SQL Security FilesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: SQL Security Files returned the following results.
RSS What is RSS?
Related Categories

 •   Databases
 •   Storage Management
 •   Data Security
 •   Database Administration
 •   Application Servers
 •   Backup Systems and Services
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Virtualization
 •   Database Planning and Implementation
 •   Disaster Recovery

Related Searches
 •   Computers SQL Security
 •   Cost SQL Security
 •   Costing SQL Security Files
 •   Practice SQL Security
 •   Research SQL Security Files
 •   SQL International
 •   SQL Security Examples
 •   SQL Security Files Demo
 •   SQL Security Files Faqs
 •   Statement SQL Security
Advertisement

ALL RESULTS
1 - 25 of 414 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

SQL Server 2000 Security Best Practices by Global Knowledge Network, Inc.

November 2004 - (Free Research)
The security of SQL Server database servers has become a top priority for database administrators. This article examines best practices that can be employed to secure Microsoft SQL Server 2000 databases. It provides an overview of the security model in SQL Server 2000 and discusses best practices you can employ to secure yours. 
(WHITE PAPER) READ ABSTRACT |

Podcast: Insider Threats - an Interview with the Former Deputy Director of the National Security Agency - NSA by Imperva

November 2009 - (Free Research)
Bill Crowell, former Deputy Director of the NSA, is interviewed in this podcast. He talks extensively about insider threats, shares some stories from the trenches, and discusses the nature of cybercrime. Bill also covers the importance of sensitive data protection –- especially around mission-critical applications and databases. 
(PODCAST) READ ABSTRACT |

Implementing Database Security and Auditing: Using Granular Access Control by Guardium, an IBM Company

September 2010 - (Free Research)
In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system. 
(WHITE PAPER) READ ABSTRACT |

Creating SANLess Microsoft SQL Server Failover Cluster Instances with SIOS DataKeeper Cluster Edition and Fusion-io by SIOS Technology Corp

December 2013 - (Free Research)
Deploying a failover cluster instance (FCI) architecture for your SQL Server database requires expensive shared storage for data files and backups. This resource introduces an alternative to storage area networks (SANs) that provides the availability benefit of an FCI – without the high price tag. 
(WHITE PAPER) READ ABSTRACT |

Guide: Enterprise Security Reporter by ScriptLogic Corporation

August 2009 - (Free Research)
In large networks, the sheer number of permission settings makes it almost impossible to gain a clear overview of overall security, and checking that all those permission are in compliance with corporate and regulatory standards is a Herculean task. 
(WHITE PAPER) READ ABSTRACT |

GoAnywhere: Mutual Bank Finds Secure Data Transfer Solution with Fast Implementation by Linoma Software

July 2008 - (Free Research)
In this case study Think a mutual bank, implemented GoAnywhere software. They chose this product because of the database conversion, the database push, the secure FTP, and the support staff at Linoma. 
(CASE STUDY) READ ABSTRACT |

Using Encrypting File System to Protect Microsoft Dynamics CRM Data on a V3c Client Running Windows XP Professional by Microsoft

June 2007 - (Free Research)
This white paper explains how to use Encrypting File System (EFS), a feature that is provided by default in the Windows® operating system, to protect data in Microsoft Dynamics CRM clients for Outlook Compatibility Update running on Windows XP Professional Service Pack 2 (SP2). 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for SharePoint by Dell Software

Recovery Manager for SharePoint is an enterprise recovery solution that provides emergency access to all SharePoint content all the time. With Recovery Manager, any recovered content can be restored to any SharePoint instance or saved to a file system. Get your business-critical data back online before the entire server farm comes back. 
(ASP & SOFTWARE PRODUCT)

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Toad for Data Analysis - Query, Understand & Report on Data From Any Source by Dell Software

Toad for Data Analysis is a multi-platform database query tool built for anyone who needs to access data (from any data source), understand data relationships and quickly produce reports. 
(ASP & SOFTWARE PRODUCT)

Brandbank uses Sanbolic’s Melio to Deliver High Availability and Improve Performance for Image File-Serving Service by Sanbolic Inc. (E-mail this company)

April 2012 - (Free Research)
This case study details how one company leveraged a dedicated software to gain simultaneous access to critical information, eliminating the need for redundant copies of data and realizing tremendous storage savings. 
(CASE STUDY) READ ABSTRACT |

Best Practices for Optimizing SharePoint Storage Management Strategies by AvePoint, Inc.

February 2011 - (Free Research)
This paper examines how organizations can properly manage each type of SharePoint data withAvePoint’s DocAve Storage Optimization Suite in order to unleash SharePoint’s full potential and unlockthe key to quick cost savings for existing storage investments. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Disk-to-Disk (D2D) Backup with Data Deduplication by FalconStor Software

May 2009 - (Free Research)
Today's storage environments need a way to keep data intact without consuming corresponding disk storage. The FalconStor® File Interface Deduplication System provides the solution. Read on to discover the amazing benefits of this data deduplication solution. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: To BLOB or Not to BLOB? Storage Optimization Demystified by AvePoint, Inc.

August 2011 - (Free Research)
Join SharePoint MVPs Dan Holme and Randy Williams for a balanced, intelligent, detailed examination of the technologies and issues surrounding BLOB externalization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

CyberFusion Integration Suite (CFI) by Proginet Corporation

CyberFusion Integration Suite (CFI), from Proginet, is the world's most advanced managed file transfer solution. CFI helps organizations overcome the fundamental challenges they face every day as they strive to secure, control, and integrate the data that drives their business. 
(SOFTWARE PRODUCT)

Is EMC Greenplum the real Hadoop company? by ComputerWeekly.com

April 2013 - (Free Research)
EMC Greenplum launched two new Hadoop-related technologies to support Big Data deployments. Analyst Group, Nucleus Research  assesses their importance. 
(ANALYST REPORT) READ ABSTRACT |

Jumping on the Cloud-Wagon? AppZero's Virtual Application Appliance Approach by AppZero

March 2009 - (Free Research)
This paper explains the attributes of AppZero's VAA approach to server-side application virtualization and conveys various advantages in the cloud environment. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Transitioning to Server Virtualization with Hyper-V and NetApp by NetApp and Microsoft

December 2008 - (Free Research)
Learn how one IT team transitioned to server virtualization with Microsoft® Hyper-V<sup>™</sup> coupled with NetApp storage to enable a variety of flexible disaster recovery and availability scenarios. 
(CASE STUDY) READ ABSTRACT |

Fast Extract for Oracle Ships on Windows by Innovative Routines International, Inc.

September 2007 - (Free Research)
Press Release: Innovative Routines International Inc. (IRI), makers of the high-performance CoSort (www.cosort.com) data manipulation package, announces that Fast Extract (FACT) for Oracle now runs on Windows. 
(PRESS RELEASE) READ ABSTRACT |

Adobe ColdFusion 9 by Adobe Systems, Inc.

October 2009 - (Free Research)
Adobe ColdFusion 9 software enables developers to rapidly build robust Internet applications by condensing complex business logic into fewer lines of code. 
(DEMO)

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc. (E-mail this company)

WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support every level of the global organization – executive, analytical, & operational – and make data available, accessible, and meaningful to every person or application that needs it. 
(SOFTWARE PRODUCT)

SQL Server in the Cloud by SAVVIS

August 2011 - (Free Research)
This SearchSQLServer.com E-Guide explores several options for moving data on SQL Azure migration and synchronization. 
(EGUIDE) READ ABSTRACT |

Create Fault-Tolerant SQL Server 2008 Installations -- Rely on SQL Server 2008 Features to Protect Data by Dell, Inc. and Intel®

September 2009 - (Free Research)
Read this paper to determine how best to protect your SQL environment when running SQL Server on Dell PowerEdge servers. 
(WHITE PAPER) READ ABSTRACT |

SQL Server 2012 Security by Microsoft

January 2012 - (Free Research)
Check out this essential webcast to learn all about the security & compliance features for SQL Server from Il-Sung Lee, Senior Program Manager from SQL Server Engine Security team. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 414 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts