Requirements Database SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Requirements Database Security returned the following results.
RSS What is RSS?
Related Categories

 •   Databases
 •   Data Security
 •   Database Administration
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Data Protection and Privacy
 •   Fraud Detection & Prevention
 •   Authentication / Password Management
 •   Database Planning and Implementation
 •   Social Networks and Community Management
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Requirements Database Price
 •   Requirements Database Security Company
 •   Requirements Database Security Crm
 •   Requirements Database Security Email
 •   Requirements Database Security Problem
 •   Requirements Database Security Standard
 •   Requirements Network
 •   Requirements Strategies
 •   Technical Requirements Database
Advertisement

ALL RESULTS
1 - 25 of 485 | Next Page

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements by Oracle Corporation

January 31, 2012 - (Free Research)
Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy. 
(WHITE PAPER)

Tips on Implementing Database Auditing to Address Security & Compliance Requirements  by IBM

December 03, 2010 - (Free Research)
Implementing Database Security and Auditing (Elsevier Digital Press) is the definitive guide for information security professionals, DBAs and auditors. You can now download Chapter 12, “Auditing Categories”.  In this chapter, you’ll learn which audit logging trails you need to address key security and compliance requirements. 
(BOOK) READ ABSTRACT |

Practical Guide to Database Security & Compliance by Sentrigo Inc.

August 2008 - (Free Research)
This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: MS SQL Server 2008 by Fusion-IO

September 2009 - (Free Research)
Check out this transcript of a presentation given by Sumeet Bansal, Fusion-io Principal Solutions Architect, to learn how Fusion-io solutions enhance SQL server performance, improve customer experience, and optimize storage management systems. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Preventing Fraud with Identity & Social Network Analytics: A Guide for Bank Executive by IBM

July 2011 - (Free Research)
This paper discusses the ways that identify and social network analysis can help you prevent fraud and enable compliance by focusing not only on transactions, but also on person and groups and how they are related. Learn the requirements for a proactive fraud detection systems, and how ongoing data analysis can alert you to the need for action. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

August 2009 - (Free Research)
This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

February 2009 - (Free Research)
This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Database Security and Compliance by Guardium, an IBM Company

February 2008 - (Free Research)
Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees. 
(WEBCAST) READ ABSTRACT |

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

PCI Accelerator: How Guardium Helps Secure Your Data and Meet PCI DSS Requirements by IBM

February 2010 - (Free Research)
High transaction fees, heavy fines levied for violations, the potential costs of breach remediation, and the threat of brand damage are causing many organizations to seek methods of implementing PCI DSS faster and more effectively. Read this solution brief to learn about a single solution that addresses a wide range of PCI DSS requirements. 
(ARTICLE) READ ABSTRACT |

Why Database Archiving Should Be Part of Your Enterprise DBMS Strategy by Clearpace Software

August 2008 - (Free Research)
Enterprises that archive their database often find more than one benefit to doing so, whether it’s business, infrastructure, or cost-related. In addition, the value of archiving grows considerably as it becomes easier to access 
(WHITE PAPER) READ ABSTRACT |

Securing Web Applications and Databases for PCI Compliance by Imperva

July 2009 - (Free Research)
This paper, designed for security and compliance professionals, illustrates how to achieve compliance on three of the most costly and complex sections: requirements 3, 6, and 10 of PCI DSS. This paper also highlights how Web application and database appliances can deliver resource effective compliance while maintaining cost efficiency. 
(WHITE PAPER) READ ABSTRACT |

Oracle Database Vault by Oracle Corporation

June 2007 - (Free Research)
Oracle Database Vault is the industry's leading database security solution for addressing regulatory compliance and concerns over the insider threat. 
(WHITE PAPER) READ ABSTRACT |

Oracle Database 11g on Windows: Development and Deployment by Oracle Corporation

March 2008 - (Free Research)
This white paper focuses specifically on .NET development with the Oracle database and Oracle database server integration with Windows. 
(WHITE PAPER) READ ABSTRACT |

HP Database Archiving Software by Hewlett-Packard Information Management Software (IM)

August 2011 - (Free Research)
This comprehensive paper demonstrates how data management and HP database Archiving software solves the problems that arise as a result of increased database size and unmanaged growth in production databases. 
(WHITE PAPER) READ ABSTRACT |

CA ERwin Data Modeler’s Role in the Relational Cloud by CA ERwin from CA Technologies

October 2011 - (Free Research)
Database as a Service (DaaS) is emerging as soild option for enterprise database management. However, many IT professionals are questioning the perforamce and secutiry of DaaS. Read this white paper to learn more about DaaS and how it can measure up to on-premise databases. 
(WHITE PAPER) READ ABSTRACT |

Data Encryption 101: A Pragmatic Approach to PCI Compliance by Prime Factors, Inc.

September 2010 - (Free Research)
The focus of this paper is to help you understand which specific security technologies and implementation models are appropriate, but first, let’s get a clear picture of what needs to be accomplished. Read this paper to find out more. 
(WHITE PAPER) READ ABSTRACT |

Maximizing the Power of Your Desktop Database: Top business advantages of moving your data online by Intuit QuickBase

February 2009 - (Free Research)
Many organizations that rely on desktop solutions to house data are frustrated with their lack of flexibility and scalability. This paper shows how online databases are an alternative to desktop products, combining speed and ease of use with the collaborative functions required to power organizations' unique business processes and performance. 
(WHITE PAPER) READ ABSTRACT |

SAP data archiving: The keys to a successful project revealed by Dolphin

December 2011 - (Free Research)
In this expert E-Book, find practical advice for developing an SAP data archiving strategy, and learn how this approach can help you better manage data volumes while meeting compliance and e-discovery requirements. 
(EBOOK) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

Closing the data privacy gap for SAP Applications by IBM

October 2008 - (Free Research)
This white paper provides insight into the requirements for protecting privacy in SAP non-production environments and describes some of the comprehensive data masking techniques available with the IBM® Optim™ Data Privacy Solution for SAP® Applications. 
(WHITE PAPER) READ ABSTRACT |

Accelerating Databases with Oracle's Sun Storage F5100 Flash Array Storage by Oracle Corporation

June 2010 - (Free Research)
This white paper shows how to apply the Sun Storage F5100 Flash Array as storage for database indexes in order to accelerate application performance. 
(WHITE PAPER) READ ABSTRACT |

NoSQL Does Not Have to Mean No Security by IBM

July 2013 - (Free Research)
This white paper explores the data security and compliance challenges with NoSQL ("not only SQL") databases, and offers key recommendations on how to address these problems. 
(WHITE PAPER) READ ABSTRACT |

The State of Database Management by IBM

June 2008 - (Free Research)
Data managers are concerned about managing the explosion of data, and are looking for ways to manage the process. In this survey from IDUG, learn about improving database performance and overall corporate performance. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 485 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts