Top Database Security FileWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Top Database Security File returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Databases
 •   Storage Management
 •   Database Administration
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Data Center Management
 •   Storage Security
 •   Backup Systems and Services
 •   Access Control

Related Searches
 •   Implementations Of Top
 •   Top Database Contracts
 •   Top Database Iowa
 •   Top Database Printable
 •   Top Database Security Batch
 •   Top Database Security Measured
 •   Top Erp
 •   Top Find
 •   Top Remote
 •   Top Texas
Advertisement

ALL RESULTS
1 - 25 of 441 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva.

October 2008 - (Free Research)
This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center. 
(WHITE PAPER) READ ABSTRACT |

THE SQL SERVER SECURITY THREAT — IT’S CLOSER THAN YOU THINK by Idera

January 2012 - (Free Research)
This white paper discusses the information security and compliance issues associated with Microsoft SQL Server database systems. Whether you’re a CSO, IT manager, internal auditor or database administrator, you'll learn about the database security threat, how compliance fits into the overall scheme and what you should do to minimize your risks. 
(WHITE PAPER) READ ABSTRACT |

Securing PostgreSQL from External Attack by EnterpriseDB Corporation

November 2009 - (Free Research)
Databases are an important part of a company’s infrastructure, but they also tend to be rich with attack vectors to exploit. This webcast explores the many potential PostgreSQL external vulnerabilities and then shows how those vulnerabilities can be secured. Watch this webcast to learn how to protect one of your company’s most valued assets. 
(WEBCAST) READ ABSTRACT |

Top Eight Do's and Don'ts of Managing Access Control in the Windows/AD Environment by Dell Software

October 2009 - (Free Research)
This tech brief presents eight recommendations to help you proactively address the difficulties of access control in a Microsoft-centric environment, and avoid the common pitfalls, risks and costs. 
(WHITE PAPER) READ ABSTRACT |

Top 5 Challenges for Hadoop MapReduce in the Enterprise by Platform Computing Corporation

August 2011 - (Free Research)
This white paper describes challenges organizations face when using MapReduce, and the means by which Platform MapReduce can address them. 
(WHITE PAPER) READ ABSTRACT |

Hitachi Virtual Storage Platform: The Economic Evolution of Enterprise Storage by Hitachi Data Systems

January 2011 - (Free Research)
This paper examines the exceptional Storage Economics principles built into the Virtual Storage Platform. It delineates how it helps enterprises reduce capital and operating expenditures, garner a greater return on existing storage assets and ultimately lower the total cost of ownership (TCO). 
(WHITE PAPER) READ ABSTRACT |

Addressing Data Security In The Cloud And Low Cost Large File Transfer by SearchSecurity.com

October 2013 - (Free Research)
The location of cloud storage can play a huge part in cost as well as security. Delivering large files from non-scrutinized locations can compromise sensitive data in more ways than not. 
(EGUIDE) READ ABSTRACT |

The Case for Log Management Warehousing – An ESG Analyst Brief by Hewlett-Packard Company

March 2010 - (Free Research)
As log management and analysis needs evolve, legacy products can’t scale, accommodate uncommon log file formats, or provide the right level of real-time or historical analysis. These requirements are driving a transition to a new model called log management warehousing. 
(ANALYST BRIEF) READ ABSTRACT |

Globalscape® EFT Platform: Complete Visibility Over File Transfer by GlobalScape

May 2014 - (Free Research)
This resource highlights a file transfer platform that offers complete visibility to help improve security and audit management. 
(WHITE PAPER) READ ABSTRACT |

Mobile is the New Normal for Conducting Business by GlobalScape

May 2014 - (Free Research)
This resource features a cloud-based mobile file sharing solution that enables convenient and secure user collaboration. 
(WHITE PAPER) READ ABSTRACT |

File Archive: the next big thing? by EMC Corporation

October 2013 - (Free Research)
Check out this short video to explore how to create a smarter storage and archiving system. Discover the steps to mitigate the risk and costs associated with compliance end eDiscovery and find out how to combat today's top challenges. Watch now to learn more. 
(VIDEO) READ ABSTRACT |

Top data integration challenges and strategies to improve them by IBM

November 2011 - (Free Research)
In this e-guide you will learn the top data integration challenges that come along with business intelligence (BI) projects and strategies to improve them. 
(EGUIDE) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

February 2009 - (Free Research)
This document addresses the most critical of database infrastructure threats by providing a top ten list as identified by Imperva's Application Defense Center. Background information, risk mitigation strategies, and an overview of Imperva's SecureSphere Database Security Gateway protections are provided for each threat. 
(WHITE PAPER) READ ABSTRACT |

Secure Managed File Transfers: How They Can Help Meet Compliance Regulations And Secure Your Data by OpenText

October 2013 - (Free Research)
In this technical guide, gain expert insight on managed file transfer (MFT) systems, which help in meeting increased demands for security, compliance, and other operations, and why it should be your sole means for transmitting data within and outside of your organization. 
(WHITE PAPER) READ ABSTRACT |

What you need in a file syncing tool by GroupLogic

March 2012 - (Free Research)
File syncing is commonly used for both corporate-created data and employee-created corporate data. Finding one tool that could be used for both would be extremely helpful. In this expert E-Guide from SearchConsumerization.com, discover what you should look for in a file syncing tool. 
(EGUIDE) READ ABSTRACT |

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities by Imperva

August 2009 - (Free Research)
This paper describes the most critical database security threats, offers risk mitigation strategies, and provides information about Imperva SecureSphere Database Security Solutions. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them by GroupLogic

September 2011 - (Free Research)
Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows. 
(WHITE PAPER) READ ABSTRACT |

Best Practices in Unified Records Management to Reduce Risks and Support Data Growth by Iron Mountain

December 2012 - (Free Research)
With the volume of your paper and digital records steadily increasing, the need for a records management policy that effectively manages both is a top priority. Read on to discover how a unified records management strategy can help you get control of all your business-critical records. Plus, learn 5 key features of an effective program. 
(WHITE PAPER) READ ABSTRACT |

4 File Sharing Workarounds That Should Worry CSOs by GlobalScape

April 2013 - (Free Research)
This resource reveals the top 4 file sharing workarounds users are resorting to when organizations don't provide a scalable or easy-to-use resource for large file exchanges. 
(WHITE PAPER) READ ABSTRACT |

Recovery Manager for SharePoint by Dell Software

Recovery Manager for SharePoint is an enterprise recovery solution that provides emergency access to all SharePoint content all the time. With Recovery Manager, any recovered content can be restored to any SharePoint instance or saved to a file system. Get your business-critical data back online before the entire server farm comes back. 
(ASP & SOFTWARE PRODUCT)

Backup and Recovery for Oracle Database 11g with EMC Deduplication by EMC Corporation

November 2011 - (Free Research)
This white paper provides guidelines for the use of EMC Data Domain deduplication for Oracle Recovery Manager backup over a Network File System mount. 
(WHITE PAPER) READ ABSTRACT |

FTP Replacement: Where MFT Makes Sense and Why You Should Care by IBM

November 2011 - (Free Research)
This research provides advice on when to replace file transfer protocol (FTP) with managed file transfer (MFT) solutions, and which features to consider. This Gartner report includes MFT software and MFT as a service. Also highlighted is where MFT fits into the technology landscape and some of the key benefits. 
(WHITE PAPER) READ ABSTRACT |

Database Security: Audit and Protect Critical Databases by Imperva

September 2010 - (Free Research)
Databases store extraordinarily valuable and confidential data. An increasing number of compliance regulations compel organizations to audit access to this sensitive data and protect it from attack and abuse. 
(WHITE PAPER) READ ABSTRACT |

Top 10 Steps to Protecting Your Organization’s Privacy Data by McAfee, Inc.

March 2010 - (Free Research)
Over the last few years, the challenge of protecting privacy data has been compounded by increasing compliance regulations that can mean fines - or even jail time - if privacy data is mishandled. This white paper presents the top ten regulatory compliance requirements to consider when selecting a privacy data protection solution. 
(WHITE PAPER) READ ABSTRACT |

Cisco Continuous Data Protection for Files by Cisco Systems, Inc.

March 2009 - (Free Research)
Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 441 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts