Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

For decades, data management was part of a clear and well-defined mission in organizations. Data was generated from transaction systems, then managed, stored, and secured within relational database management systems, with reports built and delivered to business decision makers' specs. In 2015, we will see the acceleration of 7 dramatic shifts in data management.

Posted January 23, 2015

There's good news and bad news on the cybersecurity front, an IBM study finds. Over the past 2 years, there has been a 50% decline in the number of cyberattacks against U.S. retailers. However, the number of records stolen from them remains at near record highs. IBM security researchers report that in 2014, cyber attackers still managed to steal more than 61 million records from retailers despite the decline in attacks, demonstrating cyber criminals' increasing sophistication and efficiency. Ironically, while Black Friday and Cyber Monday were identified as the two biggest shopping days of the year by IBM's Digital Analytics Benchmark, cyber attackers reduced their activity across all industries on Black Friday and Cyber Monday, rather than taking action.

Posted January 21, 2015

Registration is now open for Data Summit 2015, providing the opportunity to connect with the best minds in the industry, learn what works, and chart your course forward in an increasingly data-driven world. The event is designed to offer a comprehensive educational experience designed to guide attendees through the key issues in data management and analysis today.

Posted January 21, 2015

In 2014, we continued to watch big data enable all things "big" about data and its business analytics capabilities. We also saw the emergence (and early acceptance) of Hadoop Version 2 as a data operating platform, with cornerstones of YARN (Yet Another Resource Negotiator) and HDFS (Hadoop Distributed File System). In 2015, the mainstream adoption with enterprise data strategies and acceptance of the data lake will continue as data management and governance practices provide further clarity. The cautionary tale of 2014 to ensure business outcomes drive big data adoption, rather than the hype of previous years, will likewise continue.

Posted January 21, 2015

During a live event, Larry Ellison, Oracle's executive chairman of the board and CTO, outlined a new strategy for reducing customer costs and increasing value with ithe company's next generation of engineered systems. In the presentation today, Ellison emphasized two key points.

Posted January 21, 2015

As the cloud becomes more central to data storage and information exchange than ever before, the enterprise risk to the security of that data is also escalating. To help organizations adopt software-as-a-service offerings, Protegrity, a provider of data security solutions, is addressing cloud security with the introduction of the Protegrity Cloud Gateway.

Posted January 21, 2015

IBM released its z13 box, configured to tackle the challenges of the growing mobile app and cloud economy. Yet, much of the world - even the IT trade press - greeted the announcement with the same reaction it has delivering for the past 20 years - that is, surprise that the mainframe is still such a commanding presence.

Posted January 20, 2015

CloudLink Technologies, a provider of cloud security and data encryption management solutions has added CloudLink SecureVM support for Microsoft Azure Key Vault, a cloud-hosted HSM-backed service for managing cryptographic keys and other secrets used in your cloud applications. According to the companies, with this solution, the cloud provider is responsible for key generation and storage. The customer, as the data owner, controls the security policy that regulates encryption key access and use.

Posted January 20, 2015

Continuity Software has achieved Gold Partner status in the Oracle PartnerNetwork (OPN). "As a Gold level member of OPN, Continuity Software is able to help our customers benefit from solutions that are Oracle-ready and optimized," said Doron Pinhas, CTO Continuity Software.

Posted January 20, 2015

The manageability track at COLLABORATE 15 - IOUG Forum is designed to provide DBAs of every experience level and industry with the knowledge set to streamline IT management processes at their organization and accelerate their transformation to cloud.

Posted January 14, 2015

Oracle has introduced its latest-generation NAS storage system, the Oracle ZFS Storage ZS4-4. A plug-in for Oracle Enterprise Manager enables monitoring and provisioning at the share, LUN or project level for all Oracle ZFS Storage Appliance models for end-to-end management visibility across the enterprise. "We have plugged in our analytics into Oracle Enterprise Manager to allow you to have that comprehensive view," said Oracle executive vice president John Fowler during a recent webcast.

Posted January 14, 2015

For the 22nd consecutive year, IBM topped the annual list of U.S. patent recipients. The company just announced that it received a record 7,534 patents in 2014, and that on average, IBM inventors earned more than 20 patents a day. After IBM, the next top patent earner in 2014 was Samsung with 4,952. During IBM's 22 years at the top of the patent list, IBM inventors have received more than 81,500 U.S. patents.

Posted January 12, 2015

HP, a member of the Oracle Partner Network (OPN), has introduced HP Digital Customer Experience services for Oracle to help companies plan, build and manage customer experience business solutions for more personalized, consistent interaction with their customers across store, web, mobile and social channels. "Consumers increasingly associate their digital experience with a company's overall brand and reputation, making it even more important to exceed their service expectations and rise above the competition," observed Robert Hildenbrand, vice president, worldwide Oracle Applications Services, HP Enterprise Services.

Posted January 07, 2015

The Sony hack not only sidelined a major film, "The Interview," but it is beginning to look as if the data breach may be worthy of a Hollywood movie itself. The incident which exposed sensitive company and employee data has drawn widespread scrutiny on how it happened as well as how it has been handled. The still-unfolding events are placing a renewed focus on the importance of enterprise data security and what must be done to ensure it.

Posted January 07, 2015

In 2014, the big data drumbeat continued to pound, major DBMS vendors expanded their product offerings, Microsoft hired a new CEO, and a range of new technology offerings were introduced. In retrospect, what stands out?

Posted January 07, 2015

As analytics continues to play a larger role in the enterprise, the need to leverage and protect the data looms larger. According to the IDC, the big data and analytics market will reach $125 billion worldwide in 2015. Here are 10 predictions from industry experts about the data and analytics in 2015.

Posted December 19, 2014

Data is increasingly being recognized as a rich resource flowing through organizations from a continually growing range of sources. But to realize its full potential, this data must be accessed by an array of users to support both real-time decision making and historical analysis, integrated with other information, and still kept safe from hackers and others with malicious intent. Fortunately, leading vendors are developing products and services to help. Here, DBTA presents the list of Trend-Setting Products in Data and Information Management for 2015.

Posted December 17, 2014

2014 has been described as the year of the data breach. But 2015 will be the year of the regulator, says Suni Munshani, CEO of Protegrity, a provider of data security solutions. According to the Identity Theft Resource Center, there were 708 breaches that took place in the past year, grabbing headlines and sending warnings to retailers to prepare for the 2014 holiday shopping season that is now in full swing.

Posted December 15, 2014

Big data continues to have an impact on business, government, and society at large. Here's a look back at 10 noteworthy blog posts from 2014. These blog posts explore the benefits and downsides of advancements in big data technologies.

Posted December 15, 2014

Luminex Software, Inc. has introduced a new line of mainframe virtual tape products, which it calls virtual tape vaults. Luminex's new MVT Vault is designed to store second or third copies of virtual tape data out-of-region for data protection.

Posted December 08, 2014

There is still time to submit a speaking proposal for DBTA's Data Summit 2015, which will take place at the New York Hilton Midtown, May 11-13, 2015.

Posted December 08, 2014

Delayed durability offers something that many SQL Server professionals have wanted for years—the ability to disable transaction logging. Why turn off the transaction log? You can accelerate performance in a lot of situations where you do NOT need transactional consistency.

Posted December 03, 2014

Lock contention issues can be frustrating problems to investigate and debug. Before blaming the database system (as is the usual response), there are a few questions to consider that can help identify the cause of the locking problems.

Posted December 03, 2014

Cloud solutions are rapidly expanding, and consumers and businesses are being offered these solutions at almost every turn. This reality is bringing to light one of the major concerns about cloud: IT security/privacy. It seems we are hearing about breaches into server systems, leaks in social media networks, industrial espionage, and other security incidents almost on a daily basis. So the cloud can't be secure, right?

Posted December 03, 2014

To help IT and business stakeholders take action to benefit from the emerging technologies and trends in information management, Database Trends and Applications has just published the second annual Big Data Sourcebook, a free resource.

Posted November 25, 2014

A set of consulting and managed security service solutions from Big Iron Solutions is intended to enable organizations to rapidly identify, secure and monitor credit card data in order to meet PCI-DSS requirements. To date, many mainframe computer systems have not been meeting these requirements, according the company which states that this failure is due mainly to the fact that adequate technology, processes and effective standardized security practices have not existed on the mainframe.

Posted November 24, 2014

Bradmark Technologies, a provider of database management solutions and a reseller of SAP database and solutions, has expanded its North American reseller agreement with SAP. Bradmark has now also become an SAP channel partner authorized to resell SAP database products in the United Kingdom. Under this agreement, Bradmark will offer SAP Adaptive Server Enterprise (SAP ASE), SAP IQ database software, SAP Replication Server, and the SAP HANA platform to its existing customers and prospects through its direct sales force and marketing campaigns in the North America and the UK.

Posted November 20, 2014

SAP partner Wharfedale Technologies Inc. (WFT), a professional IT services consulting firm specializing in cloud system infrastructure integration and operational management services for enterprise customers, has announced new implementation services for high-availability and disaster-recovery capabilities for SAP HANA tailored data center integration.

Posted November 20, 2014

The call for speakers for Data Summit 2015 at the New York Hilton Midtown, May 11-13, 2015, is now officially open. The deadline for submitting proposals is December 5, 2014.

Posted November 19, 2014

The increasing pressure of compliance regulations and security policies makes the deployment of high-level database protection a must-have for any organization. For those looking for ways to advance database security, here are 5 SQL Server best practices to maintain database security and streamline compliance.

Posted November 12, 2014

IBM has built an "intelligent security portfolio" intended to protect data and applications in the cloud. Designed to be used with different users, whether it be a developer or line-of-business executive, the portfolio also includes analytics and security intelligence for public cloud services such as IBM's SoftLayer. In addition, the offering features IBM's Managed Security Services platform, which can help secure the cloud for IBM clients as well as clients of companies like Amazon Web Services and Salesforce.com.

Posted November 11, 2014

Big data and analytics workloads are placing greater demands on the enterprise, and creating the need for software defined infrastructure, says Bernie Spang, VP, Strategy, software-defined environments in IBM Systems & Technology Group. With the volume of data organizations are dealing with today, there is a need to optimize the compute and storage resources. "We can't do it with the traditional, manual, rigid IT environment of the past," said Spang.

Posted November 10, 2014

A new IOUG report, "DBA-Security Superhero, 2014 IOUG Enterprise Data Security Survey," makes the case that database security has risen to a top business challenge and now is the time for DBAs to take on a leadership role along with security professionals to enforce data privacy, protect against insider threats, and address regulatory compliance requirements.

Posted November 05, 2014

Protegrity, a provider of data security solutions, has announced an expanded partnership with Hadoop platform provider Hortonworks. Protegrity Avatar for Hortonworks extends the capabilities of HDP native security with Protegrity Vaultless Tokenization (PVT) for Apache Hadoop, Extended HDFS Encryption, and the Protegrity Enterprise Security Administrator, for advanced data protection policy, key management and auditing.

Posted October 28, 2014

Big data continues to grow at an exponential rate for many enterprises. One issue that continues to grow as well is the threat to data security.

Posted October 28, 2014

Miss out on SHARE® in Pittsburgh this summer? Get caught up with SHARE's latest blog post featuring key takeaways from security keynote Robert Andrews, co-founder and chief information security officer for Mainstream Security.

Posted October 27, 2014

Oracle has expanded its data integration portfolio with the addition of Oracle Enterprise Metadata Management, a platform to help organizations govern data across the enterprise including structured and unstructured data, and across Oracle and third-party data integration, database, and business analytics platforms. "This is the first time that we have made a comprehensive offering in the area of metadata management," said Jeff Pollock, vice president of product management for Oracle Data Integration.

Posted October 22, 2014

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16

Sponsors