Data Base Security Reports

Computer Weekly – 26 March 2019: A 'stunning victory' in Post Office Horizon trial
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we report on the latest news from the court case about the controversial Post Office Horizon IT system. IT leaders share their views on creating a strategy for the digital age. And the CIO of Halfords talks about cloud, data analytics and emerging technologies. Read the issue now.
Posted: 08 Feb 2021 | Published: 26 Mar 2019

TechTarget ComputerWeekly.com

How To Build A Micro-segmentation Strategy
sponsored by Illumio
WHITE PAPER: Download this white paper to learn how to build an effective micro-segmentation strategy including identifying high-value assets, mapping your application dependencies and enrich with vulnerability data, understanding the types of segmentation for security, and more.
Posted: 28 Dec 2021 | Published: 04 Mar 2021

Illumio

MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE: In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022

MicroScope

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

Expert tips and considerations for database appliances
sponsored by Delphix
EGUIDE: This e-guide from SearchCIO.com takes a look at one organization's quest to find the right database appliance that suited their needs. Read now for an in-depth analysis of current database appliance offerings, as well as relevant considerations for database security.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

Delphix

Implementing Database Security and Auditing - Authentication and Password Security
sponsored by IBM
EBOOK: In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.
Posted: 17 May 2011 | Published: 17 May 2011

IBM

Navigating VMware and Cloud Backups
sponsored by Clumio
EGUIDE: VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.
Posted: 31 Jan 2020 | Published: 29 Jan 2020

Clumio

Presentation Transcript: New Releases from Intel and IBM offer Breakthrough Database Performance
sponsored by Intel and IBM
PRESENTATION TRANSCRIPT: Read this presentation transcript now and learn about these advances that are possible by combining the Intel Xeon processor E5-2600 product family with IBM DB2 10 for Linux, Unix and Windows.
Posted: 30 Apr 2012 | Published: 17 Apr 2012

Intel and IBM

Ponemon Study: 2011 Cost of a Data Breach
sponsored by Symantec Corporation
WHITE PAPER: This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Posted: 25 May 2012 | Published: 31 Mar 2012

Symantec Corporation

SQL Safe Backup: Automate Backups Safely, and Faster
sponsored by Idera
SOFTWARE DOWNLOAD: Eliminate application downtime, automate SQL Server backup, and speed up processes. Learn about the key features of SQL Safe Backup and gain full access to a 14 day free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera