▼ Scroll to Site ▼

Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

Redgate Software is adding Nexus Technology to its worldwide partner roster to help organizations successfully introduce DevOps to their database development. Redgate's software is already used by 91% of companies in the Fortune 100, and the new partnership with Nexus now means companies in the Channel Islands are in the ideal position to explore how too they can take advantage of database DevOps.

Posted August 07, 2018

IBM Security has announced X-Force Red Labs, a network of four secure facilities dedicated to testing the security of devices and systems including consumer and industrial IoT technologies, automotive equipment, and ATMs. The new labs are operated by X-Force Red, an autonomous team of veteran hackers within IBM Security, and will be located in Austin, TX; Hursley, England; Melbourne, Australia; and Atlanta, GA.

Posted August 07, 2018

Today, data is understood to be the fuel that propels companies' growth and success. As a result, safeguarding that valuable resource is more important—but also harder—than ever.

Posted August 07, 2018

OneLogin, provider of Unified Access Management solutions, is making platform enhancements that advance Multi-Factor Authentication (MFA) adoption in the enterprise. The updates include a new login experience and the release of OneLogin Protect 4.0 authenticator, providing increased security and customization for both administrators and end users.

Posted August 06, 2018

DFLabs, provider of security orchestration, automation, and response (SOAR) technology, is introducing a new version of the IncMan SOAR platform that uses automated event triage to dramatically reduce the number of security incidents generated from alerts.

Posted August 02, 2018

Cybersecurity start-up Kapalya has launched a data protection solution that protects sensitive data in-transit and at-rest on public and private clouds, endpoints and mobile, helping companies comply with GDPR and other regulatory requirements.

Posted August 02, 2018

The way that many organizations approach the backup process has failed them, as evidenced by the hundreds of millions of dollars they have spent on ransomware to retrieve their data.

Posted August 02, 2018

The General Data Protection Regulation (GDPR) has been in the making for a few years. It was put together by the European Union to enhance data protection rights for EU citizens and harmonizes data protection laws across all 28 EU member states

Posted July 30, 2018

Machine learning continues to grow with the advent of new technologies and solutions. It has emerged as a truly revolutionary technology innovation across all verticals and industries; according to analyst firm IDC, spending on machine learning will grow from $12B to $57.6B by 2021.

Posted July 30, 2018

Insight Engines is launching the company's version 3.0 product, combining two key components: Insight Investigator and Insight Analyzer. Together, these offerings use natural language processing, machine learning, and expert knowledge to detect data gaps, ask high-value questions, and give recommendations based on industry intelligence and activities.

Posted July 27, 2018

The big data landscape is constantly changing and the latest IOUG study is reflecting those changes as organizations continue to flock to the cloud, changing the role and mission of IT teams. DBTA recently held a webinar with Lee Levitt, director, business development, Oracle, who discussed how companies are navigating the change and capitalizing on the benefits cloud brings when it comes to data management and getting more out of analytics.

Posted July 27, 2018

For organizations dealing with critical infrastructure and systems, as well as governmental agencies and operators, there are several solutions that can help with IT network security.

Posted July 26, 2018

At Data Summit 2018 in Boston just 2 days before GDPR went into effect, Kristina Podnar, digital policy consultant, NativeTrust Consulting, LLC, presented a talk on what you need to know to become compliant with the new regulation—and maintain compliance. In her presentation, Podnar cut through the legal and regulatory noise, taking the 99 articles of GDPR and distilling them into 10 key areas so attendees could identify the things that they really need to deal with—and those that do not apply.

Posted July 25, 2018

MemSQL is updating its flagship platform, advancing its performance along with adding capabilities to accelerate time to insight. MemSQL 6.5 delivers an integrated database for data capture, management, and operations that integrates seamlessly with existing systems, infrastructure, and employee skills. This allows customers to get faster time to value and reduces cost and complexity.

Posted July 25, 2018

Syncsort has introduced new additions to its Syncsort Assure family of products that can be used to help address compliance challenges faced by IT leaders. The new capabilities in Syncsort's IBM i security products can help IT leaders streamline compliance with the European Union's General Data Protection Regulation (GDPR) and strengthen security with multi-factor authentication.

Posted July 24, 2018

Sumo Logic, provider of a cloud-native, machine data analytics platform is unveiling 11 new Google Cloud Platform (GCP) applications as well as integration with Google Cloud's open source machine learning library, TensorFlow. The applications will enable real-time collection and analytics of machine data emitted by all major GCP services.

Posted July 23, 2018

By automating the centralization process, organizations can ensure that data is up-to-date and accurate, improving their customer experience and paving the road for GDPR compliance.

Posted July 23, 2018

The increased requirements of modern analytical workloads, querying billions of rows on demand, are a challenge for relational databases because they're optimized for transactional workloads. While transactional workload queries tend to be row-oriented (e.g., return every column in a single row), analytical workload queries tend to be column-oriented (e.g., return the aggregate of a single column in every row). By storing columns of data rather than rows of data, columnar databases optimize for analytical workloads without sacrificing the relational model and SQL.

Posted July 20, 2018

Businesses are overwhelmed by a proliferation of data sources, types, and stores. The abundance of information and tools is increasing the challenge of combining data into meaningful, valuable insights. DBTA recently held a webinar featuring Kevin Petrie, senior director and technology evangelist, Attunity, Danny Sandwell, director of product marketing, erwin, Inc., and Jake Freivald, vice president, Product marketing, Information Builders, who discussed the key technologies and best practices for overcoming big data integration and governance challenges.

Posted July 18, 2018

ManageEngine, the real-time IT management company, is extending its log management capabilities of its security information and event management (SIEM) solution to the cloud. Available immediately, Log360 Cloud allows IT administrators to store and manage log data collected from on-premises environments on Zoho's secure cloud platform, giving enterprises insight on critical aspects of their network without having to worry about storage infrastructure.

Posted July 18, 2018

Oracle has announced that its Blockchain Cloud Service is now generally available. The service allows organizations to build blockchain networks to drive more secure and efficient transactions and to track goods through supply chains on a global scale.

Posted July 18, 2018

Dell EMC has announced its newest Integrated Data Protection Appliance (IDPA), the Dell EMC IDPA DP4400, providing converged data protection to help mid-size organizations transform IT while alleviating data sprawl and complexity. In addition, integration with VMware native tools, Oracle RMAN, and SQL Server Management Studio enables application administrators to leverage protection features within familiar user interfaces.

Posted July 18, 2018

Better cybersecurity requires a mindset that looks beyond the technology itself and focuses on having the technology, processes, and people working together in tandem to ensure a secure infrastructure.

Posted July 18, 2018

Alation Inc., the data catalog company, is introducing a new set of features to transform data governance practices. Alation TrustCheck issues real-time data governance guardrails directly into the workflow of self-service analytics users. TrustCheck users are automatically alerted to both constraints and best practices, leading to more timely, accurate and compliant analysis.

Posted July 17, 2018

Splice Machine is releasing a plugin for Apache Ranger to provide centralized security administration for its customers on Hortonworks Data Platform (HDP). The Apache Ranger plugin will provide Splice Machine customers with a framework for central administration of security policies, and the monitoring of user access and security-related administrative actions within all of the components of Splice Machine. It also provides enhanced support for various authorization methods, such as role-based access control, attribute-based access control and more.

Posted July 17, 2018

Anaconda, a Python data science platform provider, is releasing Anaconda Enterprise 5.2, adding NVIDIA GPU-accelerated, scalable machine learning and more.

Posted July 17, 2018

In a new study, IBM Security and Ponemon Institute found that the average cost of a data breach globally is now $3.86 million, representing a 6.4% increase from the 2017 report. Much of it comes from hidden costs in data breaches—lost business, negative impact on reputation and employee time spent on recovery—which are difficult and expensive to manage.

Posted July 16, 2018

With so many layers that may be vulnerable to attack, securing an ERP system involves much more than just one piece of cybersecurity software.

Posted July 16, 2018

After nearly 4 years, ALTR has emerged from stealth mode to release a commercial software package that provides the security benefits of blockchain. The new ALTR platform is built on ALTRchain, an enterprise-grade blockchain technology for secure data access and storage. The ALTR platform is a data-security solution for organizations to monitor, access, and store critical information. Moving beyond perimeter systems, ALTR says its approach signals a new paradigm in cybersecurity.

Posted July 13, 2018

Organizations can significantly reduce threats with basic security hygiene and education for proper user habits since studies show that more than 90% of ransomware attacks start with employees interacting with email.

Posted July 13, 2018

The role of the CDO is growing—as are data-based threats to businesses.

Posted July 12, 2018

Cloudian and Storage Made Easy (SME) are partnering together to create a General Data Protection Regulation (GDPR)-ready, enterprise-wide file sync-and-share solution. The solution is designed to eliminate the compliance exposure of external cloud-based file sharing services where personal data or company confidential information may reside outside the direct control of the IT organization.

Posted July 11, 2018

Threat Monitor can detect suspicious activity and malware by aggregating asset data, security events, host intrusion detection, network intrusion detection, and correlating that data with continuously updated threat intelligence, identifying the danger signals amidst all the innocent noise of a normal network.

Posted July 10, 2018

Dome9 Security, the public cloud security company, is introducing new capabilities in the Dome9 Compliance Engine that extend the scope of the platform's automation beyond security and compliance monitoring. Using this new Compliance Engine functionality, enterprises can accelerate the resolution of dangerous misconfigurations and minimize the window of vulnerability in their public cloud environments.

Posted July 06, 2018

Whether you're an Oracle system or database administrator, an IT manager, or executive, or even just an end user or customer, security should be as important to you as almost anything else. We all hear about breaches in the news all too often. From the executive level to the end customer, none of us want to be anywhere near such a breach.

Posted July 05, 2018

Agorai, an integrated marketplace for Artificial Intelligence (AI) tools and the data assets that fuel them, and Ocean Protocol, a decentralized, blockchain data exchange protocol to unlock data for analytics and AI, are entering a strategic technology partnership. Under the agreement, Agorai will leverage Ocean Protocol's innovative technology to enable fully transparent, completely decentralized and securely validated data services for Agorai's AI and Data Marketplace.

Posted July 05, 2018

Microsoft is releasing Azure IoT Edge and introducing robust capabilities to enable enterprise customers to bring their edge solutions to production. The new updates are open and flexible to provide users with greater choice.

Posted July 02, 2018

A Worldwide Data Ethics Council is something we greatly need. The council would focus on debating, crafting and proposing clearer regulations that dictate what is—and is not—ethical in terms of data collection, retention, and usage. Furthermore, it would communicate the message of being skeptical of everything and using caution before sharing anything with anyone. The council could also work on forms of data ethics education for schools and universities, as well as to educate the press and government officials. I mean, let's face it, after watching those U.S. Congressional hearings with Mark Zuckerberg I don't think any techies believe that government officials are prepared for the Information Age.

Posted July 02, 2018

In a world of increased scrutiny and regulatory policy concerning how personal data is collected and managed, the European Union's newly implemented General Data Protection Regulation (GDPR) raises critical issues for data management at every company. MultiValue is already being used to create efficient, flexible database and development frameworks that provide both a GDPR-compliant as well as scalable solution.

Posted July 02, 2018

BlueData, provider of a Big-Data-as-a-Service (BDaaS) software platform, is releasing updates for its BlueData EPIC platform, building upon innovations for large-scale distributed analytics and machine learning (ML) workloads on Docker containers. This summer release is the result of collaboration with BlueData's enterprise customers to develop new functionality in each of these areas to support their Big Data and AI initiatives - as they extend well beyond Hadoop and Spark to a range of different ML / DL and data science workloads, and beyond on-premises infrastructure to public cloud and hybrid architectures.

Posted June 28, 2018

Actian, the hybrid data management, analytics, and integration company, is releasing Actian Vector 5.1 and Actian Vector on Microsoft Azure to bring better security measures to analytics in the cloud. This edition of the analytic database boosts performance and adds new security features, providing customers with fine-grained control and customized protection capabilities to strengthen compliance with core General Data Protection Regulation (GDPR) requirements.

Posted June 28, 2018

Knoa Software, a provider of user experience management (UEM) software, is launching the latest version of Knoa UEM for Enterprise Applications, extending the monitor platform for new application environments and integrations to new BI tools. This enhanced release builds on previous versions, accelerating the solution's value for SAP S/4HANA implementations through increased extensibility of the Knoa UEM monitoring and analytical platform. These features also position the solution as a key analytical tool for initiatives involving SAP Leonardo.

Posted June 27, 2018

Attunity, a provider of data integration and big data management software solutions, is introducing a comprehensive data governance solution designed to assist companies with General Data Protection Regulation (GDPR) compliance in SAP environments. The new Attunity Gold Client for Data Protection solution helps to identify and mask the personally identifiable information (PII) of customers, vendors, employees, and partners across production SAP ECC applications to address the "right to be forgotten" mandate.

Posted June 27, 2018

The unprecedented volumes of data now pouring forth from virtualization technologies and cloud-based infrastructure have taxed traditional storage architectures beyond their limits. Organizations want to store their data in an efficient and affordable way that is also flexible. Software-defined storage (SDS) meets these criteria and, therefore, is enjoying a surge in adoption.

Posted June 20, 2018

Melissa, a provider of global contact data quality and identity verification solutions, is partnering with Scanovate, a digital identity management platform, to provide mobile identity management. Scanovate empowers businesses to interact with mobile device users, offering frictionless onboarding while meeting compliance concerns as the first step in managing risk.

Posted June 20, 2018

Immuta revealed it has raised $20 million in Series B funding, which will be used to accelerate global customer growth and extend product leadership. The funding round was led by DFJ Growth, with participation from new investors, Dell Technologies Capital and Citi Ventures, and existing investors, Drive Capital and Greycroft.

Posted June 20, 2018

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49

Sponsors