database security

Results 101 - 125 of 169Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
McAfee
Published By: Microsoft     Published Date: Jul 20, 2018
When it comes to performance, Azure SQL Database is built for you, the developer. Azure SQL Database is designed to make your work easier and let you focus on other priorities. It scales on the fly, without downtime, with capabilities that make it great for building multitenant software as a service (SaaS) apps. Plus, it learns and adapts to your database workload, whatever that may be, using built-in intelligence to continually adjust and improve over time. That said, there’s more to a successful app than impressive performance. That’s why we built Azure SQL Database to be just as intelligent in other areas, such as availability and security, so that you won’t need to worry about those essentials either. Finally, we built Azure SQL Database to let you work the way you want, using the tools and platforms you prefer. It’s why we call Azure SQL Database the intelligent database for developers. Read on to learn more, and we’re sure you’ll agree.
Tags : 
    
Microsoft
Published By: Microsoft     Published Date: Jul 20, 2018
At its Build conference in May, Microsoft took the wraps off Cosmos DB, the new incarnation of its existing cloud-based Azure DocumentDB NoSQL database. With a nod to the dramatic, Microsoft terms Cosmos DB as its biggest database bet since SQL Server; it is positioning it as its flagship cloud database, suited for use cases ranging from security and fraud detection, to IoT (consumer and industrial), personalization, e-commerce, gaming, social networks, chats, messaging, bots, oil and gas recovery and refining, and smart utility grids. Cosmos DB is a good example of how cloud platform providers are rethinking databases for scalable, elastic environments and commodity infrastructure. The platform that is most comparable is Google Cloud Spanner, but each of these databases is engineered for different purposes: Cosmos DB as a globally distributed operational database and Spanner as a globally distributed SQL-supporting OLTP database. The highlights of Cosmos DB include its flexibility in
Tags : 
    
Microsoft
Published By: Microsoft Azure     Published Date: Apr 11, 2018
When you extend the global reach of your enterprise, you’ll find new markets for your products and services. That means reaching more potential customers, bigger growth potential, and higher ROI. But to tap into those emerging markets, you need to provide the best, most consistent user experience. Now, it’s possible for you to build, deploy, and manage modern apps at scale with a globally-distributed database—without the hassles associated with hosting in your data center. Read the e-book Build Modern Apps with Big Data at a Global Scale and learn how Azure Cosmos DB, a globally-distributed turnkey database service, is transforming the world of modern data management. Keep access to your data available, consistent, and safe—with industry-leading, enterprise-grade security and compliance. Start developing the best app experience for your users based on five well-defined consistency models: Strong: Favors data consistency. Ideal for banks, e-commerce processing, and online booking. Boun
Tags : 
    
Microsoft Azure
Published By: Microsoft Azure     Published Date: Apr 11, 2018
Developing for and in the cloud has never been more dependent on data. Flexibility, performance, security—your applications need a database architecture that matches the innovation of your ideas. Industry analyst Ovum explored how Azure Cosmos DB is positioned to be the flagship database of internet-based products and services, and concluded that Azure Cosmos DB “is the first to open up [cloud] architecture to data that is not restricted by any specific schema, and it is among the most flexible when it comes to specifying consistency.” From security and fraud detection to consumer and industrial IoT, to personalized e-commerce and social and gaming networks, to smart utilities and advanced analytics, Azure Cosmos DB is how Microsoft is structuring the database for the age of cloud. Read the full report to learn how a globally distributed, multi-model data service can support your business objectives. Fill out the short form above to download the free research paper.
Tags : 
    
Microsoft Azure
Published By: Mimecast     Published Date: Mar 13, 2017
The European Union’s General Data Protection Regulation (GDPR) is triggering a change in how organizations need to protect personal data, including data contained in email and contact databases. Regardless of your organization’s physical location, you must be in GDPR compliance for EU resident personal data by May 2018—or face dire consequences. Download the White Paper, to learn: • Why compliance requires unprecedented levels of effort if you control or process personal data • What specific security, privacy, and protection measures you need to take to comply with GDPR • How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and its associated penalties
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Apr 18, 2017
"Your Email & The EU GDPR GDPR changes how organizations need to protect personal data, including data contained in email and contact databases. Regardless of physical location, you must be in GDPR compliance for EU resident personal data by May 2018. Download the white paper to learn: - The unprecedented level of effort required for collecting and processing personal data - The specific security, privacy and protection requirements to comply with GDPR - How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and associated penalties"
Tags : 
gdpr, email, personal data, security, data protection
    
Mimecast
Published By: mindSHIFT     Published Date: Nov 29, 2007
Have you adjusted your data retention policies and electronic discovery procedures to comply with the new Federal Rules of Civil Procedure (FRCP)? Learn how email archiving can help you with these electronic discovery requirements.
Tags : 
frcp, secure content, secure data, data protection, database security, compliance, frcp compliance, data governance
    
mindSHIFT
Published By: NetApp     Published Date: Dec 15, 2014
Organizations of all kinds rely on their relational databases for both transaction processing and analytics, but many still have challenges in meeting their goals of high availability, security, and performance. Whether planning for a major upgrade of existing databases or considering a net new project, enterprise solution architects should realize that the storage capabilities will matter. NetApp’s systems, software, and services offer a number of advantages as a foundation for better operational results.
Tags : 
database, transaction processing, analytics, enterprise solution architects, storage capabilities
    
NetApp
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security
    
NetIQ
Published By: NetIQ Corporation     Published Date: Nov 18, 2006
Mandatory compliance requirements often vary or conflict. Discover the major issues and appropriate actions organizations must take today to protect the privacy of information and meet legal and contractual requirements.
Tags : 
compliance, privacy, pci, hipaa compliance, consumer privacy, customer privacy, data protection, database security
    
NetIQ Corporation
Published By: netVigilance     Published Date: Aug 21, 2009
Today's Corporate Executives are faced with an array of Data Security legislation which mandates that they be personally accountable for the protection of customer account information. Crippling penalties present a modern day 'sword of Damocles' hanging above the desks of CTOs, CIOs, CFOs and CEOs.
Tags : 
data security, data protection, privacy, compliance, hipaa, customer data, database security, regulatory compliance
    
netVigilance
Published By: Neverfail Group     Published Date: Aug 21, 2009
This white paper discusses Windows high availability, with a focus on business drivers and benefits. Cost and real-world benefits are considered the two most important elements in choosing the right high availability solution.
Tags : 
database, microsoft, ms windows, windows, application security, cost control, it spending, application performance
    
Neverfail Group
Published By: Neverfail Group     Published Date: Feb 10, 2012
By leveraging SRMXtender, you can now standardize on SRM and protect your entire server inventory, not just the subset deployed on ESX hosts. Try it NOW!
Tags : 
database, microsoft, ms windows, windows, application security, cost control, it spending, application performance
    
Neverfail Group
Published By: Neverfail Group     Published Date: Feb 10, 2012
In today's competitive and budget-sensitive world, any solution that does not provide uninterrupted availability proves an unfit guardian of an organization's most important applications.
Tags : 
database, microsoft, ms windows, windows, application security, cost control, it spending, application performance
    
Neverfail Group
Published By: Neverfail Group     Published Date: Feb 10, 2012
It should come as no surprise that eliminating end user and application downtime, through the use of availability and disaster recovery technologies, comes in at the very top of many IT agendas. Find out more. Download now
Tags : 
database, microsoft, ms windows, windows, application security, cost control, it spending, application performance
    
Neverfail Group
Published By: Okiok     Published Date: Aug 21, 2009
In this white paper, we describe the basic characteristics of DES and triple-DES and look at the security properties that a financial transaction system will want to achieve. We then look at the problems related with a migration from DES to triple-DES; enumerating and discussing several points that we suggest should be considered.
Tags : 
data encryption, encryption, finance, accounting, migration, data encryption standard, encryption standard, database security
    
Okiok
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications
    
Oracle
Published By: Oracle     Published Date: Apr 03, 2012
The 2011 IOUG Database Growth Survey, conducted in partnership with Oracle Corporation, includes input from 611 IOUG members and summarizes the survey results explore issues and solutions around managing fast-growing database environments.
Tags : 
ioug, petabyte, database, security, growth, database environments, solutions
    
Oracle
Published By: Oracle     Published Date: Apr 05, 2016
With cybercrime and security breaches sharply on the rise, protecting valuable information from cyberattacks is an ongoing challenge for companies. In this increasingly insecure world, your critical information deserves the best protection, making the database and surrounding infrastructure the best line of defense. Protect your data better through evolving your approach to data security. Learn about three key steps to reinvent the security of your surrounding infrastructure to create an information fortress by protecting your valuable data at its source.
Tags : 
information management, security, best practices, information secuirty
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
The Software in Silicon design of the SPARC M7 processor, and the recently announced SPARC S7 processor, implement memory access validation directly into the processor so that you can protect application data that resides in memory. It also includes on-chip Data Analytics Accelerator (DAX) engines that are specifically designed to accelerate analytic functions. The DAX engines make in-memory databases and applications run much faster, plus they significantly increase usable memory capacity by allowing compressed databases to be stored in memory without a performance penalty. The following Software in Silicon technologies are implemented in the SPARC S7 and M7 processors: Note: Security in Silicon encompasses both Silicon Secured Memory and cryptographic instruction acceleration, whereas SQL in Silicon includes In-Memory Query Acceleration and In-Line Decompression. Silicon Secured Memory is the first-ever end-to-end implementation of memory-access validation done in hardware. It
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle
Published By: Oracle     Published Date: Nov 21, 2018
Database Security Assessment Tool: Finding Your Weaknesses Before the Bad Guys Do
Tags : 
    
Oracle
Published By: Oracle     Published Date: May 08, 2019
Oracle DBAs Share Insights about the Future of Cloud, Security, Artificial Intelligence, and Autonomous Computing. This year, in addition to canvasing analysts, pundits, and executives for their strategic insights, Oracle is interested in the tactical views, predictions, and opinions of master DBAs, database product experts, and Oracle ACE Directors. We gathered insights about database management, security, artificial intelligence, autonomous computing, and many other topics and cover how future trends will impact DBA careers during 2019, and beyond. The Intelligent Enterprise Era. Download predictions.
Tags : 
    
Oracle
Published By: Oracle Corp.     Published Date: Oct 15, 2012
Please join Tom Kyte, of the AskTom column and Senior Technical Architect at Oracle, to learn about the threats every IT Database and Security administrator needs to be aware of. Tom will also discuss best practices for securing your databases.
Tags : 
database security, compliance, sql, it security, oracle
    
Oracle Corp.
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Resource Library