Database Administration Security Reports

IBM DB2 Webcast Series for Oracle Professionals
sponsored by IBM
WEBCAST: Due to PL/SQL and a range of other compatibilty features, Oracle applications are much more easily enabled for DB2.  Use this short webcast to get level-set on terms.  Part of a series, this short webcast replay is an overview of DB2 terms and terminology for those most familiar with the Oracle environment.
Posted: 30 Aug 2011 | Premiered: Aug 30, 2011

IBM

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky

Oracle Database 11g Release 2 High Availability
sponsored by Oracle Corporation
WHITE PAPER: This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
Posted: 12 Mar 2012 | Published: 31 Oct 2010

Oracle Corporation

Top Five Reasons Why Customers Deploy Microsoft SQL Server on EMC VNX Unified Storage
sponsored by EMC Corporation
WHITE PAPER: Top five reasons why customers deploy Microsoft SQL Server on EMC VNX Unified Storage.
Posted: 14 May 2012 | Published: 14 May 2012

EMC Corporation

SearchStorage eGuide: A smarter approach to data protection: 4 best practices
sponsored by IBM
EGUIDE: There's a big difference between backup and business continuity. When it comes to protecting business critical information, the digital era has brought with it exposure to more threats from more directions than ever before. Download this SearchStorage.com E-Guide to learn all about protecting the use of information and data files.
Posted: 12 May 2011 | Published: 12 May 2011

IBM

GDPR: The Race is on for Compliance
sponsored by Dell SecureWorks
EGUIDE: Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.
Posted: 19 Jun 2017 | Published: 14 Jun 2017

Dell SecureWorks

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Implementing Database Security and Auditing - Authentication and Password Security
sponsored by IBM
EBOOK: In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.
Posted: 17 May 2011 | Published: 17 May 2011

IBM

Presentation Transcript: Disaster Recovery Planning and Security for the IT Industry
sponsored by IBM
PRESENTATION TRANSCRIPT: The biggest security issues are the ones that you don’t know about – and the reality is many businesses don’t truly know where they stand. Check out this presentation transcript from a SearchDisasterRecovery.com webcast to learn about today’s biggest security concerns and best practices for protecting your IT center.
Posted: 17 May 2011 | Published: 17 May 2011

IBM

Controlling Risk Through Software Code Governance
sponsored by Coverity by Synopsys
WHITE PAPER: Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain.
Posted: 27 Jul 2011 | Published: 26 Jul 2011

Coverity by Synopsys