Time Database Security ReplicationWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Time Database Security Replication returned the following results.
RSS What is RSS?
Related Categories

 •   Databases
 •   Data Replication and Mirroring
 •   Data Security
 •   Database Administration
 •   Enterprise Data Protection and Privacy
 •   Database Planning and Implementation
 •   Storage Management
 •   Enterprise Information Integration/ Metadata Management
 •   Backup Systems and Services
 •   Disk-based Backup & Storage/ RAID

Related Searches
 •   Buy Time
 •   Rfi Time
 •   Time Basic
 •   Time Database Portal
 •   Time Database Security Canadian
 •   Time Database Security Delaware
 •   Time Database Security Demos
 •   Time Databases
 •   Time Needs
Advertisement

ALL RESULTS
1 - 25 of 483 | Next Page

Technical Overview of McAfee Real-Time Database Monitoring, Auditing, and Intrusion Prevention by McAfee, Inc.

November 04, 2011 - (Free Research)
While databases are the warehouses of the most valuable information assets in the enterprise, many organizations today do poorly to protect them. In this paper, discover how to protect your database and data assets with McAfee Database Security Solution, a multi-tiered solution that can help defend against threats and eliminate vulnerabilities.   
(WHITE PAPER) READ ABSTRACT |

Database Security Audit and Protect Critical Databases by Imperva

February 04, 2011 - (Free Research)
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse. 
(WHITE PAPER) READ ABSTRACT |

Database Security: Audit and Protect Critical Databases by Imperva

September 07, 2010 - (Free Research)
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

September 02, 2010 - (Free Research)
For each threat, the paper describes background information, general risk mitigation strategies, and the database protection provided by Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

August 03, 2009 - (Free Research)
This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

February 10, 2009 - (Free Research)
This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat. 
(WHITE PAPER) READ ABSTRACT |

Top Ten Database Security Threats by Imperva

February 04, 2011 - (Free Research)
The enterprise database infrastructure is subject to an overwhelming range of threats. This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten as identified by Imperva’s Application Defense Center. 
(WHITE PAPER) READ ABSTRACT |

Practical Guide to Database Security & Compliance by Sentrigo Inc.

August 2008 - (Free Research)
This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Database Tools for Auditing and Forensics by SearchSecurity.com

March 2011 - (Free Research)
This e-guide presents the best practices for tuning database auditing tools. Continue reading this e-guide to learn more about these best practices which will allow you to audit without forfeiting  database performance. 
(EGUIDE) READ ABSTRACT |

Understanding and Selecting a Database Activity Monitoring Solution by Imperva

February 2009 - (Free Research)
Check out this white paper to discover how database activity monitoring (DAM) tools provide powerful, immediate, non-intrusive benefits for security and compliance, and a long-term platform for comprehensive protection of databases and applications. 
(WHITE PAPER) READ ABSTRACT |

Anatomy of a Database Attack by Imperva

November 2009 - (Free Research)
Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures. 
(WEBCAST) READ ABSTRACT |

Database Crime Scene Prevention by Imperva

February 2009 - (Free Research)
This article examines known attacks, methods, and tools used by criminals, as well as emerging exploit categories used to break into a database, establish control, compromise the system, steal the data, and cover up the tracks. Read this short article to learn best practices for protecting databases against these attack methods. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

Next Generation Web Application Firewalls (NG-WAF) by Imperva

June 2010 - (Free Research)
This paper describes Imperva's vision for the next generation of WAFs. It details Web application security problems and solutions today, and gives perspectives on the future. 
(WHITE PAPER) READ ABSTRACT |

Replay for BlackBerry® Enterprise Server by AppAssure Software, Inc.

March 2009 - (Free Research)
This data sheet details Replay for BlackBerry, an advanced backup and recovery application that protects your entire messaging ecosystem, not just the BlackBerry data, like other products. 
(DATA SHEET) READ ABSTRACT |

Quicktour Demo: Key Differentiators between Microstrategy and Hyperion by MicroStrategy Incorporated

November 2008 - (Free Research)
This tour provides an overview of MicroStrategy platform's uniquely powerful enterprise BI capabilities and illustrates the 12 key differentiators between MicroStrategy and Hyperion. 
(WHITE PAPER) READ ABSTRACT |

Comparing IBM Informix and Oracle Database for High Availability and Data Replication, an ITG Management Report by IBM

January 2014 - (Free Research)
In this report, get an in-depth comparison between Oracle Databases and Real Application Clusters (RAC) and IBM Informix with regards to high availability and data replication. 
(WHITE PAPER) READ ABSTRACT |

SIEM IT Decision Center- Checklist #1 by SearchSecurity.com

January 2013 - (Free Research)
If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms. 
(EGUIDE) READ ABSTRACT |

Managing Data through Replication: Avoiding Errors, Improving Access by Dell Software

December 2012 - (Free Research)
CIOs and IT entities looking to secure data and ensure its availability during times of emergency could benefit from employing a data replication tool. Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it offers and it's appeal to IT professionals. 
(WHITE PAPER) READ ABSTRACT |

Windows Azure Storage: A Highly Available Cloud Storage Service with Strong Consistency by Microsoft

December 2011 - (Free Research)
Read this white paper to learn about the architecture, data model, resource provisioning, load balancing, and replication systems of Windows Azure Storage (WAS), a scalable cloud storage system that provides customers with seemingly limitless data storage, access from anywhere at any time, and the ability to only pay for what they use. 
(WHITE PAPER) READ ABSTRACT |

SharePlex Connector for Hadoop: Improving analytics with real- and near real-time data replication by Dell Software

July 2013 - (Free Research)
Learn how alternative methods for replicating changes from an Oracle database to a Hadoop® cluster can help you maintain real-time or a near real-time copies of the tables your organization needs to meet its data analytics requirements in this brief from Dell™. 
(WHITE PAPER) READ ABSTRACT |

Eliminating Database Downtime When Upgrading from Oracle 8i or 9i to 10g or 11g by GoldenGate Software, Inc.

January 2009 - (Free Research)
This paper presents a solution that tackles the challenge of upgrading or migrating an Oracle 8i or 9i database to Oracle 10g or 11g - without taking any database downtime. Key technology components used are GoldenGate Software's Transactional Data Management (TDM) software and Oracle's Cross Platform Transportable Tablespace feature. 
(WHITE PAPER) READ ABSTRACT |

How to Effectively Manage Data and Distribute it to Multiple Targets in Real Time by Dell Software

February 2013 - (Free Research)
Adding geographically disbursed or consolidated real-time reporting, business intelligence and analytics doesn't have to add a financial burden or strain on IT. SharePlex® delivers efficient, high-speed and low-latency data replication that enables real-time data distribution and consolidation. 
(WHITE PAPER) READ ABSTRACT |

Backup and Recovery for Oracle Database 11g with EMC Deduplication by EMC Corporation

November 2011 - (Free Research)
This white paper provides guidelines for the use of EMC Data Domain deduplication for Oracle Recovery Manager backup over a Network File System mount. 
(WHITE PAPER) READ ABSTRACT |

Managing Data through Replication: Avoiding Errors, Improving Access by Dell Software

December 2012 - (Free Research)
CIOs and IT entities looking to secure data and ensure its availability during times of emergency could benefit from employing a data replication tool. Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it offers and it's appeal to IT professionals. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 483 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts