Database Security

Database Security is the system, processes, and procedures that protect a database from unintended activity. Unintended activity can be categorized as authorized misuse, malicious attacks or inadvertent mistakes made by authorized individuals or processes. Traditionally databases have been protected from external connections by firewalls or routers on the network perimeter with the database environment existing on the internal network.
Results 1 - 25 of 378Sort Results By: Published Date | Title | Company Name
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009
Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.
Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
     Ounce Labs, an IBM Company
By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : vision, high availability, ibm, aix, cdp, core union, as/400, data protection, database security
     Vision Solutions
By: ForgeRock     Published Date: Mar 22, 2018
What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.
Tags : forgerock, consumer privacy, data security, iot, internet of things, internet security, consumer behavior, tracking data, security policies, web service security, business activity monitoring, customer interaction service, data protection, database security, collaborative commerce, customer experience management, secure content management
     ForgeRock
By: Digital Realty     Published Date: Feb 22, 2018
A new white paper from Digital Realty shows how to improve hybrid cloud computing performance and ramp up agility, security and reliability through its Service Exchange product.
Tags : digital realty, cloud computing, network performance, cloud performance, hybrid cloud, business continuity, security management, application performance management, database security
     Digital Realty
By: CoreSite     Published Date: Nov 21, 2017
In this e-book, we’ll introduce you to a solution many enterprises are adopting – direct interconnect to cloud providers within a colocation facility – and discuss the potential cost and performance advantages this option for streamlining hybrid IT connectivity can create.
Tags : coresite, cloud computing, hybrid cloud, security performance, it connectivity, infrastructure, internetworking hardware, internet security, best practices, database security, service management, colocation and web hosting
     CoreSite
By: RSA     Published Date: Sep 19, 2017
Download the white paper to learn more about GDPR and its implications for your cybersecurity strategy.
Tags : rsa, rsa security, cybersecurity, data protection, compliance, eu compliance, gdpr, internet security, security policies, web service security, best practices, data replication, database security
     RSA
By: Raritan     Published Date: Jul 26, 2017
In this eBook, we will discuss the cost and security implications of maintaining a data center and the importance of having a reliable PDU to help you achieve continuous uptime.
Tags : raritan, pdu, data center, data security, data center power, data protection, database security, power and cooling, data center design and management
     Raritan
By: Raritan     Published Date: Nov 09, 2016
This white paper addresses five key aspects of IT that are inextricably tied to computing’s physical realities.
Tags : raritan, legrand, data center, virtualization, data center power, infrastructure, backup and recovery, storage virtualization, database security, power and cooling, data center design and management
     Raritan
By: Dell EMC     Published Date: Nov 03, 2016
IT managers are struggling to keep up with the “always available” demands of the business. Data growth and the nearly ubiquitous adoption of server virtualization among mid-market and enterprise organizations are increasing the cost and complexity of storage and data availability needs. This report documents ESG Lab testing of Dell EMC Storage SC Series with a focus on the value of enhanced Live Volume support that provides always-available access with great ease of use and economics.
Tags : storage, data, sql, architecture, storage management, data integration, data protection, database security
     Dell EMC
By: HPE & Intel®     Published Date: Oct 10, 2016
What if you could reduce the cost of running Oracle databases and improve database performance at the same time? What would it mean to your enterprise and your IT operations?
Tags : database, hpe, intel, data, oracle database, database management, database development, database security, data warehousing
     HPE & Intel®
By: Oracle     Published Date: Sep 06, 2016
Innovation is the growth engine of the modern enterprise. Continuous innovation in products and services is vital to drive revenue growth, stay ahead of competitors, and meet rising customer demands.
Tags : innovation, oracle, innovation service, oracle cloud, cloud, develop, data, database security
     Oracle
By: VMware     Published Date: Aug 09, 2016
This paper shows how IT automation can help solve these data center challenges, enabling greater agility and consistency without breaking the budget.
Tags : it automation, it security, data center, it management, application security, database security
     VMware
By: Dell EMC     Published Date: Jul 05, 2016
EMC Global Data Protection Index 2016 Key Findings and Results Report
Tags : data management, business practices, data center. data application, enterprise applications, business intelligence, security, best practices, database development, data protection, database security
     Dell EMC
By: HPE     Published Date: Jun 06, 2016
This white paper presents a comprehensive guide to improving data backup and recovery, and looks at 5 key considerations for small and midsized businesses when looking at the modernization of different aspects of their production.
Tags : data, data recovery, data backup, midsized business, disaster recovery, data protection, database security
     HPE
By: MobileIron     Published Date: May 23, 2016
Managing your device keeps getting more complex and your admins are juggling more complicated security and management tasks than ever before. Until now, you have needed many complex and disparate tools to secure and manage your devices. But now Windows 10 and MobileIron make your life much simpler by streaming many traditional PC management responsibilities.
Tags : security, mobile device, windows, best practices, streaming, device management, identity management, security management, business intelligence, database security
     MobileIron
By: Riverbed     Published Date: May 19, 2016
Data protection, application performance, and business continuity are essential to staying competitive and profitable.
Tags : data, data protection, data centre, security, data security, application security, disaster recovery, security management, security policies, database development, database security
     Riverbed
By: IBM     Published Date: May 17, 2016
Is your data architecture up to the challenge of the big data era? Can it manage workload demands, handle hybrid cloud environments and keep up with performance requirements? Here are six reasons why changing your database can help you take advantage of data and analytics innovations. 
Tags : ibm, business analytics, business intelligence, data, analytics, database, database development, database security
     IBM
By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : data protection, code 42, data security, intellectual property, database security, information management, secure content management
     Code42
By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : endpoint backups, data visability, code 42, data loss, data recovery, backup and recovery, disaster recovery, data protection, database security
     Code42
By: Silver Peak     Published Date: Apr 12, 2016
This white paper reveals how with an SD-WAN, enterprises can improve the resiliency of their WAN, dynamically balance traffic across multiple paths and increase application performance.
Tags : wan, connectivity, wide area network, data, sd-wan, infrastructure, network architecture, network management, application integration, database security
     Silver Peak
By: Cisco     Published Date: Feb 16, 2016
Over the years we’ve all heard claims of simple, seemingly magical solutions to solve security problems, including the use of sandboxing technology alone to fight advanced malware and targeted threats.
Tags : technology, security, security management, malware analysis, network management, business intelligence, database security, productivity, service management
     Cisco
By: IBM     Published Date: Feb 04, 2016
Disruptors are reinventing business processes and leading their industries with digital transformations. Learn more about personalized front-line decision making, real time insight driven processes, and ecosystem-based innovation.
Tags : ibm, middleware, solutions, digital, security, cyber threats, backup and recovery, data protection, database security
     IBM
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors.
Tags : citrix, security, data, policy based management, security management, security policies, best practices, database security, collaboration
     Citrix Systems, Inc.
By: AlienVault     Published Date: Nov 10, 2015
Implement and maintain PCI DSS compliance at your organization
Tags : operations, structure, compliance, security, management, data, best practices, business intelligence, database security
     AlienVault
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers