Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

IBM Security has announced X-Force Red Labs, a network of four secure facilities dedicated to testing the security of devices and systems including consumer and industrial IoT technologies, automotive equipment, and ATMs. The new labs are operated by X-Force Red, an autonomous team of veteran hackers within IBM Security, and will be located in Austin, TX; Hursley, England; Melbourne, Australia; and Atlanta, GA.

Posted August 13, 2018

DFLabs, provider of security orchestration, automation, and response (SOAR) technology, is introducing a new version of the IncMan SOAR platform that uses automated event triage to dramatically reduce the number of security incidents generated from alerts.

Posted August 13, 2018

Costly data breaches are on the rise—2017 was a record-setting year in terms of cybersecurity incidents, with more than 14.5 billion malware-infected emails sent and 1.9 billion data records stolen in the first 6 months of the year.

Posted August 08, 2018

This year is an expansive one for the database ecosystems that have evolved around the major platforms. Artificial intelligence (AI), machine learning, the Internet of Things (IoT), and cloud computing are now mainstream offerings seen within the constellations of database vendors, partners, and integrators.

Posted August 08, 2018

Still a relatively new solution coming into its own streaming platforms allow individuals to see data in real-time batches. Streaming solutions can help businesses analyze data in motion, simplify the development of applications, and extend the value of existing systems by integrating with already implemented applications along with supporting both structured and unstructured data.

Posted August 08, 2018

A relational database is a set of formally described tables from which data can be accessed or reassembled in many different ways without having to reorganize the database tables. The standard user and application programming interface (API) of a relational database is the Structured Query Language (SQL). SQL statements are used both for interactive queries for information from a relational database and for gathering data for reports.

Posted August 08, 2018

A brand new study fielded among Database Trends and Applications readers and members of the Independent Oracle Users Group reveals that database professionals are being tasked with managing more database instances and platforms, and in greater sizes, than ever before - both on premises and in the cloud. As a result, it's no surprise that the biggest priorities for database teams this year are improving database performance, database upgrades, and data integration.

Posted August 08, 2018

Providing an integrated environment that simplifies software development, these solutions are valued for their ability to improve database development with an end-to-end approach that helps developers stay on top of the latest technology innovations and build modern applications. For database development teams, maximizing competence, performance, adaptability, and readiness, will help simplify development and allow automation to achieve repeatable processes, all while avoiding potential risks that create downtime.

Posted August 08, 2018

Database downtime can inflict a fatal wound on the life of a business and having a trusted backup solution that can ensure that databases can be back up and running quickly in the event of an outage is critical. With long downtimes simply unacceptable, organizations seek solutions with capabilities such as the ability to manage backups seamlessly, manage and monitor backups, ensure data integrity, scale efficiently restore quickly to any point in time, and provide security features to stay in compliance with local geographic and industry mandates.

Posted August 08, 2018

Today's database administration solutions help to improve DBA productivity while simplifying repetitive administrative tasks, helping to locate and alleviate performance bottlenecks, and optimizing code. Businesses are utlizing highly complex, data environments with multiple data platforms across physical data centers and the cloud, managing systems and processes manually is no longer sufficient. What is needed is the ability to manage and monitor business-critical assets with automated precision.

Posted August 08, 2018

Companies are increasingly looking for the right database for the data storage need at hand. That might mean NoSQL, NewSQL, in-memory databases, and cloud databases—also known as database as a service—approaches. 

Posted August 08, 2018

Cyberattacks are becoming the number-one risk to businesses, brands, operations, and financials, according to recent "SonicWall Cyber Threat Report" (March 2018).  There were 9.32 billion malware attacks in total in 2017, representing an 18.4% increase over 2016. On the other hand, Verizon's Data Breach Investigations Report (DBIR) shows that more a quarter of the time, data breaches across the world originated from an organization's "insiders." But the report notes, malicious employees looking aren't the only insider threat you face. Errors were at the heart of almost one in five (17%) breaches.

Posted August 08, 2018

The data governance market is expected to grow from $1.31 billion in 2018 to $3.53 billion by 2023, increasing by a CAGR of 22%, according to a recent ResearchandMarkets.com report. What is driving that growth? It is a combination of factors, the research shows, including rapidly increasing data volumes, new regulatory and compliance mandates, and the need to enhance strategic risk management and decision making as well as greater business collaboration.

Posted August 08, 2018

As a key component to data integration best practices, change data capture (CDC) is based on the identification, capture, and delivery of the changes made to enterprise data. CDC helps minimize access to both source and target systems. It also supports the ability to keep a record of changes for compliance, and is a key component of many data processes.

Posted August 08, 2018

Redgate Software is adding Nexus Technology to its worldwide partner roster to help organizations successfully introduce DevOps to their database development. Redgate's software is already used by 91% of companies in the Fortune 100, and the new partnership with Nexus now means companies in the Channel Islands are in the ideal position to explore how too they can take advantage of database DevOps.

Posted August 07, 2018

Today, data is understood to be the fuel that propels companies' growth and success. As a result, safeguarding that valuable resource is more important—but also harder—than ever.

Posted August 07, 2018

OneLogin, provider of Unified Access Management solutions, is making platform enhancements that advance Multi-Factor Authentication (MFA) adoption in the enterprise. The updates include a new login experience and the release of OneLogin Protect 4.0 authenticator, providing increased security and customization for both administrators and end users.

Posted August 06, 2018

Cybersecurity start-up Kapalya has launched a data protection solution that protects sensitive data in-transit and at-rest on public and private clouds, endpoints and mobile, helping companies comply with GDPR and other regulatory requirements.

Posted August 02, 2018

The way that many organizations approach the backup process has failed them, as evidenced by the hundreds of millions of dollars they have spent on ransomware to retrieve their data.

Posted August 02, 2018

The General Data Protection Regulation (GDPR) has been in the making for a few years. It was put together by the European Union to enhance data protection rights for EU citizens and harmonizes data protection laws across all 28 EU member states

Posted July 30, 2018

Machine learning continues to grow with the advent of new technologies and solutions. It has emerged as a truly revolutionary technology innovation across all verticals and industries; according to analyst firm IDC, spending on machine learning will grow from $12B to $57.6B by 2021.

Posted July 30, 2018

The role of the CDO is growing—as are data-based threats to businesses.

Posted July 30, 2018

Insight Engines is launching the company's version 3.0 product, combining two key components: Insight Investigator and Insight Analyzer. Together, these offerings use natural language processing, machine learning, and expert knowledge to detect data gaps, ask high-value questions, and give recommendations based on industry intelligence and activities.

Posted July 27, 2018

The big data landscape is constantly changing and the latest IOUG study is reflecting those changes as organizations continue to flock to the cloud, changing the role and mission of IT teams. DBTA recently held a webinar with Lee Levitt, director, business development, Oracle, who discussed how companies are navigating the change and capitalizing on the benefits cloud brings when it comes to data management and getting more out of analytics.

Posted July 27, 2018

For organizations dealing with critical infrastructure and systems, as well as governmental agencies and operators, there are several solutions that can help with IT network security.

Posted July 26, 2018

At Data Summit 2018 in Boston just 2 days before GDPR went into effect, Kristina Podnar, digital policy consultant, NativeTrust Consulting, LLC, presented a talk on what you need to know to become compliant with the new regulation—and maintain compliance. In her presentation, Podnar cut through the legal and regulatory noise, taking the 99 articles of GDPR and distilling them into 10 key areas so attendees could identify the things that they really need to deal with—and those that do not apply.

Posted July 25, 2018

MemSQL is updating its flagship platform, advancing its performance along with adding capabilities to accelerate time to insight. MemSQL 6.5 delivers an integrated database for data capture, management, and operations that integrates seamlessly with existing systems, infrastructure, and employee skills. This allows customers to get faster time to value and reduces cost and complexity.

Posted July 25, 2018

Syncsort has introduced new additions to its Syncsort Assure family of products that can be used to help address compliance challenges faced by IT leaders. The new capabilities in Syncsort's IBM i security products can help IT leaders streamline compliance with the European Union's General Data Protection Regulation (GDPR) and strengthen security with multi-factor authentication.

Posted July 24, 2018

Sumo Logic, provider of a cloud-native, machine data analytics platform is unveiling 11 new Google Cloud Platform (GCP) applications as well as integration with Google Cloud's open source machine learning library, TensorFlow. The applications will enable real-time collection and analytics of machine data emitted by all major GCP services.

Posted July 23, 2018

By automating the centralization process, organizations can ensure that data is up-to-date and accurate, improving their customer experience and paving the road for GDPR compliance.

Posted July 23, 2018

The increased requirements of modern analytical workloads, querying billions of rows on demand, are a challenge for relational databases because they're optimized for transactional workloads. While transactional workload queries tend to be row-oriented (e.g., return every column in a single row), analytical workload queries tend to be column-oriented (e.g., return the aggregate of a single column in every row). By storing columns of data rather than rows of data, columnar databases optimize for analytical workloads without sacrificing the relational model and SQL.

Posted July 20, 2018

Businesses are overwhelmed by a proliferation of data sources, types, and stores. The abundance of information and tools is increasing the challenge of combining data into meaningful, valuable insights. DBTA recently held a webinar featuring Kevin Petrie, senior director and technology evangelist, Attunity, Danny Sandwell, director of product marketing, erwin, Inc., and Jake Freivald, vice president, Product marketing, Information Builders, who discussed the key technologies and best practices for overcoming big data integration and governance challenges.

Posted July 18, 2018

ManageEngine, the real-time IT management company, is extending its log management capabilities of its security information and event management (SIEM) solution to the cloud. Available immediately, Log360 Cloud allows IT administrators to store and manage log data collected from on-premises environments on Zoho's secure cloud platform, giving enterprises insight on critical aspects of their network without having to worry about storage infrastructure.

Posted July 18, 2018

Oracle has announced that its Blockchain Cloud Service is now generally available. The service allows organizations to build blockchain networks to drive more secure and efficient transactions and to track goods through supply chains on a global scale.

Posted July 18, 2018

Dell EMC has announced its newest Integrated Data Protection Appliance (IDPA), the Dell EMC IDPA DP4400, providing converged data protection to help mid-size organizations transform IT while alleviating data sprawl and complexity. In addition, integration with VMware native tools, Oracle RMAN, and SQL Server Management Studio enables application administrators to leverage protection features within familiar user interfaces.

Posted July 18, 2018

Better cybersecurity requires a mindset that looks beyond the technology itself and focuses on having the technology, processes, and people working together in tandem to ensure a secure infrastructure.

Posted July 18, 2018

Alation Inc., the data catalog company, is introducing a new set of features to transform data governance practices. Alation TrustCheck issues real-time data governance guardrails directly into the workflow of self-service analytics users. TrustCheck users are automatically alerted to both constraints and best practices, leading to more timely, accurate and compliant analysis.

Posted July 17, 2018

Splice Machine is releasing a plugin for Apache Ranger to provide centralized security administration for its customers on Hortonworks Data Platform (HDP). The Apache Ranger plugin will provide Splice Machine customers with a framework for central administration of security policies, and the monitoring of user access and security-related administrative actions within all of the components of Splice Machine. It also provides enhanced support for various authorization methods, such as role-based access control, attribute-based access control and more.

Posted July 17, 2018

Anaconda, a Python data science platform provider, is releasing Anaconda Enterprise 5.2, adding NVIDIA GPU-accelerated, scalable machine learning and more.

Posted July 17, 2018

In a new study, IBM Security and Ponemon Institute found that the average cost of a data breach globally is now $3.86 million, representing a 6.4% increase from the 2017 report. Much of it comes from hidden costs in data breaches—lost business, negative impact on reputation and employee time spent on recovery—which are difficult and expensive to manage.

Posted July 16, 2018

With so many layers that may be vulnerable to attack, securing an ERP system involves much more than just one piece of cybersecurity software.

Posted July 16, 2018

After nearly 4 years, ALTR has emerged from stealth mode to release a commercial software package that provides the security benefits of blockchain. The new ALTR platform is built on ALTRchain, an enterprise-grade blockchain technology for secure data access and storage. The ALTR platform is a data-security solution for organizations to monitor, access, and store critical information. Moving beyond perimeter systems, ALTR says its approach signals a new paradigm in cybersecurity.

Posted July 13, 2018

Organizations can significantly reduce threats with basic security hygiene and education for proper user habits since studies show that more than 90% of ransomware attacks start with employees interacting with email.

Posted July 13, 2018

Cloudian and Storage Made Easy (SME) are partnering together to create a General Data Protection Regulation (GDPR)-ready, enterprise-wide file sync-and-share solution. The solution is designed to eliminate the compliance exposure of external cloud-based file sharing services where personal data or company confidential information may reside outside the direct control of the IT organization.

Posted July 11, 2018

Threat Monitor can detect suspicious activity and malware by aggregating asset data, security events, host intrusion detection, network intrusion detection, and correlating that data with continuously updated threat intelligence, identifying the danger signals amidst all the innocent noise of a normal network.

Posted July 10, 2018

Dome9 Security, the public cloud security company, is introducing new capabilities in the Dome9 Compliance Engine that extend the scope of the platform's automation beyond security and compliance monitoring. Using this new Compliance Engine functionality, enterprises can accelerate the resolution of dangerous misconfigurations and minimize the window of vulnerability in their public cloud environments.

Posted July 06, 2018

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40

Sponsors