database protection

Results 26 - 49 of 49Sort Results By: Published Date | Title | Company Name

How Institutions Should Respond to Data Breaches

Published By: Debix     Published Date: Jun 30, 2008
Fraud preventative solutions are designed to avert new accounts fraud before it occurs. The strategic advantage of fraud prevention therefore lies in the ability avoid losses to institutions and consumers.
Tags : 
database security, pci, pci-dss, compliance, pci compliance, data protection, identity theft, hacker detection, hack, hacking, debix, intrusion detection, intrusion prevention, customer relationship management, customer service, customer experience management
    
Debix

The Definitive Guide to Account-Based Marketing

Published By: Marketo     Published Date: Jun 08, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: • How to create a solid ABM strategy to meet your goals • What stakeholders to involve across the organization • How to identify, prioritize, and profile the right accounts • What content you need to support an ABM strategy • Which channels to leverage and how to coordinate them • How to measure the effectiveness of your ABM strategy
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo

Your Enterprise Database Security Strategy 2010

Published By: IBM     Published Date: Aug 30, 2010
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
Tags : 
ibm, database security, enterprise, private data, privacy, intrusion, information security policies, auditing, monitoring, encryption, compliance, intrusion detection, intrusion prevention, policy based management
    
IBM

Meeting and Exceeding PCI 1.1 Compliance Today

Published By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : 
security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection, ebusiness, customer relationship management, software compliance, security management, security policies, secure computing, securecomputing, intrusion prevention, pci compliance
    
Secure Computing

Embracing PCI: Making It Work For You

Published By: Secure Computing     Published Date: Feb 06, 2008
With the recent rise in data breaches and identity thefts, implementing a sound information security program is no longer optional. Companies processing credit card information are encouraged to embrace and implement sound data protection strategies to protect the confidentiality and integrity of payment information. Some of the challenges for achieving PCI compliance are outlined in this white paper, as well as successful tips to help organizations navigate through them.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, intrusion prevention, pci compliance
    
Secure Computing

Lock Down Applications for PCI DSS Compliance

Published By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, tjx, security, firewalls, intrusion prevention, pci compliance
    
Secure Computing

Whitepaper: Managing Web Security in an Increasingly Challenging Threat Landscape

Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper deals with the rise of mobility, BYOD and social networking, and how these trends have led cybercriminals to exploit vulnerabilities in browsers and mobile apps. For example, more than 30,000 mostly legitimate websites become infected with malware every day. From drive-by downloads to spearfishing to XML injection, web-borne threats represent a significant new risk for businesses. The report describes how to stay on top of this changing threat landscape and prevent damaging attacks with: • 100% protection against known viruses • Industry-leading URL filtering and IP protection via the world’s largest threat database • Extended protection for smartphones and tablets • Simplified web-based management
Tags : 
web security, cybercriminals, web threats, web gateway, security, business technology
    
Webroot

The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019

Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.Download the report to learn why Forrester believes IBM Security Guardium is a good fit “for buyers seeking to centrally reduce and manage data risks across disparate database environments”.The IBM Security Guardium portfolio empowers organizations to meet critical data security needs by delivering comprehensive visibility, actionable insights and real-time controls throughout the data protection journey.
Tags : 
    
Group M_IBM Q3'19

The Definitive Guide to Account-Based Marketing

Published By: Marketo     Published Date: Jul 12, 2017
It’s an exciting, albeit challenging time for marketers—new channels, strategies, and technologies have empowered us to engage our buyers like never before. At the same time, due to the abundance of available information, buyer expectations have increased, leaving marketers to fight for their attention as we showcase our products and services. In response, organizations are implementing an account-based marketing (ABM) strategy. Account-based marketing offers organizations a significant return on investment (ROI) as they are faced with the need to acquire, retain, and grow high-value accounts. This comprehensive, 100+ page guide includes checklists, worksheets, examples, and advice from over 12 industry thought leaders to help marketers at any level, from beginners to experts, create and implement an effective account-based marketing strategy. Download The Definitive Guide to Account-Based Marketing to learn: How to create a solid ABM strategy to meet your goals What stakeholders
Tags : 
access management, security information, abm, database security, application development, risk management, endpoint management, next generation intrusion protection
    
Marketo

A Technical Overview of the Oracle Exadata Database Machine and Exadata Storage Server

Published By: Oracle Corporation     Published Date: Apr 01, 2013
Discover how to accelerate database performance, handle change and growth in scalable, incremental steps, and deliver mission-critical data availability and protection with this unique commercial solution.
Tags : 
database, oracle, storage, data, data warehousing, high availability, database development, data protection, data quality, data replication, database security
    
Oracle Corporation

Small Business Data Protection

Published By: ProStor Systems     Published Date: Mar 15, 2007
The need for protecting data is universal – whether a small to mid-size business, the largest enterprise data center, or an individual. The recognition of the value of information and the impact of data loss has reached the point where repeating it is no longer required. The issue now has turned to how to protect the data.
Tags : 
smb, archiving, backup, hardware, security, data management, database security, data protection, small business networks, prostor, prostor systems, backup and recovery
    
ProStor Systems

The Role Of SAN Security In Storage Operations Management

Published By: Creekpath     Published Date: Aug 21, 2009
An effective storage management solution must consider the role of SAN security in ensuring network and data integrity. When Direct Attached Storage (DAS) was the majority of storage, security was not an issue. By preventing access to the server you could stop access to the server-owned storage resources of disk and tape. Holes in SAN security practices can threaten data integrity and system availability.
Tags : 
storage management, som, storage operations management, direct attached storage, das, san security, high availability, data integrity, database security, data protection, backup, creekpath, security management
    
Creekpath

From Policy to Practice: A Practical Guide to Implementing HIPAA Security

Published By: PKWARE     Published Date: Aug 21, 2009
Any organization that stores or transfers health or insurance records electronically must comply with HIPAA, from health care facilities to HR departments. PKWARE offers straightforward strategies for managing protected health information.
Tags : 
compliance, hipaa compliance, hipaa, healthcare, privacy, health, health information management, him, database security, data protection, pkware, software compliance
    
PKWARE

Database Security and Regulatory Compliance within the Pharmaceutical Industry

Published By: BMC Control M     Published Date: Apr 01, 2009
Listen in as Sentrigo interviews Dr. Charles Popper, who discusses specific data integrity and security requirements for the pharma sector. Dr. Popper will address how to enforce the proper balance of information sharing and database protection, without compromising high-quality research.
Tags : 
platforms, data management, linux, sap, windows, service oriented architecture, sla, international computing
    
BMC Control M

Forrester Report: Look Beyond Native Database Auditing to Improve Security

Published By: IBM Corporation     Published Date: Jun 09, 2011
This study provides real-world findings from in-depth interviews with 15 enterprises that have implemented database auditing and real-time protection solutions.
Tags : 
ibm, guardium, database auditing, security, real-time protection, activity monitoring, enterprise application, application security, business continuity, internet security, security management, analytical applications, business intelligence, database security, infrastructure, green computing
    
IBM Corporation

Webcast: Look Beyond Native Database Auditing to Improve Security (Forrester Report)

Published By: IBM Corporation     Published Date: Jun 09, 2011
This study provides real-world findings from in-depth interviews with 15 enterprises that have implemented database auditing and real-time protection solutions.
Tags : 
ibm, guardium, database auditing, security, real-time protection, activity monitoring, enterprise application, webcast
    
IBM Corporation

The Future of Database Activity Monitoring

Published By: IBM Corporation     Published Date: Jun 09, 2011
Get a clear understanding of the ways DAM technology is being consolidated and integrated enabling security professionals and database managers to make strategic and tactical deployment decisions more effectively.
Tags : 
ibm, guardium, database activity monitoring, dam, pci-dss, data protection, hipaa
    
IBM Corporation

Satisfy That Android Sweet Tooth: Making It Work For Your Enterprise

Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM

The ABCs Of Mobile Device Management

Published By: IBM     Published Date: Apr 20, 2017
Essentials for your organization’s first MDM deployment. IBM’s security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the world’s broadest security research and development, and delivery organizations.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM

Modern, Cloud Conscious Approaches to Data Protection

Published By: Cloudian     Published Date: Feb 15, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian

Modern, Cloud Conscious Approaches to Data Protection

Published By: Cloudian     Published Date: Feb 21, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate. Object-based storage systems are now available that demonstrate these characteristics. While they have a diverse set of use cases, we see several vendors now positioning them as on-premises targets for backups. In addition, integration of object-based data protection storage with cloud storage resources is seen by these vendors as a key enabler of performance at scale, cost savings, and administrative efficiency.
Tags : 
    
Cloudian
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.