Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

Building on its Identity-based Security Operation Center (SOC) cloud services, Oracle has announced a series of developments that enhance the portfolio's machine learning, artificial intelligence and contextual awareness technologies. The latest round of enhancements include Adaptive Access capabilities into Oracle Identity Cloud Service intended for dynamic application access controls, advanced risk monitoring by leveraging machine learning engines, and the expansion of Oracle CASB Cloud Service to help support Oracle SaaS solutions with automated threat detection.

Posted June 07, 2017

When a failure occurs, the DBA must ascertain whether recovery is required. It is possible, though not very likely for active databases, that a failure does not impact the integrity of your data. Assuming that recovery is required, the DBA will need to determine what resources (backup copies and log files) are available and how best to perform the needed database recovery.

Posted June 07, 2017

Against the backdrop of WannaCry ransomware attacks targeting mission-critical computer systems globally, Data Summit 2017 introduced the Data Security Forum, a track dedicated to cybersecurity. Every day, thousands of entities have their computer networks breached, their systems hacked and their data stolen, degraded or destroyed, noted Robert Pearl, president, Pearl Knowledge Solutions, who offered a presentation on emerging cyber threats as part of the program.

Posted June 07, 2017

IBM Security announced an initiative to help address the projected 1.8 million-person cybersecurity worker shortage through programs and partnerships that promote a "new-collar" cybersecurity workforce strategy. As part of this initiative, IBM is sponsoring alternative education models at the high school level, while defining new workforce approaches to reach a broader pipeline of employees based on skills, experience and aptitudes as opposed to traditional hiring models which focus on degrees alone. In fact, nearly 20% of IBM Security professionals hired in the U.S. since 2015 fall into this category of "new-collar" employees.

Posted June 05, 2017

Software Diversified Services (SDS), a provider of mainframe software, has acquired the SMA_RT software product from Type80 Security Software, Inc. SMA_RT is a real-time mainframe intrusion detection, SIEM agent, and log-event processing product for z/OS. Terms of the transaction were not disclosed.

Posted June 05, 2017

IBM Security and Cisco announced they are working together to address the growing global threat of cybercrime. In a new collaboration, Cisco and IBM Security will work together across products, services and threat intelligence for the benefit of customers.

Posted June 05, 2017

Dataguise is preparing users for new data privacy requirements by offering a full range of data-centric auditing and protection capabilities. GDPR, which was passed to strengthen and unify data protection for all individuals within the EU, requires organizations to take technical and organizational measures in the orchestration of industry-standard information security frameworks.

Posted June 01, 2017

NTT DATA, a global IT-services provider headquartered in Tokyo, has made a strategic capital investment in enterprise NoSQL database provider, MarkLogic Corp. The companies say they will also be expanding their existing strategic business alliance to develop new go-to-market strategies with emphasis on joint customer development in Europe, North America, South America and Japan.

Posted June 01, 2017

In the last few years, a frequent topic of conversation within some of the largest corporations in the world has been the move to the cloud—how to prepare for it, how to address it, and how to benefit from it. Yet over the past several months, some are also talking about a more ambitious goal: to be cloud-only by 2025.

Posted June 01, 2017

There are two types of businesses in the world today: those that run on data and those that will run on data. Data security now sits at the top of nearly every organization's priority list. But with such a high volume of data coming into most businesses every day, how can information security professionals quickly identify which data is the highest priority for protection? After all, security costs time and money, and not all types of data are as sensitive or vulnerable as others.

Posted June 01, 2017

Although Java and JavaScript are the most popular all around programming languages today, the C programming language remains the language of choice for high performance computing after almost 45 years of mainstream use. However, where runtime performance considerations are paramount, Go and Rust are emerging as valid successors to C.

Posted June 01, 2017

With data increasingly recognized as a highly valuable enterprise asset, data protection is understandably becoming a higher priority. To explore the issues surrounding data protection, including the role of people, processes, and technology in creating a proactive security stance, Database Trends and Applications is introducing the Cybersecurity Sourcebook.

Posted June 01, 2017

After recently attending the Zumapalooza conference, Kore's Keith Lambert, vice president of marketing and business development, says the company is seeing more interest in real-time integrations with MultiValue products. "Moving data to the cloud and hosting was a central theme, along with data security," Lambert said. "Extending and modernizing MultiValue applications, and finding other technology partners was important to visitors."

Posted June 01, 2017

Thales, a provider of critical information systems, cybersecurity and data security, is updating its flagship monitoring tool with enhanced features that will allow the platform to monitor both Thales payShield and Thales nShield HSMs through a single pane of glass. Additional capabilities to CipherTrust Monitor 2.0 include enhanced monitoring and displays as well as a new auditor role improving separation of duties.

Posted May 31, 2017

Pythian, a technology services provider, is launching a customized analytics solution that integrates multiple data types from both internal and external sources. The new solution, "Kick Analytics As A Service" (Kick AaaS), gathers multi-source, multi-format data together in the cloud, and adds advanced analytics, machine learning and visualizations to ensure business users and business systems get the insights they need when they need them

Posted May 31, 2017

Software AG has announced its GDPR Framework to help organizations address the impending General Data Protection Regulation (GDPR) which takes effect on May 25, 2018. The European Union (EU) GDPR regulation mandates that all companies and institutions are legally bound to rules aimed at protecting personal data and for upholding the data privacy rights of individuals residing in the EU.

Posted May 30, 2017

Qubole, the big data-as-a-service company , is building an autonomous data platform that will include Qubole Data Service (QDS) Community Edition, QDS Enterprise Edition, and QDS Cloud Agents. The solution can intelligently automate and analyze platform usage to make data teams more effective.

Posted May 26, 2017

Data management is going through a paradigm shift—again, said Joe Caserta, president of Caserta Concepts, who delivered a keynote titled, "Architecting Data for the Modern Enterprise," at Data Summit 2017 in NYC.

Posted May 25, 2017

As many organizations begin to look to the cloud to increase the efficiency and availability of their databases and applications while reducing costs and complexity, one of the reasons for pause is concern about security. This year at Data Summit 2017, Michael Corey, director, cloud computing evangelist, Spectrum Enterprise Navisite, and Don Sullivan, product line marketing manager for Business Critical Applications, VMware, engaged in an entertaining conversation on the topic of cloud security.

Posted May 25, 2017

With the recently unleashed WannaCry ransomware attacks that targeted computer systems globally fresh in attendees' minds, a number of Data Summit 2017 sessions looked at the need for smarter approaches to data governance and data security.

Posted May 24, 2017

The rise of streaming data and IoT and its implications for the enterprise were considered during sessions at Data Summit 2017, an annual conference presented by Big Data Quarterly and Database Trends and Applications, in NYC.

Posted May 24, 2017

Crate.io, developers of CrateDB, a SQL database for real time analytics of IoT and machine data, is releasing CrateDB 2.0 in both open source and enterprise versions, updating its cluster capabilities and making SQL improvements. New improvements to the platform consist of performance and resiliency upgrades for clustering, SQL enhancements such as aggregations on joins, sub-selects, table renaming and reindexing, and enterprise edition features.

Posted May 24, 2017

Businesses need to act now for the arrival of EU GDPR compliance regulations, or risk being among the first to be penalized when the regulations take effect in 12 months' time, according to Commvault, which contends that corporate complacency is one of the biggest barriers to GDPR compliance with many organizations yet to implement suitable processes or technology.

Posted May 24, 2017

IBM has introduced a toolkit on Power Systems optimized for open source databases, including MongoDB, PostgreSQL, MySQL, MariaDB, Redis, Neo4j, and Apache Cassandra, to help deliver more speed, control, and efficiency for enterprise developers and IT departments.

Posted May 24, 2017

Quest Software, a global systems management and security software provider, is announcing enhancements to its portfolio of SQL Server database management and performance monitoring solutions. "We are announcing multiple enhancements to address the Microsoft SQL Server community and customer base," said Greg Davoll, software products leader, Quest Software. Quest as a company is focused on three sets of capabilities for customers: database performance monitoring; database replication; and database development and management tooling, and these new product enhancements reflect that focus, he added.

Posted May 24, 2017

Informatica, a provider of solutions for enterprise data management, has unveiled a metadata-driven artificial intelligence technology called "CLAIRE" with the latest release of the Informatica Intelligent Data Platform.

Posted May 23, 2017

IDERA, a provider of database lifecycle management solutions, has enhanced its SQL Secure and SQL Doctor products with new cloud capabilities. The releases help data professionals to adapt to, experiment with and take advantage of expanding cloud strategies, while DBAs can embrace the speed and agility demands of DevOps with database performance and security recommendations designed for the public cloud.

Posted May 23, 2017

As IBM's recent announcement shows, blockchain is becoming a serious option for the enterprise. While still in the pilot stages, blockchain may provide the ability to track data and transactions employing the power of networks.

Posted May 22, 2017

IBM has created a program to help enterprises take blockchain networks into production faster. "We understand the challenges organizations face and the resources needed to get blockchain networks right the first time," said Marie Wieck, general manager of blockchain technology for IBM.

Posted May 22, 2017

CA Technologies has added new data protection enhancements to CA Data Content Discovery and CA Compliance Event Manager that are designed to simplify security management across the enterprise and enable end-to-end protection for data-in-motion from mobile to mainframe.

Posted May 22, 2017

This year at Data Summit 2017, Michael Corey, director, cloud computing evangelist, Spectrum Enterprise Navisite, and Don Sullivan, product line marketing manager for Business Critical Applications, VMware, discussed cloud myths and realities in a session titled, "The Cloud Landscape Today."

Posted May 18, 2017

The second day of Data Summit 2017 began by focusing on the current state of big data analytics as it meets information governance.The keynote was presented by Linda G. Sharp, associate general counsel at ZL Technologies, and Bennett B. Borden, chief data scientist at Drinker Biddle & Reath.

Posted May 17, 2017

The importance of understanding where critical data is stored in an organization so that it can be protected appropriately was stressed by Donald Soulsby, vice president, architecture strategies, at Sandhill Consultants in a session titled, "Managing Data Vulnerabilities," at Data Summit 2017.

Posted May 16, 2017

The importance of reacting quickly to data threats was highlighted at Data Summit 2017 by Cy Erbay, senior director of technology, Striim.

Posted May 16, 2017

The Internet of Things is the next big trend on the horizon for many enterprises, forcing them to examine a plethora of new business opportunities and determine ways to glean insights from existing customers, products, and operations. To address the needs and implications of IoT, John O'Brien, CEO and principal advisor at Radiant Advisors, and Anne Buff, business solutions manager and thought leader at SAS Institute, held a joint presentation at Data Summit 2017 focusing on the rise of IoT.

Posted May 16, 2017

In October of 2008, Congress enacted the Emergency Economic Stabilization Act, more commonly known as the bailout of the financial system. The understanding was that catastrophic financial consequences would be the result of the failure of these entities and that those aggregate failures could devastate the U.S. The recent major outages in the public clouds services inevitably lead to the same issue being consider with regard to this new industry.

Posted May 15, 2017

With the furor over fake news, where the truth is massaged for commercial or political gain, the focus has gone off fake data—which can have a lot more perilous consequences.

Posted May 15, 2017

You will often hear experienced practitioners and consultants suggest that there is both an art and a science to effective data governance. The art is in the details of fine-tuning a data governance program to fit your culture and address specific business needs. But the fundamental principles of data governance are best understood and executed through science.

Posted May 15, 2017

Data—now universally understood to be the lifeblood of businesses—is at risk like never before in the form of both malicious attacks and innocent indiscretions. Recently, Steve Grobman, CTO for McAfee, discussed the range of threats to data security and what companies must do to defend themselves.

Posted May 15, 2017

Big data and analytics are all around these days. Most companies already have their first analytical models in production and are thinking about further boosting their performance. However, far too often, these companies focus on the analytical techniques rather than on the key ingredient: data. The best way to boost the performance and ROI of an analytical model is by investing in new sources of data which can help to further unravel complex customer behavior and improve key analytical insights.

Posted May 15, 2017

What are the enabling technologies that make enterprise architecture what it is today? There are a range of new-generation technologies and approaches shaping today's data environments. The key is putting them all together to help enterprise architecture fit into the enterprise's vision of itself as a data-driven organization. Tools and technologies emerging within today's data-driven enterprise include cloud, data lakes, real-time analytics, microservices, containers, Spark, Hadoop, and open source trends.

Posted May 15, 2017

Neo Technology, creator of Neo4j, a graph database solution, is releasing an update to Neo4j that introduces enterprise scaling, governance and security capabilities, and improves native graph performance. The update, Neo4j 3.2, adds multi-data center capabilities to enable customers to build the next generation of global internet scale applications.

Posted May 11, 2017

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42

Sponsors