Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

With more than 300 nominees across 31 categories, the DBTA Readers' Choice Awards are unique in that the winning products and services are chosen by you—the people who actually use them. You can vote for as many or as few of the nominees as you choose. Vote today!

Posted April 15, 2014

New offerings for IBM System z are aimed at helping customers with rapid development and deployment of mobile applications as well as the ability to integrate them with core business processes, applications, and data. As part of this effort, As part IBM is enabling the industry's first commercial Hadoop for Linux on System z - zDoop software - provided through through Veristorm, an IBM partner.

Posted April 14, 2014

With cloud, outsourcing and BYOD posing new challenges to ensuring authorized access to data, Oracle introduced enhancements to Oracle Identity Management 11g Release 2 that are aimed at helping organizations extend access policies and controls beyond enterprise applications and systems to cloud-based systems and mobile devices.

Posted April 14, 2014

TEKsystems, an IT staffing solutions provider, says that employers are finding it increasingly difficult to hire business intelligence and security experts.

Posted April 11, 2014

Kelly Stirman, director of product marketing at MongoDB, emphasized simplicity, reliability, and security in a recent conversation about the new capabilities of MongoDB 2.6. "Don't let the 2.6 fool you. It is absolutely the biggest release we have ever done."

Posted April 08, 2014

Windows-upgrade procrastinators, watch out. That's the message coming through from some security experts who estimate that there is a significant portion of business users who still have not moved off Windows XP, despite the fact that patches will no longer be issued. Users have been warned by Microsoft for years now that support for the more-than-decade-old operating system, as well as for Office 2003, would end on April 8, 2014.

Posted April 07, 2014

Ntirety, a provider of remote DBA, data consulting, and DBA on-demand services for Oracle, SQL Server and MySQL, has been acquired by HOSTING. With the acquisition, said Ntirety founder Michael Corey, the Dedham-based company becomes a division of HOSTING, with Corey as president of the division.

Posted April 04, 2014

The theme for COLLABORATE 14-IOUG Forum is "Become Your Office Superhero," because, while you may look like a mild mannered technical resource in meetings or at your desk, you fight a daily battle to protect your organization's data, improve performance and generate new business opportunities. COLLABORATE is your chance to recharge your superpowers and to take on new skills.

Posted April 02, 2014

Organizations should exercise caution when it comes to implementing new technologies for data governance. Sometimes, the lowest tech solution is the best one and spending money on more software without laying the groundwork actually sets companies up to fail.

Posted April 02, 2014

SAP has officially announced Adaptive Server Enterprise (ASE) 16, a major release of the company's RDBMS, as well as Replication Server, 15.7 SP200 which includes synchronous replication for HA/DR for SAP Business Suite on ASE. It has been 9 years since Sybase (acquired by SAP in 2010) announced ASE 15 in August 2005. With the new release, said Dan Lahl, SAP VP, Database & Technology Marketing, SAP is providing "the right system of record that is going to be able to handle the new world of transaction processing."

Posted April 02, 2014

Attunity Replicate, a data replication and loading solution, has introduced new support for MySQL as a source and target as well as for multiple non-relational sources including Enscribe, RMS, IMS, and VSAM.

Posted April 02, 2014

A new Development Milestone Release for MySQL 5.7, as well as other MySQL product releases and early access features, has been announced by Oracle. With MySQL 5.7.4 DMR, the open source database is twice as fast as the previous version.

Posted April 01, 2014

In a report published in Database Trends & Applications, James G. Barr, says data center managers need to be better prepared for natural disasters. Wind and water damage are particularly widespread problems.

Posted March 31, 2014

STORServer is shipping the BA641-CV, a new entry-level backup appliance that incorporates solid-state drives (SSDs), as well as a new expansion system, the EBA-EXPSM-CV.

Posted March 31, 2014

Zettaset introduced a new encryption capability integrated into its existing security solution for enterprises using Hadoop.

Posted March 27, 2014

The need for better Hadoop security is widely acknowledged. However, the transformative potential of big data is spurring the industry to quickly fill Hadoop's security gaps. To keep pace with these developments, organizations must keep a close watch on the new tools and practices being deployed.

Posted March 27, 2014

Be sure to nominate your favorite vendors' products now. The nominating process for the Database Trends and Applications' Readers' Choice Awards is well underway, and will conclude on Friday, March 28, 2014.

Posted March 26, 2014

You have until April 11 to take advantage of special pricing for DBTA's Data Summit, which will take place at the New York Hilton Midtown, from May 12 to May 14. Providing an intensive 2-day immersion into critical technologies for becoming a data-driven enterprise, IT practitioners and business stakeholders alike will benefit from Data Summit.

Posted March 26, 2014

Wind and water pose their own unique threats to data centers - and, as more than one pundit has observed, we seem to be experiencing a "storm of the century" every few years. Fortunately, there are approaches companies can take to mitigate risk.

Posted March 26, 2014

Attachmate Reflection 2014, the newest version of Attachmate's terminal emulation software, provides enterprise customers with support for advanced security protocols and the Windows 8.1 operating system, as well as features that make it easier to access legacy applications from mobile devices.

Posted March 17, 2014

Embarcadero, a provider of software solutions for application and database development, is acquiring CA Technologies' ERwin Data Modeling solution. The acquisition will provide Embarcadero additional channel partners. ERwin is sold almost exclusively through more than 500 partners in over 70 countries.

Posted March 17, 2014

New integration between the Vormetric Data Security platform and IBM QRadar provides companies with automated data access pattern analysis, enabling them to identify potential threats to sensitive data at the source. The combined solution identifies unauthorized data access attempts - indicating accounts that represent a possible threat - and includes capabilities to monitor and alert on data access patterns that may indicate the presence of an Advanced Persistent Threat (APT) or a malicious insider attack.

Posted March 13, 2014

Database disaster recovery must be an integral component of your overall business recovery plan. Just because your organization has not yet experienced a disaster, or is not in a high-risk area, does not absolve you from the need for contingency planning. Here is what all DBAs should do to be prepared.

Posted March 12, 2014

Much of the information contained in databases is sensitive and can be sold for cash or, such as in cases of theft by a disgruntled employee or by a hacker with political motivations, to cause the organization loss of business or reputation, especially if the organization is found to be in breach of regulations or industry standards that demand high levels of data security. However, there are 5 key steps that can be taken to ensure database security.

Posted March 12, 2014

Data Summit will take place at the New York Hilton Midtown, from May 12 to May 14. The advance program is now available and registration is open with a special early bird registration rate when you register before April 11, 2014.

Posted March 12, 2014

Rogue IT practices have grown exponentially with the use of public cloud services. Will these herald the end of internal IT or a means for healthy IT transformation? The risk exists for either outcome. It all depends on how IT organizations approach it.

Posted March 12, 2014

To recognize the best information management solutions in the marketplace, Database Trends and Applications has launched the DBTA Readers' Choice Awards, a program in which the winners will be selected by the experts whose opinions count above all others - you. The nominations period will conclude on March 28, 2014, and voting will begin on April 11.

Posted March 12, 2014

KnowBe4 has announced the latest release of KnowBe4 Compliance Manager, a cloud-based audit and compliance workflow automation tool which now includes self-assessment capabilities.

Posted March 11, 2014

McAfee, a provider of security solutions and services for systems, networks, and mobile devices, has improved its capabilities for finding, freezing, and fixing advanced threats faster to thwart targeted attacks. The McAfee solution binds and shares threat intelligence and workflows across endpoints, network and the cloud , resulting in a level of protection that the company says cannot be achieved with individual point products.

Posted March 05, 2014

Informatica Cloud Spring 2014, the latest Infomatica software release, introduces Informatica Cloud Designer which brings Informatica's integration design tools into a 100% cloud-based design environment.

Posted March 04, 2014

Teradata and EMC have collaborated to provide a certified backup and recovery approach for Teradata Database customers. The Teradata and EMC partnership was formed in October 2013 when Teradata certified the Data Domain Operating System 5.4. Teradata has also just certified EMC's latest product - the Data Domain DD720 - bringing greater backup performance improvements to customers.

Posted March 03, 2014

AvePoint Compliance Guardian Service Pack (SP) 2, the latest release of AvePoint's enterprise platform for managing information, availability, risk, and compliance adds support for cloud and social platforms, improved incident tracking and management and encryption and redaction.

Posted February 28, 2014

In many ways, IT protection is like a game of poker. There are two things you need to win: a strong ability to play and the best hand you can get. With the former, a lot of it comes down to knowing what not to do.

Posted February 26, 2014

These days, companies have more and more of their applications and data being accessed through mobile devices. To enable secure access to sensitive enterprise applications and data on mobile devices, Oracle rolled out the Oracle Mobile Security Suite, which, combined with Oracle's existing Identity and Access solutions, aims to deliver an integrated platform for managing access to all applications from a complete range of device types.

Posted February 26, 2014

In the last several years, there has been an explosion in the array of choices for not only managing relational and unstructured data but also protecting it and extracting value from it. To shine a spotlight on the best data management offerings, DBTA will soon open nominations for our first-ever Readers' Choice Awards.

Posted February 26, 2014

Mission-critical applications in the banking, education, retail, healthcare, oil and gas, government, and travel industries depend on trusted MultiValue database systems. Yet, new requirements are emerging for MultiValue technology vendors to support integration with other enterprise data sources, enable mobile and web access, provide comprehensive business intelligence, and enforce greater security. In this special report, executives of seven leading MultiValue companies discuss how they are responding to their customers' evolving needs.

Posted February 26, 2014

There are reports circulating that Target's point-of-sale files may have been compromised as a result of a phishing email breach that took place at a third-party heating and air-conditioning vendor's site. An employee of the maintenance firm may have opened the malware-infested file, which then infected Target's systems. Whether or not this turns out to be the case, it points to a vulnerability seen in many IT systems - lax security procedures among third-party partners … another lesson in the Achille's Heel of many corporate networks.

Posted February 18, 2014

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13

Sponsors