Security Guidelines For DatabaseWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Guidelines For Database returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Storage Management
 •   Virtualization
 •   Security Policies
 •   Security Monitoring
 •   Storage Security
 •   Network Security
 •   Application Security
 •   Backup Systems and Services
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Intranet Security
 •   Manufacturers Security
 •   Secure Security
 •   Security Employee
 •   Security Guidelines For Alaska
 •   Security Guidelines For Based
 •   Security Guidelines For E-Commerce
 •   Security Guidelines For Records
 •   Security Planner
 •   Tutorials Security Guidelines
Advertisement

ALL RESULTS
1 - 25 of 480 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES by Intel

September 18, 2013 - (Free Research)
This expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life. 
(EGUIDE) READ ABSTRACT |

Mobilizing Windows applications by Citrix

December 31, 2013 - (Free Research)
This whitepaper provides a project design guide that will help you construct and demonstrate a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in the Cloud by NetApp

October 01, 2009 - (Free Research)
This white paper explores today's top security concerns in cloud environments, and aims to dispel the common (and growing) myth that a cloud-based infrastructure introduces new risks that cannot be quantified nor controlled. In this paper, you'll learn how a holistic approach to information security can help your company successfully combat risks. 
(WHITE PAPER) READ ABSTRACT |

File Transfer Survey: Results Highlight the Need for a Secure, Cost-Effective FTP Replacement by Attachmate Corporation

August 31, 2010 - (Free Research)
Simply put, traditional file transfer protocol (FTP)-based solutions are ineffective. It's time to upgrade to a new approach that can help you meet data growth and increasingly stringent security and compliance measures head on. View now to learn more! 
(WHITE PAPER) READ ABSTRACT |

BGMX Retail Solutions Case Study by SonicWALL

February 14, 2011 - (Free Research)
BGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines. 
(CASE STUDY) READ ABSTRACT |

Vulnerability Management for GLBA Compliance by Qualys, Inc.

May 2008 - (Free Research)
The QualysGuard vulnerability management and policy compliance solution helps financial institutions to meet many key security guidelines. 
(WHITE PAPER) READ ABSTRACT |

Taking Windows Mobile on Any Device by Citrix

January 2014 - (Free Research)
This whitepaper provides a project design guide that will help you construct and demonstrate a way to deliver Windows-based apps to mobile devices efficiently while avoiding application rewrites and maintaining information security. 
(WHITE PAPER) READ ABSTRACT |

Mobilizing Windows applications by Citrix

June 2013 - (Free Research)
This exclusive resource constructs and demonstrates an efficient way of delivering Windows-based applications designed for the latest mobile devices without time-consuming and costly rewrites, all while maintaining information security best practices. 
(WHITE PAPER) READ ABSTRACT |

Facilitating Enterprise PCI DSS Compliance - Detail Review by GlobalScape

April 2008 - (Free Research)
HS-PCI solution helps procedure and policy enforcement by monitoring and reporting on PCI DSS compliance by using prompts and warnings. 
(WHITE PAPER) READ ABSTRACT |

Whitepaper: Dell Storage Selection Guidelines for Oracle Databases by Dell, Inc.

May 2011 - (Free Research)
Dell strives to simplify IT in order to reduce complexity in data centers and has a broad storage product portfolio to meet database customers' needs. These storage selection guidelines will help administrators choose an appropriate storage technology based on their requirements. 
(WHITE PAPER) READ ABSTRACT |

SearchCompliance.com E-guide: A lesson in database security: What every compliance officer needs to know by IBM

August 2011 - (Free Research)
Too many enterprise databases are leaking sensitive information. Yet the solution to these problems is simple: user education, coupled with a new breed of database activity monitoring tools. This e-guide provides guidelines for establishing a data protection framework and teaching the right way to handle data. 
(EGUIDE) READ ABSTRACT |

E-Guide: Implementing Storage Virt: Guidelines & Factors to Consider by Hewlett-Packard Company

August 2011 - (Free Research)
This SearchVirtualStorage.com E-Guide can help clarify by outlining 4 guidelines for implementing storage virtualization and by divulging factors to consider before deploying storage virt into your IT infrastructure. 
(EGUIDE) READ ABSTRACT |

Backup and Recovery for Oracle Database 11g with EMC Deduplication by EMC Corporation

November 2011 - (Free Research)
This white paper provides guidelines for the use of EMC Data Domain deduplication for Oracle Recovery Manager backup over a Network File System mount. 
(WHITE PAPER) READ ABSTRACT |

5 Mistakes Auditing Virtual Environments (You Don't Want to Make) by HyTrust

July 2011 - (Free Research)
Read this expert guide to ensure your virtual environment is in compliance with PCI DSS 2.0 and avoid common errors made in the auditing process. 
(WHITE PAPER) READ ABSTRACT |

The Critical Security Controls – Moving Beyond the Checklist Mentality by Lumension

August 2009 - (Free Research)
The "Critical Security Controls" (CSC) guidelines are designed to help organizations move beyond a "checklist" mentality by making security an integral part of, instead of an adjunct to, the operations and management of systems and networks. Learn more about the CSC guidelines and how they can help your organization. 
(PODCAST) READ ABSTRACT |

Information Security Magazine - December 2009 / January 2010: Basic Database Security by Information Security Magazine

December 2009 - (Free Research)
This issue of information security magazine provides a step-by-step guide to securing database systems, explores the important factors in selecting a SaaS provider, presents a whole new approach to security management that has nothing to do with structure-driven policy architecture, and more. 
(EZINE)

Oracle 10gR2 Databases on Hitachi NAS Platform, Powered by BlueArc by Hitachi Data Systems

September 2009 - (Free Research)
The Hitachi NAS Platform, powered by BlueArc, delivers a high-performance, intelligent and scalable multiprotocol solution. This document describes best practices for using Oracle databases on Linux with NAS connectivity provided by the Hitachi NAS Platform through the NFS protocol. 
(WHITE PAPER) READ ABSTRACT |

Keep Cloud Compliant by SearchCompliance.com

September 2013 - (Free Research)
Access this expert handbook for key information on how to ensure the move to cloud still meets today's compliance and security guidelines. 
(EBOOK) READ ABSTRACT |

Security Blanket by TCS: Enterprise Security Management by Trusted Computer Solutions

February 2010 - (Free Research)
Read this paper to learn how Security Blanket includes pre-defined security guidelines, called Profiles, from some of the most respected security industry leaders in the world. 
(WHITE PAPER) READ ABSTRACT |

Guidelines for Specification of Data Center Criticality / Tier Levels by Schneider Electric

January 2011 - (Free Research)
This paper describes and compares three common methods for specifying data center criticality. Guidance is given on how to choose a criticality by presenting typical levels for various applications and environments. Defensible approaches for specifying data center performance are also discussed. 
(WHITE PAPER) READ ABSTRACT |

Guidelines for the Evaluation of Enterprise De-Duplication Solutions: How to Navigate the Pitfalls and Hyperbole by IBM

April 2009 - (Free Research)
This document is not intended to judge what is good or bad, right or wrong. The primary focus is educational, providing a background on the principles of de-duplication and recommendations to consider in planning an evaluation of de-duplication solutions. 
(WHITE PAPER) READ ABSTRACT |

Create Supported SQL Server 2008 Virtual Machines -- Rely on Server Virtualization to run SQL Server 2008 by Dell, Inc. and Intel®

September 2008 - (Free Research)
The support team for Microsoft SQL Server has published guidelines for virtualizing this database engine. Read this paper to learn how to move forward with the process and create supported SQL Server virtual machines (VMs) that can be hosted on Dell PowerEdge servers. 
(WHITE PAPER) READ ABSTRACT |

HPC Storage: Taming the Data Torrent by Dell, Inc. and Intel®

August 2011 - (Free Research)
Check out this latest issue of HPC source to learn about the current state of high performance computing and what top experts predict for the coming decade. 
(EZINE)

Presentation Transcript: Go Forth & Comply - New Virtualization Guidelines from the PCI Council by Dell SecureWorks UK

August 2011 - (Free Research)
In this presentation transcript, principal security consultant at Dell SecureWorks, discuss the issues confronting organizations who wish to use virtualization technologies with their Cardholder Data Environment, summarize and clarify the recommendations from the PCI council and more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Setting standards in IT Industries by DLT Solutions

March 2012 - (Free Research)
Building and adhering to security standards are essential for mitigating risk and ensuring adequate IT security. NIST is one of the first risk assessment standards, offering guidelines for securing the IT infrastructure. In this e-guide, gain an in-depth look into NIST and uncover how to decrease the risks that your industry faces. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 480 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts