Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

Cisco brought the fifth annual Data Virtualization Day to the Waldorf Astoria in New York City to share details about advancements coming in Cisco Information Server 7.0, the advantages of data virtualization, and the importance of the network. A key component of 7.0 release of Cisco Information Server which will be shipped next month, is the Business Directory, which will support greater access to data among more users on a self-service basis.

Posted October 01, 2014

Oracle's new Zero Data Loss Recovery Appliance, unveiled by Oracle executive chairman and CTO Larry Ellison during his opening keynote, is touted as the world's first and only engineered system designed specifically for Oracle Database protection. This massively scalable appliance delivers unparalleled data protection, efficiency, and scalability.

Posted September 30, 2014

IBM and AT&T are jointly working on extending AT&T NetBond services to the SoftLayer platform to offer customers a combined security and performance solution. This alliance is intended to help enable businesses to create hybrid-computing solutions. AT&T Virtual Private Network (VPN) customers can use AT&T NetBond to connect their IT infrastructure to SoftLayer's cloud services.

Posted September 29, 2014

Oracle CTO Larry Ellison took the stage at the Moscone Center to kick off the Oracle OpenWorld conference on Sunday evening. As he does each year, Ellison outlined major announcements for the week and explained the company's technology vision to set the tone for the conference. Confirming analysts' predictions that 2014 would be the year of the cloud for Oracle, Ellison said 2014 is an inflection point for the company. Ellison's key announcement was Oracle's upgraded platform-as-a-service capability: a fourth generation upward-compatible database.

Posted September 29, 2014

In simpler times, businesses kept their data in one place. That made the data easy to access and control. Today, many large enterprises have a global component to daily business transactions, with customers, partners and employees located around the world. Given the distributed nature of an organization's users and increasing data location regulations, the traditional method of storing data on a central server to support worldwide stakeholders no longer meets business needs.

Posted September 25, 2014

A new IBM blog by Adam Jollans, Program Director, Cross-IBM Linux Strategy, IBM explains how new workload demands and greater hardware heterogeneity are placing Linux at the heart of IT innovation. Linux used to be the commodity play, doing the same for less to help improve the bottom line, Jollans notes. But today, more than ever, Linux not only offers a price advantage but is a major force fueling innovation. That is why IBM continues to vigorously support Linux.

Posted September 24, 2014

NuoDB and Guardtime have formed an alliance to eliminate the confines and issues of sharing data on a global scale. According to Guardtime, its Keyless Signature Infrastructure (KSI) provides webscale, mathematical certainty that an enterprise's infrastructure is in the correct state and alerting when it is not. NuoDB is a distributed database designed for global application deployment.

Posted September 23, 2014

Skimming the newspaper on a recent summer morning, Kevin Kline was astounded to read about Russian hackers' success in grabbing 4.5 million records by way of good, ol' fashioned SQL injection attacks. "This is like saying a bunch of robbers rummaged through 450,000 houses because none of the home owners knew about locking doors and windows. It is that serious and that elementary of a mistake," writes Kline, who outlines security steps that all developers should implement.

Posted September 10, 2014

Vormetric, Intel, and MongoDB have worked together to integrate and test a combined configuration which they say overcomes the longstanding concern that adoption of encryption technologies might reduce throughput and capacity of a database implementation. With the combined solution set, they say, not only is there no degradation in performance, but performance with encryption greatly exceeds that without encryption. "With Vormetric, MongoDB customers not only gain critical safeguards required for use of sensitive data, but incur no performance penalties due to the additional performance boost available from the optimized Intel hardware encryption, and Vormetric's kernel driver optimization," said Vijay Vijayasankar, VP of Global Channels and Business Development at MongoDB Inc.

Posted September 09, 2014

SAP SE has introduced a secure enterprise app store that allows companies to push their mobile apps into the hands of employees, business partners and consumers. The Mobile Place feature delivers apps, services and content to both managed and unmanaged mobile devices. The new Mobile Place feature is included at no additional cost with the purchase of SAP Mobile Secure portfolio.

Posted September 03, 2014

Logentries, a cloud log management and analytics service, has introduced a new solution intended to help Dev and IT Ops proactively monitor, troubleshoot and resolve production system issues in real time. "It's particularly important to not only monitor errors in your logs, but proactively recognize where there has been a shift in system behavior," said Trevor Parsons, co-founder and chief scientist for Logentries.

Posted September 02, 2014

Managing business-critical databases is no easy task even for experienced DBAs, so for IT pros who might be new to the role—and likely already wear multiple other hats within their organization—it can be a challenging endeavor to say the least. Here are the 5 key areas that IT pros who have found themselves in the position of accidental DBAs should focus on.

Posted August 27, 2014

Why do tens of thousands of Oracle customers, partners, and consultants descend on Moscone Center in San Francisco for the annual Oracle OpenWorld conference? Despite the proliferation of conferences and online events competing for attention, OpenWorld remains the single, central place for all things Oracle. Here, DBTA presents the annual Who to See @ Oracle OpenWorld special section.

Posted August 27, 2014

With the opportunities and obstacles presented by developments such as big data, cloud, and mobility, the challenges of managing and extracting value from data have never been greater. At the same time, the array of technology options for storing, protecting, integrating, enhancing and analyzing data has exploded. To help add perspective and acknowledge the products and services that have been deemed to provide unique value to customers, DBTA created this new competition. Here are the winners of the 2014 DBTA Readers' Choice Awards.

Posted August 27, 2014

Idera, a provider of application and server management solutions, has updated its SQL Compliance Manager, SQL Diagnostic Manager and SQL Safe Backup products with features that improve ease of use, efficiency and performance for database administrators. Idera has also added new support for Microsoft Hyper-V in SQL Diagnostic Manager so that customers can monitor the performance of physical and virtual server environment across both VMware and Microsoft.

Posted August 26, 2014

Improvements for mobile data management and mobile data virtualization have been added KidoZen's enterprise mobile application platform in order to simplify integration, management and security of enterprise data consumed by mobile applications.

Posted August 25, 2014

During its annual user conference in San Francisco, Couchbase launched the beta release of Couchbase Server 3.0. As part of the beta release, Couchbase is also announcing a contest - the Couchbase Server 3.0 Bug Bash.

Posted August 21, 2014

Just months after the massive data breaches of the 2013 holiday season, a newly discovered data breach is again shining a spotlight on the need for better enterprise data security and the fact that not enough is being done to secure critical customer data. The most recent headlines involve a Russian crime ring and 1.2 billion user names and passwords as well as at least 500 million email addresses. Against this backdrop, Oracle announced Oracle Key Vault, a software appliance designed to securely manage encryption keys and credential files in the enterprise data center.

Posted August 19, 2014

Oracle has released Oracle Linux 7, which provides support for emerging technologies, such as OpenStack, as well as new Linux innovations, tools, and features. "With Oracle Linux 7, users have more freedom to choose the technologies and solutions that best meet their business objectives," said Wim Coekaerts, senior vice president of Linux and Virtualization Engineering, Oracle.

Posted August 13, 2014

Caspio has released Caspio HIPAA Enterprise, a HIPAA-compliant edition of its rapid application development platform. With Caspio HIPAA Enterprise, the company aims to support the healthcare industry in leveraging cloud-based applications to improve efficiencies and streamline processes in practice management, patient engagement, and health information management within a secure and compliant environment.

Posted August 05, 2014

IBM has acquired CrossIdeas, a privately held provider of security software that governs user access to applications and data across on-premise and cloud environments. Based in Rome, Italy, CrossIdeas addresses the business requirements of auditors and risk and compliance managers withrole analytics, visualizations for better insight into user access, and alignment with compliance and access risk requirements. Financial terms were not disclosed.

Posted August 04, 2014

Data backup solutions provider STORServer has released a new guide to the backup appliance selection process. The guide offers insight on hardware and software considerations, key features, and manufacturer support criteria.

Posted August 04, 2014

Quest International Users Group (Quest) supports JD Edwards, PeopleSoft, Fusion, and many other Oracle edge application customers, and is comprised of 55,000 members in 95 countries. Throughout Oracle OpenWorld 2014, you'll find members of the Quest team speaking at various breakout sessions, hosting SIG meetings and networking with members, Oracle personnel, and other customers. We will be answering questions and sharing information on how our members use and work with their Oracle products.

Posted August 04, 2014

You're invited to connect with the Oracle Applications Users Group at Oracle OpenWorld 2014, September 28-October 2, 2014, and get the answers you need to get ahead. The OAUG is the world's largest education, networking, and advocacy forum for Oracle Applications Users. Find out how OAUG membership helps you find answers, network with real users and expert consultants, and influence Oracle. And discover why 96% of OAUG members recommend membership.

Posted August 04, 2014

Members of the Independent Oracle Users Group (IOUG), which represents the independent voice of Oracle technology and database professionals, will be out in force at OpenWorld 2014—presenting more than 40 sessions on the topics you want to learn about most.

Posted August 04, 2014

With companies drowning in data, they are encountering storage problems that are impacting the performance of critical systems and applications. What's needed are smarter approaches. Today's storage solutions are coming to the rescue, enabling greater efficiency through data compression, information lifecycle management, and tiered storage strategies. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Data Storage Solution.

Posted August 04, 2014

Data governance is growing in importance along with the recognition of the game-changing potential posed by big data. As more data is amassed within organizations, effective data governance enables them to have confidence in the quality of that data for a variety of tasks as well adhere to security and privacy standards. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Data Governance Solution.

Posted August 04, 2014

Poor quality data can mean a host of problems for companies. Incorrect data can result in duplicate entries which can make it difficult for vendors to achieve a single version of the truth, increase data storage costs, impede CRM initiatives, and create data compliance and security headaches. Data quality solutions provide the necessary data integrity for critical systems including customer relationship management, master data management, and database management. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Data Quality Solution.

Posted August 04, 2014

Effective data modeling solutions help organizations construct high quality data models, modify existing structures as well as produce detailed documentation. And today, data modeling solutions also help companies visualize and manage business data across more platforms than ever before and extend that data to users with varying job roles and skill levels across geographies and time zones. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Data Modeling Solution.

Posted August 04, 2014

Although data is increasingly being viewed as a valuable asset and progress in data security is being made, advancements are not being implemented as quickly or as vigorously as they should, according to a recent Unisphere Research survey of 322 data managers and professionals. Among the salient data points from the study are the fact that close to two-thirds of respondents indicated that the bulk of their resources go toward protecting against network intrusions although they feel a breach at the database layer would cause the greatest harm. An aggressive stance with preventive security measures, the report states, is critical. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Database Security Solution

Posted August 04, 2014

According to a recent survey of 315 data managers and professionals, SLAs are getting more demanding and application owners are struggling to keep pace. Close to one-fourth of the survey respondents have SLAs of four nines of availability or greater, meaning they require less than 52 minutes of downtime per year. Unfortunately, unplanned downtime does occur for many reasons. That's when a trusted backup solution can come to the rescue. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Database Backup Solution.

Posted August 04, 2014

Database development solutions provide the necessary support to help database development teams achieve success by avoiding the risks posed by a range of potential problems—from software bugs, to geographically dispersed development teams, to varied code standards and skill sets. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Database Development Solution.

Posted August 04, 2014

Today, organizations are looking for database administration solutions that can provide assistance with both managing routine day-to-day operations as well as provide alerts and insight when something has gone drastically wrong with mission-critical database applications. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Database Administration Solution.

Posted August 04, 2014

With modular designs that allow companies to start small and add capacity as needed, the database appliance approach, contend its advocates, allows organizations to bypass the usual hardware upgrade headaches. Along with the often mentioned advantages of fast deployment and the proverbial "one throat to choke" if a problem occurs, database appliances seek to give organizations something they desperately need today: simplicity. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Database Appliance.

Posted August 04, 2014

The consumerization of IT, coupled with online services like social media, creates a need for flexibility and performance improvements within current data centers without the associated costs. And, as the cost of flash declines, data center managers are seeing flash as an attractive alternative to traditional hard-disk methods. By some estimates, flash memory prices have fallen at an average of 35% per year over the last few years.

Posted August 04, 2014

Novetta Identity Analytics has achieved Hortonworks Certification, and Novetta has joined the Hortonworks Technology Partner Program. Novetta Identity Analytics provides a central, multi-dimensional view of the entities across the data silos and uncovers the relationships within and among those entities to support customer intimacy, churn prediction, risk profiling, fraud analysis and detection, and other use cases.

Posted August 04, 2014

Data protection and recovery software provider Arcserve has begun operations as a standalone company following the completion of the sale of the business from CA to investment firm Marlin Equity Partners.

Posted August 04, 2014

Corvil, an IT data analytics company, has introduced Corvil Giga, a new streaming analytics platform for real-time operational intelligence and big data integration. The release is targeted at companies in the financial industry and others that need to operate their business in real time.

Posted July 29, 2014

Zettaset is giving customers the option of purchasing its complete Orchestrator big data security suite or adopting individual feature applications as needed - such as enterprise data encryption and multi-service high availability - to customize and secure their big data environments.

Posted July 29, 2014

Continuity Software Launches New Channel Partner ProgramContinuity Software, a provider of service availability risk management solutions, has created a new program for channel partners, enabling them to offer the AvailabilityGuard software suite that provides high availability (HA) and disaster recoverability (DR), across physical, virtual and cloud environments.

Posted July 29, 2014

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15

Sponsors