Database Administration Security Reports

Data protection: Not just about personal data and compliance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 08 Feb 2021 | Published: 18 Apr 2017

TechTarget ComputerWeekly.com

Oracle - Autonomous computing that declines a special name
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, follow Oracle's twin paths to adding AI and delivering software over the cloud – on its own platform and infrastructure as a service, from 2017 to 2018. An over-arching theme of Oracle's case regarding its infusion of machine learning and its declared re-architecting of its cloud delivery has been security, security, security.
Posted: 08 Feb 2021 | Published: 16 Nov 2018

TechTarget ComputerWeekly.com

MicroScope – February 2022: Spotting the hidden security dangers
sponsored by MicroScope
EZINE: In this security-focused issue, we take a closer look at the threats and security trends experts expect to increase and pop up over the course of 2022. Also read how proposed government regulations could spell eye-watering fines for MSPs, and how being green could be more difficult than anticipate
Posted: 03 Feb 2022 | Published: 04 Feb 2022

MicroScope

IOUG 2011 Survey: The Petabyte Challenge: 2011 IOUG Database Growth Survey
sponsored by Oracle Corporation
WHITE PAPER: More than 300 database and information security professionals were recently surveyed on their data security practices. The results were disturbing with 60% saying that a data breach is likely over the next 12 months. Download this complimentary copy of the 2011 IOUG Data Security Survey Report and see how your organization measures up.
Posted: 10 Apr 2012 | Published: 06 Oct 2011

Oracle Corporation

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

E-Guide: Database audit trail and compliance, database audit tools: auditing methods, configurations and filtering options
sponsored by IBM
EGUIDE: Creating audit trails for security and compliance auditing is a daunting and time consuming task for database administrators. This expert e-guide provides database security best practices for tuning auditing tools and sheds some light on how to find an auditing process that best suits your organization.
Posted: 20 May 2011 | Published: 20 May 2011

IBM

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Comparing IBM Informix and Oracle Database for High Availability and Data Replication, an ITG Management Report
sponsored by IBM
WHITE PAPER: In this report, get an in-depth comparison between Oracle Databases and Real Application Clusters (RAC) and IBM Informix with regards to high availability and data replication.
Posted: 02 May 2014 | Published: 31 Jan 2014

IBM

AWS Lowers Cost Barriers for SAP HANA and Database Migrations to the Cloud
sponsored by UXC Oxygen and Amazon Web Services
EGUIDE: Although SAP deployments are currently dominated by appliances, more companies are tapping the cloud. But is cloud deployment a smart decision for you? Download now to weigh SAP HANA on-premises options against their cloud offerings. Also, discover how AWS' new tools will lower cost barriers for database cloud migrations.
Posted: 28 Oct 2016 | Published: 27 Oct 2016

UXC Oxygen and Amazon Web Services

Protect citizen data with IBM Rational software
sponsored by IBM
WHITE PAPER: Digital and connected government information improves processes and makes accessibility simple for public sector agencies. This white paper outlines how agencies can keep their information available without risking sensitive data.
Posted: 24 Jul 2012 | Published: 24 Jul 2012

IBM