Operational Database SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Operational Database Security returned the following results.
RSS What is RSS?
Related Categories

 •   Database Administration
 •   Databases
 •   Data Warehousing
 •   Database Planning and Implementation
 •   Data Quality
 •   Data Security
 •   Data Center Management
 •   Enterprise Information Integration/ Metadata Management
 •   Virtualization
 •   Operational BI

Related Searches
 •   Files Operational
 •   Operational Applications
 •   Operational Automation
 •   Operational Database Distribution
 •   Operational Database Proposals
 •   Operational Database Security Info
 •   Operational Database Security Migration
 •   Operational Database Security Related
 •   Papers Operational
 •   Pos Operational Database Security
Advertisement

ALL RESULTS
1 - 25 of 457 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva.

October 2008 - (Free Research)
This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center. 
(WHITE PAPER) READ ABSTRACT |

DaimlerChrysler: A Case Study in Enterprise Data Quality by Pitney Bowes Group 1 Software

May 2008 - (Free Research)
Group 1 Software presents a case study in enterprise data quality success featuring the DaimlerChrysler Corporation, a leader in the automotive manufacturing industry. 
(CASE STUDY) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Securing PostgreSQL from External Attack by EnterpriseDB Corporation

November 2009 - (Free Research)
Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets. 
(WEBCAST) READ ABSTRACT |

Succeeding with Data Virtualization - High Value Use Cases for Operational and Data Management Data Services by Denodo Technologies

March 2012 - (Free Research)
This paper discusses virtual data services for operational business processing and data management as well as successful virtualization use cases. 
(WHITE PAPER) READ ABSTRACT |

Squeezing More Value out of Data Warehouses through the Power of Database Compression by Vertica Systems

December 2008 - (Free Research)
Data compression features in data warehouse databases are the current trend, and this paper explains the benefits of compression in data warehousing and differentiates compression approaches taken by different databases. 
(WHITE PAPER) READ ABSTRACT |

Data Quality: The Foundation of Operational Effectiveness by Pitney Bowes Group 1 Software

September 2011 - (Free Research)
This white paper discusses the importance of data quality operations and how to successfully implement a data quality strategy into your organization. 
(WHITE PAPER) READ ABSTRACT |

E-Book: Five Technology Trends for Improved Business Intelligence Performance by Sybase, an SAP company

November 2009 - (Free Research)
In this E-Book, data warehousing and BI expert Rick Sherman explains how you can take advantage of BI trends to ensure that you get the right information to the right people at the right times, so they can make the best possible decisions. 
(EBOOK) READ ABSTRACT |

Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention by McAfee, Inc.

November 2011 - (Free Research)
While databases are the warehouses of the most valuable information assets in the enterprise, many organizations today do poorly to protect them. In this paper, discover how to protect your database and data assets with McAfee Database Security Solution, a multi-tiered solution that can help defend against threats and eliminate vulnerabilities.   
(WHITE PAPER) READ ABSTRACT |

Logs: Data Warehouse Style by LogLogic, Inc.

September 2008 - (Free Research)
The LogLogic Log Management Data Warehouse enables organizations to centralize log data for easy, efficient access -- ensuring IT security, regulatory compliance, and operational efficiency. 
(WHITE PAPER) READ ABSTRACT |

Effectively Securing Virtualized Data Centers by Apani

November 2008 - (Free Research)
This white paper will examine trends in server virtualization security and reveal the many compelling advantages of cross-platform VM isolation solutions. 
(WHITE PAPER) READ ABSTRACT |

Predictable Performance for Dynamic Oracle Databases by Hitachi Data Systems

November 2013 - (Free Research)
Check out this short paper to examine how to control capital and operational storage costs, while increasing performance, data protection and flexibility in your Oracle environment. Read on now to learn more. 
(DATA SHEET) READ ABSTRACT |

How to Start Your Big Data Journey by IBM

June 2013 - (Free Research)
Big data is not just about technology. It's about the value you can extract and the problems you can solve with the technology. This webcast explores five use cases that are excellent starting points for beginning the big data journey. Watch now to learn how to leverage big data technology and strategy for success. 
(WEBCAST) READ ABSTRACT |

Secure and Effective Data Extraction from the SAP® ERP System by Winshuttle, LLC

December 2008 - (Free Research)
This white paper describes the variety of tools available for such ad-hoc reporting applications and compares and contrasts these tools in terms of their ease-of-use and security. 
(WHITE PAPER) READ ABSTRACT |

Reducing Total Cost of Ownership Across Your Application Development and Database Tools by Embarcadero Technologies, Inc.

July 2009 - (Free Research)
In today's economy, companies are suffering from slower demand, tighter operational controls and shrinking IT budgets and resources, prompting them to look for aggressive ways to cut costs and make their IT operations more efficient. This whitepaper will discuss how 'All-Access' can easily reduce upfront costs by up to 43% and 3 year TCO by 46% 
(ANALYST REPORT) READ ABSTRACT |

Data Encryption 101: A Pragmatic Approach to PCI Compliance by Prime Factors, Inc.

September 2010 - (Free Research)
The focus of this paper is to help you understand which specific security technologies and implementation models are appropriate, but first, let’s get a clear picture of what needs to be accomplished. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Process-Driven Master Data Management for Dummies by Software AG

March 2012 - (Free Research)
This comprehensive guide covers topics from data governance and reference data to big data and cloud-enablement, uncovers MDM myths, and looks at new trends in MDM methodology. 
(BOOK) READ ABSTRACT |

IBM PureData System for Operational Analytics by IBM

January 2013 - (Free Research)
Collecting data from call centers, mobile applications, and fraud detection systems is ineffective if your business doesn't know how to correctly interpret the data. Fortunately, this white paper explores how to turn data into insight with in-database analytics. Give your company the competitive advantage it deserves by consulting this resource. 
(WHITE PAPER) READ ABSTRACT |

Integrating Analytics into the Operational Fabric of Your Business by IBM

April 2012 - (Free Research)
Read this paper by industry expert Dr. Barry Devlin and learn everything you need to know about operational analytics and how it can benefit your business. Discover its relationship to BI, how traditional data warehouse support it, its architectural advantages and so much more. 
(WHITE PAPER) READ ABSTRACT |

Trusted Data Delivery - Help reduce operational costs and risk while improving accessibility of critical business data by IBM

July 2011 - (Free Research)
This white paper discusses how to reduce operational costs and risk while you improve the accessibility of critical business data. Don't put your business in a catch-up position - be the one in the forefront with the CDC advantage. 
(WHITE PAPER) READ ABSTRACT |

UK IT priorities 2012 by ComputerWeekly.com

August 2012 - (Free Research)
This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies. 
(IT BRIEFING) READ ABSTRACT |

Learn to Save on SAP Operational Costs with a Virtualized Environment by HP Novell

February 2011 - (Free Research)
According to AMR Research, more and more customers are saving on SAP operational costs this year with SAP infrastructure projects and virtualizing SAP applications. Read this e-guide and learn to identify areas of potential SAP savings as well as the best way to virtualize your SAP environments. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Centralized backup for remote offices by Iron Mountain

March 2011 - (Free Research)
This presentation transcript from Iron Mountain looks at the ways in which remote offices can implement a centralized backup system and the advantages this type of storage architecture can provide over more traditional backup methods. Read on to learn more today. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Oracle SOA Resource Center by Oracle Corporation

June 2009 - (Free Research)
SOA has sparked an IT revolution and enabled leading companies to gain operational efficiencies and business agility through scalable, high performing and reliable solutions. This resource center will introduce you to Oracle's best-in-class SOA technologies and how each will benefit your business. 
(RESOURCE CENTER) READ ABSTRACT |

Improving Data Quality Through Data Modeling by CA ERwin from CA Technologies

April 2011 - (Free Research)
Enterprise data is largely falling short of a standard that makes it possible to utilize in how business will be conducted in the next decade. Most enterprise data is “adequate” for basic operational needs today. Download this paper to learn how to get the most out of your enterprise data. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 457 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts