Own SQL Security AuditWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Own SQL Security Audit returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Databases
 •   Automated Security Auditing/ Source Code Analysis
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Monitoring
 •   Application Security
 •   Security Policies
 •   Database Administration
 •   Vulnerability Assessment

Related Searches
 •   Basic Own SQL Security
 •   Charts Own SQL
 •   Own Hr
 •   Own Java
 •   Own SQL Georgia
 •   Own SQL Security E-Commerce
 •   Own SQL Security Reseller
 •   Printable Own
 •   Reviews Own SQL Security
 •   Strategies Own SQL Security
Advertisement

ALL RESULTS
1 - 25 of 449 | Next Page

Implementing Database Security and Auditing: Using Granular Access Control by Guardium, an IBM Company

September 27, 2010 - (Free Research)
In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system. 
(WHITE PAPER) READ ABSTRACT |

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA by Imperva

November 2009 - (Free Research)
Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases. 
(PODCAST) READ ABSTRACT |

HOWTO Secure and Audit Oracle 10g & 11g: Account Security (Complimentary Chapter Download) by IBM

December 2010 - (Free Research)
Read this chapter from "HOWTO Secure and Audit Oracle 10g and 11g" (CRC Press, 2009) and learn how to secure Oracle by checking for weak passwords, configuring failed login policies, preventing DoS attacks with resource limits, and auditing user profiles. 
(EBOOK) READ ABSTRACT |

Create Fault-Tolerant SQL Server 2008 Installations -- Rely on SQL Server 2008 Features to Protect Data by Dell, Inc. and Intel®

September 2009 - (Free Research)
Read this paper to determine how best to protect your SQL environment when running SQL Server on Dell PowerEdge servers. 
(WHITE PAPER) READ ABSTRACT |

Technology Audit: Imperva SecureSphere Data Security Suite by Imperva

June 2010 - (Free Research)
Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Configuring and Using IBM i's Auditing Functions by PowerTech

April 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Read this presentation transcipt - based on content presented at the 2009 COMMON conference - to learn about activating and configuring IBM i's built-in auditing capabilities. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Configuring and Using IBM i's Auditing Functions by PowerTech

March 2010 - (Free Research)
Did you know that IBM i includes powerful auditing features? In fact, our own class-leading audit reporting solution leverages the information captured by this facility. Join this webinar-based on content presented at the 2009 COMMON conference-to learn about activating and configuring IBM i's built-in auditing capabilities. 
(WEBCAST) READ ABSTRACT |

SQL Server 2012 Security by Microsoft

January 2012 - (Free Research)
Check out this essential webcast to learn all about the security & compliance features for SQL Server from Il-Sung Lee, Senior Program Manager from SQL Server Engine Security team. 
(WEBCAST) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

E-Guide: Writing secure SQL database code by IBM

May 2011 - (Free Research)
When developing and deploying a database, organizations should never rely solely on their developers to provide security. This expert e-guide offers tips for writing secure SQL database code to ensure you build appropriate security controls for the specific features and functionality you need. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by Information Security Magazine

October 2010 - (Free Research)
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs. 
(WHITE PAPER) READ ABSTRACT |

What Changed? Leveraging the Power of Change Auditing by Tripwire, Inc.

December 2008 - (Free Research)
Change is necessary not only to keep up with day-to-day corporate evolution, but also to enable IT to transform the organization. As the business continues to demand change, it's in your own best interest to get control of the changes that pose risk. Read this solution brief to learn more about detecting what was changed. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Audits, Compliance and Security: ITPros share their experience by Dell, Inc.

March 2014 - (Free Research)
This whitepaper talks about a solution that allows users to better track and audit malicious or unintentional changes to their Windows environment. It gives interviews with users from various industries to see how the solution worked for them. 
(WHITE PAPER) READ ABSTRACT |

4 Key Steps to Automate IT Security Compliance: A Unified Approach for IT, Audit and Operation Teams by Qualys, Inc.

March 2009 - (Free Research)
This paper discusses the challenges faced by organizations of all sizes - across all industries - and presents a security as a service (SaaS) approach to simplify and automate the convergence of security and compliance to define policies, ongoing assessments, mitigate risks and eliminate threats, and monitor compliance. 
(WHITE PAPER) READ ABSTRACT |

Controlling Microsoft Excel Chaos With Business Intelligence by Information Builders Inc. (E-mail this company)

August 2006 - (Free Research)
Enterprises can take control of the burgeoning number of unsanctioned spreadsheets by adopting a policy of centralized master spreadsheet generation. Learn how WebFOCUS creates fully summarized, organized, and styled Excel spreadsheets with complex formulas already in place, lowering the potential for keystroke and logic error. 
(WHITE PAPER) READ ABSTRACT |

ExtraView Enterprise by Extraview Corporation

ExtraView Enterprise enables organizations to quickly and cost-effectively, create user specific web-based solutions that conform to a corporation's unique business processes and workflow requirements. 
(ASP & SOFTWARE PRODUCT)

GoAnywhere: Mutual Bank Finds Secure Data Transfer Solution with Fast Implementation by Linoma Software

July 2008 - (Free Research)
In this case study Think a mutual bank, implemented GoAnywhere software. They chose this product because of the database conversion, the database push, the secure FTP, and the support staff at Linoma. 
(CASE STUDY) READ ABSTRACT |

IT Risk Management: Guide to Software Risk Assessments and Audits by Veracode, Inc.

June 2010 - (Free Research)
Risk is a function of the likelihood that a potential vulnerability will be exploited, and the resulting impact of that exploitation. In IT systems, risk can be introduced from the internet, servers, networks, malicious insiders, and even lapses in physical security. This whitepaper provides IT risk management best practices. 
(WHITE PAPER) READ ABSTRACT |

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study by LogRhythm, Inc.

May 2013 - (Free Research)
This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Ultimate SQL Tune-Off by Embarcadero Technologies, Inc.

June 2010 - (Free Research)
According to Jonathan Lewis, there is a basic strategy to writing efficient SQL, but it requires knowledge of the data, the metadata, and the intent of the query. Kyle Hailey, though, will discuss his own approach to Visual SQL Tuning (VST) with some ringside support from DB Optimizer XE. Be sure to check out this exciting debate! 
(WEBCAST) READ ABSTRACT |

Data Loss Prevention for IBM i by Innovatum, Inc.

April 2010 - (Free Research)
Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

February 2009 - (Free Research)
This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat. 
(WHITE PAPER) READ ABSTRACT |

Clusters Your Way: 8 Ways to Make Clusters Easy to Use and Easy to Own by SIOS Technology Corp

April 2014 - (Free Research)
Explore this informative white paper to uncover 8 ways SIOS software can help you tackle your IT challenges in cloud, virtual or high-performance IT environments – and protect your SAP, SQL Server and Oracle databases. 
(WHITE PAPER) READ ABSTRACT |

Unlock the Power of Microsoft SQL Server 2012 by Global Knowledge

July 2013 - (Free Research)
Microsoft SQL Server 2012 has many great new features that will allow you to develop higher performing, more scalable next-generation applications using more than just relational data. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 449 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts