parallels Automation to provide distributed architecture 
(CASE STUDY) READ ABSTRACT |

Top 5 Challenges for Hadoop MapReduce in the Enterprise by Platform Computing Corporation

August 2011 - (Free Research)
This white paper describes challenges organizations face when using MapReduce, and the means by which Platform MapReduce can address them. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: WWW - World Wide Weaponization by ESET

November 2009 - (Free Research)
The growth of the internet brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

WWW - World Wide Weaponization by ESET

October 2009 - (Free Research)
The growth of the internet has brought about massively scalable distributed systems which have proved advantageous not only for governments, businesses and end-users, but also for criminals. In this webcast, review past, present, and future considerations regarding cybercrime, and discover next-generation methods of combating weaponized software. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts