Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

Oracle has expanded its data integration portfolio with the addition of Oracle Enterprise Metadata Management, a platform to help organizations govern data across the enterprise including structured and unstructured data, and across Oracle and third-party data integration, database, and business analytics platforms. "This is the first time that we have made a comprehensive offering in the area of metadata management," said Jeff Pollock, vice president of product management for Oracle Data Integration.

Posted October 22, 2014

Oracle's new Zero Data Loss Recovery Appliance, unveiled by Oracle executive chairman and CTO Larry Ellison during his opening keynote, is touted as the world's first and only engineered system designed specifically for Oracle Database protection..

Posted October 15, 2014

To help IT organizations extend the agility provided by continuous integration into continuous delivery, VMware also unveiled a major update of VMware vRealize Operations (formerly VMware vCenterOperations Management Suite. The new VMware vRealize Code Stream enables DevOps teams to deliver frequent, reliable software releases.

Posted October 14, 2014

Dataguise, a provider of security and data governance solutions for big data, has expanded its DgSecure platform to support Hadoop in the cloud, including full support for Amazon EMR (Elastic MapReduce). Additionally, big data cloud service providers, Altiscale and Qubole, have joined Dataguise's Big Data Protection Partner Program (BDP3) to leverage DgSecure in providing comprehensive discovery, protection and visibility to sensitive data for their cloud-based Hadoop customers.

Posted October 13, 2014

IBM, which has made a billion-dollar investment to broaden the use of cognitive computing, is announcing the launch of Watson World HQ today at 51 Astor Place. IBM said it chose NYC's Silicon Alley for Watson World to tap into the ecosystem of talent and capital centered around New York University, Columbia University, CUNY and Cooper Union, as well as venture capital firms and an expanding tech startup and developer community. Starting now, Watson's cognitive services and tools will be available to all users of Bluemix, IBM's open, cloud-based platform for mobile and web app development.

Posted October 13, 2014

Oracle CTO Larry Ellison took the stage at the Moscone Center to kick off the Oracle OpenWorld conference on Sunday evening. As he does each year, Ellison outlined major announcements for the week and explained the company's technology vision to set the tone for the conference. Confirming analysts' predictions that 2014 would be the year of the cloud for Oracle, Ellison said 2014 is an inflection point for the company. Ellison's key announcement was Oracle's upgraded platform-as-a-service capability: a fourth generation upward-compatible database.

Posted October 08, 2014

EnterpriseDB, a provider of enterprise-class Postgres products and database compatibility solutions, today introduced Enterprise DB (EDB) Backup and Recovery Tool (BART), a single tool to set up, manage and automate processes for backup and recovery. The new product is intended to replace the series of complex steps and coding that Postgres users have had to deploy in order to ensure databases back up on schedule, and can be rebuilt.

Posted October 07, 2014

Cisco brought the fifth annual Data Virtualization Day to the Waldorf Astoria in New York City to share details about advancements coming in Cisco Information Server 7.0, the advantages of data virtualization, and the importance of the network. A key component of 7.0 release of Cisco Information Server which will be shipped next month, is the Business Directory, which will support greater access to data among more users on a self-service basis.

Posted October 01, 2014

IBM and AT&T are jointly working on extending AT&T NetBond services to the SoftLayer platform to offer customers a combined security and performance solution. This alliance is intended to help enable businesses to create hybrid-computing solutions. AT&T Virtual Private Network (VPN) customers can use AT&T NetBond to connect their IT infrastructure to SoftLayer's cloud services.

Posted September 29, 2014

In simpler times, businesses kept their data in one place. That made the data easy to access and control. Today, many large enterprises have a global component to daily business transactions, with customers, partners and employees located around the world. Given the distributed nature of an organization's users and increasing data location regulations, the traditional method of storing data on a central server to support worldwide stakeholders no longer meets business needs.

Posted September 25, 2014

A new IBM blog by Adam Jollans, Program Director, Cross-IBM Linux Strategy, IBM explains how new workload demands and greater hardware heterogeneity are placing Linux at the heart of IT innovation. Linux used to be the commodity play, doing the same for less to help improve the bottom line, Jollans notes. But today, more than ever, Linux not only offers a price advantage but is a major force fueling innovation. That is why IBM continues to vigorously support Linux.

Posted September 24, 2014

NuoDB and Guardtime have formed an alliance to eliminate the confines and issues of sharing data on a global scale. According to Guardtime, its Keyless Signature Infrastructure (KSI) provides webscale, mathematical certainty that an enterprise's infrastructure is in the correct state and alerting when it is not. NuoDB is a distributed database designed for global application deployment.

Posted September 23, 2014

Skimming the newspaper on a recent summer morning, Kevin Kline was astounded to read about Russian hackers' success in grabbing 4.5 million records by way of good, ol' fashioned SQL injection attacks. "This is like saying a bunch of robbers rummaged through 450,000 houses because none of the home owners knew about locking doors and windows. It is that serious and that elementary of a mistake," writes Kline, who outlines security steps that all developers should implement.

Posted September 10, 2014

Vormetric, Intel, and MongoDB have worked together to integrate and test a combined configuration which they say overcomes the longstanding concern that adoption of encryption technologies might reduce throughput and capacity of a database implementation. With the combined solution set, they say, not only is there no degradation in performance, but performance with encryption greatly exceeds that without encryption. "With Vormetric, MongoDB customers not only gain critical safeguards required for use of sensitive data, but incur no performance penalties due to the additional performance boost available from the optimized Intel hardware encryption, and Vormetric's kernel driver optimization," said Vijay Vijayasankar, VP of Global Channels and Business Development at MongoDB Inc.

Posted September 09, 2014

SAP SE has introduced a secure enterprise app store that allows companies to push their mobile apps into the hands of employees, business partners and consumers. The Mobile Place feature delivers apps, services and content to both managed and unmanaged mobile devices. The new Mobile Place feature is included at no additional cost with the purchase of SAP Mobile Secure portfolio.

Posted September 03, 2014

Logentries, a cloud log management and analytics service, has introduced a new solution intended to help Dev and IT Ops proactively monitor, troubleshoot and resolve production system issues in real time. "It's particularly important to not only monitor errors in your logs, but proactively recognize where there has been a shift in system behavior," said Trevor Parsons, co-founder and chief scientist for Logentries.

Posted September 02, 2014

Managing business-critical databases is no easy task even for experienced DBAs, so for IT pros who might be new to the role—and likely already wear multiple other hats within their organization—it can be a challenging endeavor to say the least. Here are the 5 key areas that IT pros who have found themselves in the position of accidental DBAs should focus on.

Posted August 27, 2014

Why do tens of thousands of Oracle customers, partners, and consultants descend on Moscone Center in San Francisco for the annual Oracle OpenWorld conference? Despite the proliferation of conferences and online events competing for attention, OpenWorld remains the single, central place for all things Oracle. Here, DBTA presents the annual Who to See @ Oracle OpenWorld special section.

Posted August 27, 2014

With the opportunities and obstacles presented by developments such as big data, cloud, and mobility, the challenges of managing and extracting value from data have never been greater. At the same time, the array of technology options for storing, protecting, integrating, enhancing and analyzing data has exploded. To help add perspective and acknowledge the products and services that have been deemed to provide unique value to customers, DBTA created this new competition. Here are the winners of the 2014 DBTA Readers' Choice Awards.

Posted August 27, 2014

Idera, a provider of application and server management solutions, has updated its SQL Compliance Manager, SQL Diagnostic Manager and SQL Safe Backup products with features that improve ease of use, efficiency and performance for database administrators. Idera has also added new support for Microsoft Hyper-V in SQL Diagnostic Manager so that customers can monitor the performance of physical and virtual server environment across both VMware and Microsoft.

Posted August 26, 2014

Improvements for mobile data management and mobile data virtualization have been added KidoZen's enterprise mobile application platform in order to simplify integration, management and security of enterprise data consumed by mobile applications.

Posted August 25, 2014

During its annual user conference in San Francisco, Couchbase launched the beta release of Couchbase Server 3.0. As part of the beta release, Couchbase is also announcing a contest - the Couchbase Server 3.0 Bug Bash.

Posted August 21, 2014

Just months after the massive data breaches of the 2013 holiday season, a newly discovered data breach is again shining a spotlight on the need for better enterprise data security and the fact that not enough is being done to secure critical customer data. The most recent headlines involve a Russian crime ring and 1.2 billion user names and passwords as well as at least 500 million email addresses. Against this backdrop, Oracle announced Oracle Key Vault, a software appliance designed to securely manage encryption keys and credential files in the enterprise data center.

Posted August 19, 2014

Oracle has released Oracle Linux 7, which provides support for emerging technologies, such as OpenStack, as well as new Linux innovations, tools, and features. "With Oracle Linux 7, users have more freedom to choose the technologies and solutions that best meet their business objectives," said Wim Coekaerts, senior vice president of Linux and Virtualization Engineering, Oracle.

Posted August 13, 2014

Caspio has released Caspio HIPAA Enterprise, a HIPAA-compliant edition of its rapid application development platform. With Caspio HIPAA Enterprise, the company aims to support the healthcare industry in leveraging cloud-based applications to improve efficiencies and streamline processes in practice management, patient engagement, and health information management within a secure and compliant environment.

Posted August 05, 2014

IBM has acquired CrossIdeas, a privately held provider of security software that governs user access to applications and data across on-premise and cloud environments. Based in Rome, Italy, CrossIdeas addresses the business requirements of auditors and risk and compliance managers withrole analytics, visualizations for better insight into user access, and alignment with compliance and access risk requirements. Financial terms were not disclosed.

Posted August 04, 2014

Data backup solutions provider STORServer has released a new guide to the backup appliance selection process. The guide offers insight on hardware and software considerations, key features, and manufacturer support criteria.

Posted August 04, 2014

Quest International Users Group (Quest) supports JD Edwards, PeopleSoft, Fusion, and many other Oracle edge application customers, and is comprised of 55,000 members in 95 countries. Throughout Oracle OpenWorld 2014, you'll find members of the Quest team speaking at various breakout sessions, hosting SIG meetings and networking with members, Oracle personnel, and other customers. We will be answering questions and sharing information on how our members use and work with their Oracle products.

Posted August 04, 2014

You're invited to connect with the Oracle Applications Users Group at Oracle OpenWorld 2014, September 28-October 2, 2014, and get the answers you need to get ahead. The OAUG is the world's largest education, networking, and advocacy forum for Oracle Applications Users. Find out how OAUG membership helps you find answers, network with real users and expert consultants, and influence Oracle. And discover why 96% of OAUG members recommend membership.

Posted August 04, 2014

Members of the Independent Oracle Users Group (IOUG), which represents the independent voice of Oracle technology and database professionals, will be out in force at OpenWorld 2014—presenting more than 40 sessions on the topics you want to learn about most.

Posted August 04, 2014

With companies drowning in data, they are encountering storage problems that are impacting the performance of critical systems and applications. What's needed are smarter approaches. Today's storage solutions are coming to the rescue, enabling greater efficiency through data compression, information lifecycle management, and tiered storage strategies. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Data Storage Solution.

Posted August 04, 2014

Data governance is growing in importance along with the recognition of the game-changing potential posed by big data. As more data is amassed within organizations, effective data governance enables them to have confidence in the quality of that data for a variety of tasks as well adhere to security and privacy standards. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Data Governance Solution.

Posted August 04, 2014

Poor quality data can mean a host of problems for companies. Incorrect data can result in duplicate entries which can make it difficult for vendors to achieve a single version of the truth, increase data storage costs, impede CRM initiatives, and create data compliance and security headaches. Data quality solutions provide the necessary data integrity for critical systems including customer relationship management, master data management, and database management. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Data Quality Solution.

Posted August 04, 2014

Effective data modeling solutions help organizations construct high quality data models, modify existing structures as well as produce detailed documentation. And today, data modeling solutions also help companies visualize and manage business data across more platforms than ever before and extend that data to users with varying job roles and skill levels across geographies and time zones. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Data Modeling Solution.

Posted August 04, 2014

Although data is increasingly being viewed as a valuable asset and progress in data security is being made, advancements are not being implemented as quickly or as vigorously as they should, according to a recent Unisphere Research survey of 322 data managers and professionals. Among the salient data points from the study are the fact that close to two-thirds of respondents indicated that the bulk of their resources go toward protecting against network intrusions although they feel a breach at the database layer would cause the greatest harm. An aggressive stance with preventive security measures, the report states, is critical. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Database Security Solution

Posted August 04, 2014

According to a recent survey of 315 data managers and professionals, SLAs are getting more demanding and application owners are struggling to keep pace. Close to one-fourth of the survey respondents have SLAs of four nines of availability or greater, meaning they require less than 52 minutes of downtime per year. Unfortunately, unplanned downtime does occur for many reasons. That's when a trusted backup solution can come to the rescue. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Database Backup Solution.

Posted August 04, 2014

Database development solutions provide the necessary support to help database development teams achieve success by avoiding the risks posed by a range of potential problems—from software bugs, to geographically dispersed development teams, to varied code standards and skill sets. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Database Development Solution.

Posted August 04, 2014

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15

Sponsors