Database Security White Papers

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 1 - 25 of 381Sort Results By: Published Date | Title | Company Name
By: ForgeRock     Published Date: Mar 22, 2018

What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.

Tags : forgerock, consumer privacy, data security, iot, internet of things, internet security, consumer behavior, tracking data, security policies, web service security, business activity monitoring, customer interaction service, data protection, database security, collaborative commerce, customer experience management, secure content management, business technology
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009

Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.

Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
By: Vision Solutions     Published Date: Feb 18, 2008

Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.

Tags : vision, high availability, ibm, aix, cdp, core union, as/400, data protection, database security
By: Digital Realty     Published Date: Feb 22, 2018

A new white paper from Digital Realty shows how to improve hybrid cloud computing performance and ramp up agility, security and reliability through its Service Exchange product.

Tags : digital realty, cloud computing, network performance, cloud performance, hybrid cloud, business continuity, security management, application performance management, database security
By: CoreSite     Published Date: Nov 21, 2017

In this e-book, we’ll introduce you to a solution many enterprises are adopting – direct interconnect to cloud providers within a colocation facility – and discuss the potential cost and performance advantages this option for streamlining hybrid IT connectivity can create.

Tags : coresite, cloud computing, hybrid cloud, security performance, it connectivity, infrastructure, internetworking hardware, internet security, best practices, database security, service management, colocation and web hosting
By: RSA     Published Date: Sep 19, 2017

Download the white paper to learn more about GDPR and its implications for your cybersecurity strategy.

Tags : rsa, rsa security, cybersecurity, data protection, compliance, eu compliance, gdpr, internet security, security policies, web service security, best practices, data replication, database security, business technology, data loss prevention
By: Raritan     Published Date: Jul 26, 2017

In this eBook, we will discuss the cost and security implications of maintaining a data center and the importance of having a reliable PDU to help you achieve continuous uptime.

Tags : raritan, pdu, data center, data security, data center power, data protection, database security, power and cooling, data center design and management
By: Kaspersky     Published Date: Feb 06, 2017

As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.

Tags : ransomware, malware, encryption, cyberthreat, hacker detection, intrusion prevention, mobile data systems, smart phones, wireless security, data protection, database security
By: Kaspersky     Published Date: Feb 06, 2017

The total amount of damage caused by cryptomalware can be divided into two parts: the ransom and the related losses. Drawing from our survey of over 4,000 small- and medium-sized companies conducted by Kaspersky Lab and B2B International, we take a closer look at the numbers behind the damage.

Tags : cryptor, ransomware, malware, encryption, business security, cyberthreat, cyberattack, hacker detection, intrusion prevention, data protection, database security
By: Raritan     Published Date: Nov 09, 2016

This white paper addresses five key aspects of IT that are inextricably tied to computing’s physical realities.

Tags : raritan, legrand, data center, virtualization, data center power, infrastructure, backup and recovery, storage virtualization, database security, power and cooling, data center design and management, cloud computing
By: Dell EMC     Published Date: Nov 03, 2016

IT managers are struggling to keep up with the “always available” demands of the business. Data growth and the nearly ubiquitous adoption of server virtualization among mid-market and enterprise organizations are increasing the cost and complexity of storage and data availability needs. This report documents ESG Lab testing of Dell EMC Storage SC Series with a focus on the value of enhanced Live Volume support that provides always-available access with great ease of use and economics.

Tags : storage, data, sql, architecture, storage management, data integration, data protection, database security
By: HPE & Intel®     Published Date: Oct 10, 2016

What if you could reduce the cost of running Oracle databases and improve database performance at the same time? What would it mean to your enterprise and your IT operations?

Tags : database, hpe, intel, data, oracle database, database management, database development, database security, data warehousing, big data
By: Oracle     Published Date: Sep 06, 2016

Innovation is the growth engine of the modern enterprise. Continuous innovation in products and services is vital to drive revenue growth, stay ahead of competitors, and meet rising customer demands.

Tags : innovation, oracle, innovation service, oracle cloud, cloud, develop, data, database security, virtualization, cloud computing, infrastructure
By: Dell EMC     Published Date: Jul 05, 2016

EMC Global Data Protection Index 2016 Key Findings and Results Report

Tags : data management, business practices, data center. data application, enterprise applications, business intelligence, security, best practices, database development, data protection, database security
By: HPE     Published Date: Jun 06, 2016

This white paper presents a comprehensive guide to improving data backup and recovery, and looks at 5 key considerations for small and midsized businesses when looking at the modernization of different aspects of their production.

Tags : data, data recovery, data backup, midsized business, disaster recovery, data protection, database security, infrastructure, data loss prevention
By: MobileIron     Published Date: May 23, 2016

Managing your device keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron make your life much simpler by streaming many traditional PC management responsibilities.

Tags : security, mobile device, windows, best practices, streaming, device management, identity management, security management, business intelligence, database security, mobile device management
By: Riverbed     Published Date: May 19, 2016

Data protection, application performance, and business continuity are essential to staying competitive and profitable.

Tags : data, data protection, data centre, security, data security, application security, disaster recovery, security management, security policies, database development, database security, data loss prevention
By: IBM     Published Date: May 17, 2016

Is your data architecture up to the challenge of the big data era? Can it manage workload demands, handle hybrid cloud environments and keep up with performance requirements? Here are six reasons why changing your database can help you take advantage of data and analytics innovations. 

Tags : ibm, business analytics, business intelligence, data, analytics, database, database development, database security, big data
By: Code42     Published Date: Apr 22, 2016

Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.

Tags : data protection, code 42, data security, intellectual property, database security, information management, secure content management, legal issues
By: Code42     Published Date: Apr 22, 2016

Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.

Tags : endpoint backups, data visability, code 42, data loss, data recovery, backup and recovery, disaster recovery, data protection, database security, data loss prevention
By: Silver Peak     Published Date: Apr 12, 2016

This white paper reveals how with an SD-WAN, enterprises can improve the resiliency of their WAN, dynamically balance traffic across multiple paths and increase application performance.

Tags : wan, connectivity, wide area network, data, sd-wan, infrastructure, network architecture, network management, application integration, database security
By: Cisco     Published Date: Feb 16, 2016

Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats.

Tags : technology, security, security management, malware analysis, network management, business intelligence, database security, productivity, service management
By: IBM     Published Date: Feb 04, 2016

Disruptors are reinventing business processes and leading their industries with digital transformations. Learn more about personalized front-line decision making, real time insight driven processes, and ecosystem-based innovation.

Tags : ibm, middleware, solutions, digital, security, cyber threats, backup and recovery, data protection, database security, business technology
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors.

Tags : citrix, security, data, policy based management, security management, security policies, best practices, database security, collaboration
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End