Share us:
> Research Library > Technology > Data Management > Database Security
 

Database Security

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 26 - 50 of 381Sort Results By: Published Date | Title | Company Name
White Paper Published By: AlienVault     Published Date: Nov 10, 2015
Implement and maintain PCI DSS compliance at your organization
Tags : 
operations, structure, compliance, security, management
    
AlienVault
White Paper Published By: IBM     Published Date: Oct 06, 2015
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : 
ibm, zero trust model, zero trust, information security, intrusion prevent systems
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : 
ibm, ibm x force, threat intelligence, data protection, ibm security
    
IBM
White Paper Published By: IBM     Published Date: Oct 06, 2015
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Tags : 
behavior based protection, behavior based protection strategy, ibm, data protection, network protection
    
IBM
Webinar Published By: IBM     Published Date: Oct 06, 2015
Learn how IBM can help you proactively safeguard your data, productivity, and reputation.
Tags : 
ibm, data protection, security, data security, ibm solutions
    
IBM
White Paper Published By: VMware     Published Date: Oct 05, 2015
Unless you’ve already deployed a Zero Trust network, your network security is broken. That’s the bad news. The good news? New ways of implementing a previously hardware-intensive and costly concept called micro-segmentation now put Zero Trust within your organization’s reach. Learn about these breakthrough developments in this Forrester Research report that is yours free, courtesy of VMware and Carahsoft®. Download your free copy now.
Tags : 
vmware, zero trust, forrester research, network security, network security solution
    
VMware
White Paper Published By: VMware     Published Date: Oct 05, 2015
Learn how this city government deployed VMware vCloud Air Disaster Recovery® to meet its recovery point objectives and VMware NSX® to add security layers inside the organization for increased protection. Get your free download of this case study now.
Tags : 
vmware, vmware vcloud air disaster recovery, vmware nsx, avondale, arizona
    
VMware
White Paper Published By: VMware     Published Date: Oct 05, 2015
Most data center security emphasizes strong perimeter defense to keep threats on the outside. But this model is ineffective against today’s new types of threats, which may be borne by east-west traffic inside your data center. Some of these intrusions may lurk for days, weeks, or months to discover and exploit vulnerabilities. An existing concept called micro-segmentation is the solution. But until now, it was hardware-intensive and costly. In this solution overview, you’ll learn why micro-segmentation is now within your organization’s reach. Get your free copy now.
Tags : 
vmware, data center security, data center, micro segmentation, micro segmentation solution
    
VMware
White Paper Published By: VMware     Published Date: Oct 05, 2015
To be fair, if you don’t know or understand the data center architecture strategy called micro-segmentation, you aren’t a “dummy.” But it could mean you are missing a highly cost-effective opportunity to implement best-in-class data center security called the “Zero Trust” network. This special “For Dummies” edition explains micro-segmentation, how it enables Zero Trust, and why it is now within your organization’s reach. Download your free copy of this book now.
Tags : 
zero trust network, micro segmentation, data architecture strategy, vmware, data center
    
VMware
White Paper Published By: IBM     Published Date: Sep 30, 2015
Big data analytics to help better protect and secure.
Tags : 
healthcare, enterprise, security, data, business continuity
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2015
Diverse and proliferating data relationships are a source of growing security concern.
Tags : 
enterprise, security organization, compliance, internet security, intrusion prevention
    
IBM
Case Study Published By: IBM     Published Date: Sep 30, 2015
Automate and strengthen security and endpoint management to better protect data and meet HIPAA and meaningful use requirements
Tags : 
best practices, hipaa compliance, business intelligence, database security
    
IBM
Webinar Published By: IBM     Published Date: Sep 29, 2015
Cost savings and operational efficiencies that lead to greater business success.
Tags : 
collaboration, cost, operations, cloud computing, business intelligence
    
IBM
White Paper Published By: Oracle     Published Date: Sep 09, 2015
Oracle has identified five key characteristics of modern cloud-based procurement systems that enable procurement and AP to collaborate more effectively, work more efficiently, and reduce the cost of operations.
Tags : 
cloud computing, procurement, cloud solutions, oracle, internet security
    
Oracle
Webinar Published By: SnapLogic     Published Date: Sep 03, 2015
Learn how SnapLogic and Amazon Web Services helped Earth Networks create a responsive, self-service cloud for data integration, preparation and analytics.
Tags : 
data management, self-service clouding, data integration, data analytics, data storage
    
SnapLogic
White Paper Published By: SnapLogic     Published Date: Aug 17, 2015
This report summarizes the changes that are occurring, new and emerging patterns of data integration, as well as data integration technology that you can buy today that lives up to these new expectation
Tags : 
data integration, cloud computing, mass data storage, integration requirements, integration strategies
    
SnapLogic
White Paper Published By: SnapLogic     Published Date: Aug 17, 2015
This whitepaper addresses new elastic iPaaS requirements in detail while highlighting the importance of each.
Tags : 
elastic ipaas requirements, hybrid deployments, minimal lifecycle management, future-proofing, metadata-driven integration
    
SnapLogic
White Paper Published By: CDW     Published Date: Aug 07, 2015
Like many, you may find that you lack the time and resources to adequately extend Disaster Recovery (DR) to safeguard all aspects of your organization. As a result, gaps in DR coverage put your business at risk.
Tags : 
cloud, storage, data center, disaster recovery, database security
    
CDW
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Protect against advanced attacks.
Tags : 
threat, data, security, it management, budget
    
Vectra Networks
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Protect prominent securities.
Tags : 
firewall, intrusion detection, intrusion prevention, ips, ids
    
Vectra Networks
White Paper Published By: IBM     Published Date: Jul 31, 2015
Data breach study.
Tags : 
data, cost global, security, hacker detection, business intelligence
    
IBM
Free Offer Published By: TriNet     Published Date: Jul 28, 2015
The future of HR lies in technological advances and implementation for businesses of all sizes.
Tags : 
hr technology, hr data, technology providers, hr trends, mobility
    
TriNet
White Paper Published By: IBM     Published Date: Jul 22, 2015
Driving transformation in the healthcare industry as it navigates technological, regulatory, legislative and cultural changes.
Tags : 
it healthcare, cloud computing, cloud security, hybrid cloud, regulatory compliance
    
IBM
White Paper Published By: Simplivity     Published Date: Jul 02, 2015
SimpliVity’s solution is a great fit for today’s midmarket data center. This hyperconverged infrastructure simplifies an otherwise complex system that would require frequent maintenance and upgrades. SimpliVity offers an affordable solution that addresses major challenges of midmarket I&O teams.
Tags : 
hyperconvergence, midmarket, virtualization, deduplication, compression
    
Simplivity
Webinar Published By: CDW     Published Date: Jun 26, 2015
Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.
Tags : 
software asset management, network security, licensing, cloud-based apps, licensing security
    
CDW
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2018  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service