Database Administration Security White Papers

(View All Report Types)
Thinking strategically about mobility and enterprise data
sponsored by AppSense
WHITE PAPER: IT professionals face new governance challenges as a result of the transformation of enterprise computing. The demand for mobile productivity is constantly growing, and IT leaders need to find solutions for mobility without sacrificing efficiency or governance.
Posted: 09 Jul 2012 | Published: 09 Jul 2012

AppSense

An Objective Approach to Security
sponsored by Bytware, Inc.
WHITE PAPER: i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this...
Posted: 10 Sep 2007 | Published: 01 May 2007

Bytware, Inc.

Creating SANLess Microsoft SQL Server Failover Cluster Instances with SIOS DataKeeper Cluster Edition and Fusion-io
sponsored by SIOS Technology Corp
WHITE PAPER: Deploying a failover cluster instance (FCI) architecture for your SQL Server database requires expensive shared storage for data files and backups. This resource introduces an alternative to storage area networks (SANs) that provides the availability benefit of an FCI – without the high price tag.
Posted: 11 Feb 2014 | Published: 31 Dec 2013

SIOS Technology Corp

Reducing PCI DSS Scope: The Gateway Approach
sponsored by Intel
WHITE PAPER: This White Paper discusses how Intel SOA Expressway security gateway-generated tokens can replace card numbers with surrogates, removing systems from scope.
Posted: 04 Apr 2011 | Published: 31 Mar 2011

Intel

IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012

Rapid7

Tripwire Enterprise Datasheet
sponsored by Tripwire, Inc.
WHITE PAPER: Unauthorized change is the most significant threat to an IT organization's ability to improve availability, security and compliance. That's why thousands of organizations worldwide use Tripwire® Enterprise as their configuration audit and control sol
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Tripwire, Inc.

Achieving High Oracle Performance
sponsored by Dell Software
WHITE PAPER: DBAs cannot afford to rely on reactive measures anymore. They need advanced performance management tools that will enable them to catch emerging issues before they can affect end users. Discover how advanced database management can help DBAs protect the system by preventing problems from developing at all. Download the white paper to learn more.
Posted: 07 May 2014 | Published: 19 Aug 2013

Dell Software

BMC Software Hybrid Copy Techniques
sponsored by BMC Software, Inc.
WHITE PAPER: Because organizations are demanding 24x7 availability from their IMS, DB2®, and VSAM applications, it is imperative that those applications do not experience outages. Read this white paper to find out how BMC's Hybrid Copy techniques help for faster system recovery in the event of a local outage.
Posted: 17 Apr 2009 | Published: 17 Apr 2009

BMC Software, Inc.

How Red Hat Delivers a Secure Enterprise Platform for Next-Generation DataCenters
sponsored by Red Hat
WHITE PAPER: This whitepaper will introduce you to the key differentiators that set Red Hat Enterprise Linux apart in regards to security for next-generation datacenters. Read on to learn more.
Posted: 04 Sep 2013 | Published: 04 Sep 2013

Red Hat