Search Security Architecture DatabaseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Search Security Architecture Database returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Information Integration/ Metadata Management
 •   Data Security
 •   Databases
 •   Enterprise Search / Search Engines
 •   Enterprise Data Protection and Privacy
 •   Business Intelligence Solutions
 •   Storage Management
 •   Database Administration
 •   Storage Security
 •   Database Planning and Implementation

Related Searches
 •   Accessing Search Security Architecture
 •   Definition Search
 •   Industry Search
 •   Prices Search Security
 •   Screen Search Security Architecture
 •   Search Codes
 •   Search Method
 •   Search Security Architecture Performance
 •   Search Security Compliance
 •   Search Security Impact
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

BPM e-guide: Is cloud right for you? by SearchSOA.com

May 12, 2014 - (Free Research)
Learn about the business conditions that help determine cloud computing decision-making. 
(EBOOK) READ ABSTRACT |

Combining Cloud-Based DDoS Protection and DNS Services to Thwart the Threat Of DDoS by Verisign, Inc.

February 27, 2014 - (Free Research)
This guide explores the keys to fighting sophisticated DDoS attacks and why cloud-based protection may be your best option. 
(WHITE PAPER) READ ABSTRACT |

DDoS Malware: Strategies for Mitigation by Verisign, Inc.

December 31, 2013 - (Free Research)
This technical brief covers DDoS-enabled malware and several DDoS-specific tools, their capabilities, and the network indicators they generate while performing attack methods. 
(WHITE PAPER) READ ABSTRACT |

4 Leading DDoS Protection Strategies by Verisign, Inc.

December 31, 2013 - (Free Research)
This guide explores various ways you can prevent DDoS attacks from harming your system and helps you decide which is best for your system. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of a Database Attack by Imperva

November 12, 2009 - (Free Research)
Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures. 
(WEBCAST) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

The MATH, MYTH, & MAGIC: An Introduction to Identity Data Search-and-Match by Informatica

December 2008 - (Free Research)
This book is of value to both the person who is tackling a "name search" and "name matching" problem for the first time, as well as to the experienced specialist in "identification and search" systems. 
(BOOK) READ ABSTRACT |

SEKE Podcast - Introduction to Solera DeepSee by Solera Networks

February 2010 - (Free Research)
In this podcast presented by James Hilliard, host of the "See Everything, Know Everything" podcast, and Matthew Wood, Solera Networks' Chief Scientist, you'll learn about the DeepSee tool, which provides administrators, users and C-level executives at a corporation a way to see what is happening on a network in real-time. 
(PODCAST) READ ABSTRACT |

IBM Rational Asset Manager e-Kit by IBM

March 2009 - (Free Research)
Explore the benefits of Rational Asset Manager with this IBM e-Kit. The e-Kit includes demos, white papers and a webcast. Discover how to track and audit your assets to utilize them for reuse, especially within a service-oriented architecture. 
(PRODUCT DEMO) READ ABSTRACT |

Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company by IBM

March 2011 - (Free Research)
InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today. 
(CASE STUDY) READ ABSTRACT |

Beyond the Data Warehouse: A Unified Information Store (UIS) for Data and Content by Attivio, Inc.

May 2010 - (Free Research)
Since the inception of web 2.0 technologies, there is now a need to unify data and content. This paper defines a UIS architecture as the approach to unification. Continue reading this paper to learn how data and content are uniting and moving beyond the data warehouse and how a UIS architecture is the solution to unification. 
(WHITE PAPER) READ ABSTRACT |

Sybase IQ: An Advanced Columnar Data Warehouse Architecture by Sybase, an SAP company

August 2010 - (Free Research)
A Winter Corporation white paper, this paper examines the architecture and performance of Sybase IQ in view of the requirements of demanding new BI and data warehouse applications. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Data Quality and Identity Resolution by Informatica

May 2008 - (Free Research)
This paper describes how identity resolution complements and extends the application of data quality and data integration processes into business applications. 
(WHITE PAPER) READ ABSTRACT |

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

Ontrack® PowerControls™ 6.0 by Ontrack® PowerControls™ by Kroll Ontrack

May 2010 - (Free Research)
Ontrack® PowerControls™ saves time and costs to search, recover, restore and manage data in Microsoft® Exchange and Microsoft® Office SharePoint® Server environments. It’s easy and offers granular level management to produce quick, relevant results. 
(DEMO) READ ABSTRACT |

Forum XWall - Web Services Security Firewalls - Prevent Unauthorized Access by Forum Systems

Forum XWall™ is the industy's first Web Services Firewall equipped with data authentication as well as XML intrusion prevention to actively protect against unauthorized access, XML viruses, data corruption and denial of Web service attacks. Forum Systems is the leader in Web Services Security. 
(SOFTWARE PRODUCT)

Expanding Information Access Initiatives with Embedded Enterprise Search by Vivisimo, Inc.

December 2009 - (Free Research)
This paper focuses specifically on what application developers—specifically, ISVs and solution integrators—need to do in order to satiate this emerging market demand. Read on to learn some of Vivisimo's capabilities and how ISVs and solution integrators can leverage them to address evolving search challenges within their respective applications. 
(WHITE PAPER) READ ABSTRACT |

How to Backup and Restore Oracle Database with IBM Storage by IBM

April 2014 - (Free Research)
This guide deciphers the backup and restore process for native Oracle database solutions in an IBM AIX operating-system environment. Read on to see how a software system is capable of creating point-in-time copies of databases and will greatly simplify management. 
(WHITE PAPER) READ ABSTRACT |

HRG Assessment - Linux Migration by Red Hat & IBM

November 2010 - (Free Research)
The migration from proprietary UNIX and legacy hardware and software-based environments to Linux on x86 Intel architecture (IA) is an effective way to take cost and complexity out of IT. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Big Data and Data Warehousing by SAP America, Inc.

November 2011 - (Free Research)
Wayne Eckerson introduces big data and the issues involved in warehousing it as well as an overview of data warehouse architectures for storing big data. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Locking Down Your Enterprise: What You Need to Know About Database Security Inside and Outside Your Company by Oracle Corporation

December 2010 - (Free Research)
This e-Book will take a look at how database managers can evolve their security strategies to match the increasingly sophisticated technologies used by hackers to attack their mission critical data. 
(EBOOK)

Programmer’s Guide: Using LucidWorks Enterprise to add search to your Web Application by Lucid Works

December 2010 - (Free Research)
This step-by-step guide shows a programmatic approach to working with LucidWorks Enterprise, the search solution from LucidWorks Enterprise built on Apache Solr. We’ll show how to add content, index it, create a web page (with example PHP code) to send search requests and display results, and more.  
(WHITE PAPER) READ ABSTRACT |

Search Based Applications by Exalead

January 2011 - (Free Research)
Management of information via computers is undergoing a revolutionary change as the frontier between databases and search engines is disappearing. Against this backdrop of nascent convergence, a new class of software has emerged that combines the advantages of each technology, right now, in Search Based Applications. Read on to learn more. 
(BOOK) READ ABSTRACT |

ReferenceWare by SkillSoft Corporation

ReferenceWare – the fastest way to problem-solve and learn - provides full access to the unabridged contents of thousands of business and technology titles in a searchable, collaborative environment! 
(SOFTWARE PRODUCT)

Identity Simplification and Consolidation through Virtualization and Synchronization by Agilysys-Sun Technology Solutions

March 2009 - (Free Research)
You'll want to read this paper if simplifying your company's identity and access management (IAM) infrastructures are on your agenda. Directory virtualization provides new opportunities to move towards this goal by abstracting disparate sources of identity data and presenting them in a unified fashion. Read on for details and more information. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts