Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

Terms such as "active," "inactive," and "canceled" may seem mundane and inconsequential, and when folks hear the term,"valid values," their eyes glaze and expectations of interest diminish. But exciting or not, reference values and an understanding of them are important to every organization.

Posted December 01, 2016

To shed light on the enterprise and technology issues IT professionals will be facing in 2017 as business or organizational leadership seeks strategies to leverage the "big data" phenomenon, the fourth annual edition of the Big Data Sourcebook is now available for download.

Posted December 01, 2016

IT operations teams have been furiously preparing for this year's holiday season - the retail industry's busiest time of the year for web traffic. Here is a checklist of the key factors IT operations teams need to consider to ensure their IT infrastructure is ready now - and stays that way throughout the shopping season.

Posted December 01, 2016

It is not uncommon for a medium-to-large company to have 50 or more different security technologies in place. While fiscally inefficient, this approach has been somewhat effective up to this point in dealing with the types of attacks launched against it. But the threat landscape is currently changing more rapidly than ever, forcing businesses to shift to a more forward-thinking security model.

Posted December 01, 2016

By now it's well documented that employees will take IT tasks into their own hands when IT cannot give them the support they need, and when they need it. The phenomenon is ubiquitous and persistent, even to the point that it's been dubbed "shadow IT." Gartner recently noted that by 2020, a third of successful attacks experienced by enterprises will be on their shadow IT resources.

Posted December 01, 2016

Yellowfin, business intelligence (BI) and analytics software vendor, is launching a virtualized data preparation module for analytics, fully integrating it into the metadata layer of its BI platform. Yellowfin's Data Preparation Module will enable organizations to model, profile, clean, shape, enrich, secure, and publish all data for reporting and analytics in a single BI environment.

Posted December 01, 2016

Dataguise - through its DgSecure platform - is now supporting sensitive data discovery on Amazon Redshift and Amazon RDS, as well as Amazon Simple Storage Service (S3). The platform will now scan for sensitive information stored on Amazon Redshift, RDS, and S3 and provide ongoing monitoring of sensitive data in S3 throughout its lifecycle.

Posted December 01, 2016

What's ahead for 2017 in terms of big data and IoT? IT executives reflect on the impact that Spark, blockchain, data lakes, cognitive computing,AI and machine learning, and other cutting-edge approaches may have on data management and analytics over the year ahead.

Posted November 30, 2016

SUSE is acquiring OpenStack IaaS and Cloud Foundry PaaS Talent and Technology Assets from HPE. The agreement aims to accelerate SUSE's entry into the growing Cloud Foundry Platform-as-a-Service (PaaS) market.

Posted November 30, 2016

Splice Machine is releasing an updated version of its signature platform for intelligent applications, strengthening its ability to run enterprise-scale transactional and analytical workloads. Version 2.5 of the Splice Machine platform introduces new abilities including columnar external tables that enables hybrid columnar and row-based querying; in-memory caching via pinning; statistics via sketching; and offers cost optimized storage for AWS users.

Posted November 30, 2016

Databricks, the company founded by the creators of the Apache Spark project, has introduced a Health Insurance Portability and Accountability Act (HIPAA)-compliant Apache Spark, cloud-based platform. The announcement was made today at the 2016 Amazon Web Services (AWS) re:Invent conference.

Posted November 30, 2016

Reltio, an enterprise data-driven applications and modern data management platform as a service (PaaS) company, announced it has earned HITRUST CSF Certification status for information security by the Health Information Trust Alliance (HITRUST) for Reltio Cloud.

Posted November 29, 2016

CA Technologies is incorporating predictive analytics capabilities for monitoring data that touches the mainframe. CA Mainframe Operations Intelligence is a new algorithms-based solution suite that identifies and predicts system issues before they impact performance. Machine learning is applied to make sure there is no downtime and provides the intelligence that reduces the effort and skill to run data centers.

Posted November 28, 2016

IBM has announced the launch of a global practice that will feature 1,500 experts across IBM Watson IoT solutions. The service, IBM Watson IoT Consulting Solutions, integrates IBM Watson IoT Platform APIs and technologies, including cognitive, analytics, mobile, security and cloud capabilities, together with development and implementation consulting and ongoing support.

Posted November 28, 2016

Resilient, an IBM Company unveiled the results of a new survey which found that only 32% of IT and security professionals feel their organization is ready for a cyberattack - down slightly from 35% in 2015. The annual Cyber Resilient Organization study also found that 66% of respondents say their organization is not prepared to recover from cyberattacks.

Posted November 28, 2016

Mentis, an enterprise data security provider, announced a new release of its platform, designed to improve security in critical data stores such as unstructured data, data in the cloud, and data in mainframe databases. Mentis 8 includes data security solutions tackle sensitive data risk along the full information lifecycle.

Posted November 28, 2016

Symantec Corp. and LifeLock, Inc. recently announced they have entered into a definitive agreement for Symantec to acquire LifeLock for $2.3 billion in enterprise value. The deal is expected to close in the first calendar quarter of 2017.

Posted November 28, 2016

At CA WORLD '16, CA Technologies announced two new security solutions. CA Threat Analytics for PAM, a new behavior analytics solution that integrates with CA Privileged Access Manager (PAM), features machine-learning capabilities for better threat detection and breach prevention associated with privileged users. In addition, CA Identity Service, a new, turn-key identity-as-a-service solution, has been introduced to address identity and access management (IAM) needs for both on-premises and cloud-based applications.

Posted November 21, 2016

Compuverde, a provider of software-defined storage solutions, based in Sweden, has released its Metro cluster, a high-availability solution designed to tolerate the loss of an entire data center with zero downtime.

Posted November 18, 2016

Aerospike, a provider of NoSQL solutions, is releasing a new version of its Aerospike platform, transforming how organizations store, access, and analyze data. The new version of Aerospike includes features such as SortedMap, durable delete, IPv6, improved cluster management, and updated network naming.

Posted November 17, 2016

Introduced at Oracle OpenWorld, Oracle's new MySQL Cloud Service provides the benefits of MySQL Enterprise Edition through the Oracle Public Cloud. Diby Malakar, a vice president of product management at Oracle, recently discussed the latest database service from Oracle.

Posted November 16, 2016

BMC, a provider of IT solutions for the digital enterprise, has announced enhancements to its BMC Discovery solution to improve its interaction with other systems while also increasing security and efficiency. Using a RESTful API, BMC Discovery v11.1 now provides an open platform enabling other systems to take advantage of discovery data and drive discovery configuration. The new version also leverages integration with the CyberArk Privileged Account Security Solution to manage and secure privileged access to scanned environments.

Posted November 16, 2016

Many providers of cloud services market the idea that all critical computing functions should be run using their public cloud services because this paradigm is the future and the future is now. While we do share that long-term vision, the reality is less impressive, and the solution is not yet complete. Amazon itself does not run 100% of its critical business systems in the AWS Public Cloud, a fact that was revealed in The Wall Street Journal article, "Cloud-Computing Kingpins Slow to Adapt to Own Movement." This is also true for Google, Microsoft, and other top cloud providers.

Posted November 15, 2016

Data has become a disruptive force for global businesses and a catalyst for digital transformation. But data can only be leveraged for BI initiatives to the extent it can be accessed and trusted. And, while today's self-service BI and analytics tools satisfy a user's craving for more "consumerized" technology, they often leave an analyst stuck in neutral because the users, first and foremost, cannot find the data they need to perform any analysis.

Posted November 02, 2016

Redis Labs, the home of Redis, is introducing an open source project called Redis-ML, the Redis Module for Machine Learning. The new project will accelerate the delivery of real-time recommendations and predictions for interactive apps in combination with Spark Machine Learning (Spark ML).

Posted November 01, 2016

IBM has signed a definitive agreement to acquire Sanovi Technologies, a privately held company that provides hybrid cloud recovery, cloud migration and business continuity software for enterprise data centers and cloud infrastructure. Financial details of the deal were not disclosed.

Posted October 31, 2016

With data flowing into enterprises from so many different sources, and at varying speeds and times, effective solutions are needed to enable insights to be uncovered for faster decision making. To delve into the issues involved in making big data usable more quickly within organizations, DBTA recently presented a webinar featuring executives from the Federal Home Loan Mortgage Corp., known as Freddie Mac.

Posted October 27, 2016

It can be easy for those of us who live and breathe MultiValue databases every day to forget the outside world exists. After all, we're all so busy juggling massive amounts of data and programming requests that we sometimes tune out other important factors that can affect how well IT organizations function. One of the main issues most commonly overlooked is disaster recovery, which is often treated with an "out of sight, out of mind" mentality as we deal with more pressing issues. In fact, high availability/disaster recovery should be a critical part of every MultiValue deployment.

Posted October 26, 2016

Cyberattacks happen. How can you recover quickly? If you are in IT management, everywhere you turn, you see warnings of malicious forces working diligently with the one aim of compromising your security and eating your data for lunch. It's not a question of if anymore but rather of when. Many times, the cybersecurity tools will not prevent the break-in, but only alert you of the compromise.

Posted October 26, 2016

Datical, a provider of agile database automation solutions, and XebiaLabs, a provider of DevOps and continuous delivery software tools, are forming a partnership to better handle application release cycles and more. With this integration, joint customers can work within the XebiaLabs DevOps platform and leverage Datical to automate database deployments and enforce database security and compliance by treating the database as code.

Posted October 26, 2016

SAP is revealing a new version of its SAP Master Data Governance application with updates that include intuitive analytics and enhanced mobile functionality with SAP Smart Business cockpits powered by SAP HANA and new SAP Fiori apps for master data governance. The latest version of SAP Master Data Governance, version 9.0, expands master data consolidation functionality to the material data domain in addition to supplier and customer data.

Posted October 26, 2016

Business intelligence (BI) and analytics are at the top of corporate agendas this year, and with good reason. The competitive environment is intense, and business leaders are demanding they have access to greater insights about their customers, markets, and internal operations to make better and faster decisions—often in real time. There have also been dramatic changes with BI and analytics tools and platforms. The three Cs—cloud, consolidation, and collaboration—are elevating BI and analytics to new heights within enterprises and gaining newfound respect at the highest levels.

Posted October 24, 2016

Dell EMC is unveiling a new platform that will deliver all the tools necessary for speeding up both big data analytics and cloud native application development. The new Dell EMC Analytic Insights Module helps organizations derive actionable insights that can be easily integrated into intelligent applications while ensuring security and corporate governance. The Analytic Insights Module enables the rapid searching, gathering, and analyzing of data sources within the enterprise or in the cloud, according to Dell.

Posted October 19, 2016

Internet of Things (IoT) devices are revolutionizing the way we share data and carry a huge charter to improve our banking, shopping, transportation, patient, and individual care and safety, to name a just a few. The mission is admirable, but with thousands of devices flooding the market, the lack of standards and multitude of security deficiencies are creating an on-ramp to corporate, government, and private networks that is wide open to cyberattacks.

Posted October 19, 2016

Paxata is releasing Paxata Connect to extend the Paxata Platform with a connectivity framework that creates a nexus to acquire, shape, and publish meaningful data for faster time to value. With Connect, information architects and developers can take advantage of out-of-the-box connectors, build their own repeatable data services and pipelines, and maintain transparency and oversight to ensure data provides a greater and faster return.

Posted October 19, 2016

Dataguise is integrating Apache Eagle into its DgSecure Monitor solution to bolster both data-centric security and compliance monitoring applications. "The integration of Apache Eagle and DgSecure Monitor is a first of its kind implementation in the data security and compliance monitoring space," said Arun Manoharan, Senior Product Manager and PPMC of Apache Eagle.

Posted October 12, 2016

ManageEngine, the real-time IT management company, is adding smart card support to ADManager Plus, its Active Directory management and reporting software solution. Smart cards are a simple and flexible option to help secure user data and set up user or role-based access to organizational data.

Posted October 12, 2016

A new world of self-service BI brings with it its own issue of data chaos. When everyone is looking at the data their own way, people find different answers to the same questions.

Posted October 10, 2016

Organizational issues such as governance and skills—not technology requirements—are the greatest challenges that IT and corporate managers are facing in the emerging world of big data. To get a better handle on the complex new world big data is catalyzing, executives and professionals recognize they must reimagine and re-architect the concept of the "data center"—and what ultimately is coming out of may be a surprise to everyone. These are some key takeaways from a recent survey of 319 corporate and IT managers, conducted by Unisphere Research, a division of Information Today, Inc., in partnership with Cloudera and Intel.

Posted October 07, 2016

For many years now, Cassandra has been renowned for its ability to handle massive scaling and global availability. Based on Amazon's Dynamo, Cassandra implements a masterless architecture which allows database transactions to continue even when the database is subjected to massive network or data center disruption. Even in the circumstance in which two geographically separate data centers are completely isolated through a network outage, a Cassandra database may continue to operate in both geographies, reconciling conflicting transactions—albeit possibly imperfectly—when the outage is resolved.

Posted October 07, 2016

Arcserve, a provider of data protection for cloud, virtual, and physical environments, has released its second-generation Unified Data Protection (UDP) Appliance series. Integrated with the Arcserve UDP software, the new appliance series aims to simplify disaster recovery for small or overstretched IT teams that require an enterprise-grade data protection solution.

Posted October 06, 2016

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27

Sponsors