Solution Database SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Solution Database Security returned the following results.
RSS What is RSS?
Related Categories

 •   Databases
 •   Database Planning and Implementation
 •   Database Administration
 •   Database Migration and Conversion/ EDT
 •   Storage Management
 •   Data Replication and Mirroring
 •   Data Center Management
 •   Disk-based Backup & Storage/ RAID
 •   Enterprise Information Integration/ Metadata Management
 •   Application Management and Maintenance

Related Searches
 •   Application Of Solution
 •   Configure Solution Database Security
 •   Internet Solution Database
 •   Plan Solution
 •   Procedure Solution Database Security
 •   Solution Database Problems
 •   Solution Database Product
 •   Solution Database Security Standard
 •   Solution Paper
 •   Solution Regional
Advertisement

ALL RESULTS
1 - 25 of 461 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Proven strategies for archiving complex relational data by IBM

December 30, 2008 - (Free Research)
This white paper explains how the IBM Optim Data Growth Solution provides proven technology and comprehensive capabilities that make archiving complex relational data both practical and desirable. 
(WHITE PAPER) READ ABSTRACT |

Reducing Risks through Flexible and Automatic Oracle Data Protection by BakBone

January 17, 2008 - (Free Research)
For Oracle administrators, backup and recovery can be a daunting challenge. Read this white paper to learn about automated tools for Oracle databases that combat these problems by ensuring the highest levels of data protection, availability and retention. 
(WHITE PAPER) READ ABSTRACT |

Replication for Dummies by Sybase, an SAP company

March 05, 2010 - (Free Research)
IT organizations face many data challenges. Data distribution rates and the quantity of data that consumers use is expanding exponentially in the global marketplace. Read this e-book to gain an understanding of the Sybase Replication Server and learn a series of best practices to consider when implementing a database replication strategy. 
(EBOOK) READ ABSTRACT |

NZ Bus Develops Applications 60% Faster, Improves Database Performance by up to 35% by Oracle Corporation

March 16, 2011 - (Free Research)
Read this case study and discover how NZ Bus, through local Oracle Certified Partner Database Integrated Solutions, became the first organization in New Zealand and one of the first in Asia-Pacific to deploy Oracle Database 11g Release 2. 
(WHITE PAPER) READ ABSTRACT |

Get the Facts: Real-Time, On-Demand Information for Business Intelligence and Data Integration by Vision Solutions

December 2008 - (Free Research)
This white paper shows how a software-based data replication solution can drive value by providing simplified, on-demand enterprise-wide data sharing and right-time data integration for any business. 
(WHITE PAPER) READ ABSTRACT |

Business Benefits of Hosting SAP with Freudenberg IT (FIT) by Freudenberg IT

May 2009 - (Free Research)
Read this paper to learn how Freudenberg IT (FIT) provides everything you need for a complete integrated e-business solution. FIT provides the applications infrastructure and technical day-to-day applications support; the required care to better ensure that your SAP environment is always there and is always performing optimally. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Database Tools for Auditing and Forensics by SearchSecurity.com

March 2011 - (Free Research)
This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance. 
(EGUIDE) READ ABSTRACT |

Database Security Audit and Protect Critical Databases by Imperva

February 2011 - (Free Research)
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse. 
(WHITE PAPER) READ ABSTRACT |

Database Security: Audit and Protect Critical Databases by Imperva

September 2010 - (Free Research)
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse. 
(WHITE PAPER) READ ABSTRACT |

Database Crime Scene Prevention by Imperva

February 2009 - (Free Research)
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Understanding and Selecting a Database Assessment Solution by Application Security, Inc.

February 2010 - (Free Research)
In this analyst report, Securosis’ Adrian Lane explores the inner workings of assessment tools and the business value they provide, and will make specific recommendations on evaluating, purchasing, and deploying Database Assessment. 
(ANALYST REPORT) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva.

October 2008 - (Free Research)
This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor by Information Security Magazine

October 2010 - (Free Research)
This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs. 
(WHITE PAPER) READ ABSTRACT |

Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention by McAfee, Inc.

November 2011 - (Free Research)
While databases are the warehouses of the most valuable information assets in the enterprise, many organizations today do poorly to protect them. In this paper, discover how to protect your database and data assets with McAfee Database Security Solution, a multi-tiered solution that can help defend against threats and eliminate vulnerabilities.   
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

September 2010 - (Free Research)
For each threat, the paper describes background information, general risk mitigation strategies, and the database protection provided by Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

Technology Audit: Imperva SecureSphere Data Security Suite by Imperva

June 2010 - (Free Research)
Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of a Database Attack by Imperva

November 2009 - (Free Research)
Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures. 
(WEBCAST) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

August 2009 - (Free Research)
This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

February 2009 - (Free Research)
This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat. 
(WHITE PAPER) READ ABSTRACT |

Implementing Database Security and Auditing: Using Granular Access Control by Guardium, an IBM Company

September 2010 - (Free Research)
In this white paper you’ll see that granular access control can only be achieved through aligning the application user model with the database security system. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: The Business Case for Database Activity Monitoring-- Who's Watching the Watchers? by Guardium, an IBM Company

March 2010 - (Free Research)
This Presentation Transcript is an introduction to database activity monitoring and covers the basics of how this important technology works. It also offers tips on how to demonstrate to business leaders that database activity monitoring can not only help data protection efforts, but can also augment an organisational compliance program. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Managing the Entire Database Security & Compliance Lifecycle by Guardium, an IBM Company

February 2010 - (Free Research)
Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle. 
(DATA SHEET) READ ABSTRACT |

A Proactive Approach to Compliance, Security and Audit by IBM

July 2013 - (Free Research)
This exclusive resource examines an integrated solution for automating the complete security and compliance lifestyle across your entire database infrastructure. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 461 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts