Data Base Security Reports

Top Five Reasons Why Customers Deploy Microsoft SQL Server on EMC VNX Unified Storage
sponsored by EMC Corporation
WHITE PAPER: Top five reasons why customers deploy Microsoft SQL Server on EMC VNX Unified Storage.
Posted: 14 May 2012 | Published: 14 May 2012

EMC Corporation

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Employing IBM Database Encryption Expert to meet encryption and access control requirements for the Payment Card Industry Data Security Standards (PCI DSS)
sponsored by IBM
WHITE PAPER: This white paper explores the challenges of compliance with PCI and how organizations must take a holistic approach to protecting and securing their business-critical information.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

IBM

Expert tips and considerations for database appliances
sponsored by Delphix
EGUIDE: This e-guide from SearchCIO.com takes a look at one organization's quest to find the right database appliance that suited their needs. Read now for an in-depth analysis of current database appliance offerings, as well as relevant considerations for database security.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

Delphix

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

Case Study: CIO interview - Stephen Docherty on NHS data sharing
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why
Posted: 03 Jul 2020 | Published: 03 Jul 2020

TechTarget ComputerWeekly.com

Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER: This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008

Imperva.

Is your data as well protected as it should be?
sponsored by Informatica
WHITE PAPER: Read this exclusive white paper now to discover the big data security tool capable of significantly reducing the risk of a data breach, while helping organizations comply with data regulations and policies.
Posted: 07 May 2014 | Published: 30 Nov 2012

Informatica

SearchSecurity.com E-Guide: 5 Simple Steps to Secure Database Development
sponsored by IBM
EGUIDE: Databases and the information they hold are always an attractive target for hackers looking to exploit weaknesses in database applications. This expert e-guide explains the 5 most common database-related vulnerabilities and offers technical advice on how to avoid them.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

Discover What’s New in Oracle Data Integrator and Oracle GoldenGate
sponsored by Oracle Corporation
WEBCAST: Join Oracle data integration experts as they discuss the new versions of Oracle Data Integrator and Oracle GoldenGate.
Posted: 18 Aug 2011 | Premiered: Aug 18, 2011

Oracle Corporation