▼ Scroll to Site ▼

Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

IBM just released its annual X-Force Report, which found fewer Records were Breached In 2017. Last year, more than 2.9 billion records were reported breached, down from 4 billion disclosed in 2016. The bad news is, however, is that cybercriminals Focused On Ransomware And outright Destructive Attacks. The report also notes that human error was responsible for two-thirds of compromised records, including a "historic" 424% jump in misconfigured cloud infrastructure.

Posted April 09, 2018

WSO2 is introducing a Spring 2018 release update that will  help enterprises comply with the most recent GDPR standards.WSO2's Spring 2018 Release includes new features and updates across all products, solutions, and services, which together empower organizations to rapidly comply with GDPR. 

Posted April 09, 2018

NGINX, Inc. is releasing new capabilities and major enhancements to its Application Platform - an integrated suite of software technologies that simplify the adoption and deployment of microservices.

Posted April 09, 2018

Businesses must become more competitive than ever in the big data arena. Executives must know where to focus their efforts to capitalize on the growing opportunities of the analytics economy. Anne Buff, advisory business solutions manager at SAS, will discuss how executives can generate substantial business value, internal and external, from the growing analytics economy in her Data Summit 2018 session titled, "Five Executive Imperatives to Compete in the Analytics Economy."

Posted April 09, 2018

ManageEngine, the real-time IT management company, is enhancing its RecoveryManager Plus with the ability to periodically back up Windows servers and restore them. Available immediately, the latest version of RecoveryManager Plus helps administrators withstand any attack on or disaster to their Windows servers with its file, folder, and volume-level backup and one-click restoration, providing greater control in managing an organization's data.

Posted April 06, 2018

OneLogin has announced a new product that allows companies to manage access for on-premises and cloud-based applications with a single identity-as-a-service (IDaaS) solution.

Posted April 04, 2018

Meta Networks Ltd., a provider of secure cloud-native networking, is releasing its signature network and security platform - Meta NaaS (Network-as-a-Service). Meta Networks' user-centric platform is delivered as a service to connect people, applications, clouds, and sites within a software-defined perimeter, reducing the possibility of a security breach while improving the overall user experience.

Posted April 04, 2018

Blockchain may be the best thing to happen to data management and information security or just the latest tech fad, depending on your point of view. To help IT professionals get up-to-speed, Data Summit 2018 will present a number of sessions on the distributed ledger technology. Data Summit 2018 will take place this year at the Hyatt Regency Boston, May 22-23, with pre-conference workshops on Monday, May 21. Cognitive Computing Summit will also be co-located at the event.

Posted April 04, 2018

IBM has launched three new consulting services offerings, as well as an IBM Blockchain Platform Starter Plan, a low-cost plan to help clients, developers, and startups to develop, operate, and govern networks on the IBM Blockchain Platform.

Posted April 04, 2018

DFLabs, a provider of security automation and orchestration, has achieved certified technical integration of the DFLabs IncMan platform with both McAfee ePolicy Orchestrator (ePO) and McAfee Data Exchange Layer (DXL). This combination enables customers to deploy end-to-end security solutions for faster, more automated detection and response to security threats, plus orchestration of remediation efforts.

Posted April 03, 2018

With news unfolding about an app that was able to gather 50 million Facebook users' data that was later resold to a political data firm in order to try to influence American voter sentiment, industry leaders are weighing in on what this may mean for the future of governance and regulatory compliance. While not a breach or hack, the use of the data by a third party, and the particular purposes it was collected for, has drawn outrage from lawmakers and Facebook customers, and prompted heightened interest in regulations that could enable individuals to control the use of their data.

Posted March 29, 2018

Not many companies have the opportunity to take a greenfield approach to data architecture. Most have "accidental architectures" that were never really intentionally designed at all, but instead have been built up over time across different eras of data management, according Rick Sherman, managing partner of Athena IT Solutions. But fragmented architectures can still be improved, says Sherman, who will present a talk titled "Designing a Data Architecture for Modern Business Intelligence and Analytics" at Data Summit.

Posted March 29, 2018

Database environments continue to increase in size and complexity while the challenge of maintaining the performance and availability of business-critical systems is also growing. A brand new study fielded among Database Trends and Applications readers and members of the Independent Oracle Users Group reveals that database professionals are being tasked with managing more database instances and platforms, and in greater sizes, than ever before - both on premises and in the cloud.

Posted March 29, 2018

Registration is now open for Data Summit 2018 presented by DBTA and Big Data Quarterly. For a limited time, super early bird pricing is also available for the conference which will take place May 22 - 23, 2018 at the Hyatt Regency Boston.

Posted March 28, 2018

Silwood Technology Ltd, a supplier of enterprise application metadata intelligence software, is boosting its Safyr platform with SAP and SAP Business Warehouse (BW) integration. Safyr now provides users of SAP and SAP Business Warehouse greater visibility and intelligence about the data connections between the two products. The company has also enhanced product features for GDPR data discovery.

Posted March 28, 2018

It's time to vote for the annual Database Trends and Applications Readers' Choice Awards Program in which the winning information management solutions, products, and services are chosen by you—the people who actually use them. This year, there are 27 categories in which to vote—providing plenty of opportunity for the recognition of both well-established products as well as new and cutting-edge technologies.

Posted March 28, 2018

SolarWinds, a provider of IT management software, has introduced its first backup solution targeted for direct use by end user customers.

Posted March 27, 2018

On any given day, organizations can collect hundreds of different pieces of data on every person they interact with. Managing and protecting this data, often referred to as personal data, is becoming mission-critical for organizations—particularly since enforcement of the European Union's General Data Protection Regulation (GDPR) begins on May 25, 2018.

Posted March 26, 2018

We live in a new world today, with unique challenges heretofore unseen in information technology. To remain at the expected technological apex, organizations should ask themselves these questions.

Posted March 26, 2018

CloudJumper, a Workspace as a Service (WaaS) platform provider for agile business IT, is adding new features and capabilities to its Cloud Workspace WaaS and App Services platform. The newest generation of Cloud Workspace WaaS by CloudJumper reduces the costs and complexity associated with deploying WaaS in businesses ranging from SMBs to the enterprise.

Posted March 22, 2018

GDPR, the European Union (EU) legislation addressing data security, privacy and use protections, is right around the corner and consumers are starting to pay attention. A recent SAS poll of U.K. citizens found that almost half plan to exercise their rights at some point after the new legislation takes effect in May of 2018. Unfortunately, many companies may not be ready to answer the call.

Posted March 21, 2018

Data is considered the cornerstone of every institution. The premise has been that the more data companies can gather, the more return on investment. However, businesses must now contend with regulations to safeguard that data. Kristina Podnar, digital policy advisor at NativeTrust Consulting, will address the need to govern big data and how to successfully adopt new policies during her Data Summit 2018 session titled, "GDPR: Writing Policy for Big Data."

Posted March 21, 2018

A new survey from conducted by Ponemon Institute and sponsored by IBM Resilient finds that 77% of the firms surveyed lack proper incident response plans; while 69% say that funding for ‘cyber resiliency' is insufficient.

Posted March 19, 2018

Companies are collecting vast troves of information about their customers today, but to leverage the full value of that information they need the right tools and technologies, according to Zak Pines, VP-Marketing, Bedrock Data, who will present a session at Data Summit titled "Overcoming Data Silos to Get a Unified View of Customers."

Posted March 16, 2018

From April 22 to April 26, 2018, Oracle users from across the world will gather in Las Vegas to attend the largest, user-led, user-focused event where you can get the real story about Oracle products, while experiencing in-depth education and networking to take your Oracle products to the next level.

Posted March 14, 2018

Every organization is unique. So is every Oracle user. Enter COLLABORATE 18: Technology and Applications Forum for the Oracle Community (April 22-26 in Las Vegas). Designed to serve the evolving educational needs of today's users, COLLABORATE offers 12,00 informative sessions and events carefully selected by volunteers, Oracle pros themselves, from a global call for content. While there's no "one-size-fits-all," there is something for everyone.

Posted March 14, 2018

TrustArc, a data privacy management company, has added 20 privacy assessment solutions to further accelerate the process by which companies meet the impending May 25th GDPR deadline and maintain compliance afterward.

Posted March 13, 2018

ASG Technologies, a provider of proven solutions for information access, management, and control, has added enhanced capabilities to its enterprise data intelligence solution to help customers achieve compliance with the General Data Protection Regulation (GDPR). It is important to note that GDPR is not a point in time. It is a change in how organizations need to manage data, said Rob Perry, ASG's VP of product marketing.

Posted March 12, 2018

Websites and the servers that host them are vulnerable to attack, and so too are the networks that are connected to them. Security holes in sites created by human error or application vulnerabilities are a source of trouble for the entire enterprise.

Posted March 08, 2018

Blackpoint Cyber is releasing an IoT module for SNAP-Defense; providing lateral spread protection for not only core enterprise networks but also IoT applications. Blackpoint Cyber is releasing an IoT module for SNAP-Defense; providing lateral spread protection for not only core enterprise networks but also IoT applications.

Posted March 08, 2018

Graph databases are increasingly popular. In fact, according to DB-Engines graphs are the fastest growing of any database category since 2013. This growth is fueled in part because many organizations are realizing the value of understanding connections in their data. For companies looking to use a graph database to build behavior and decision-making applications based on real-time evaluation of connected data, there are several key attributes, including integrity, performance, efficiency and scalability.

Posted March 07, 2018

Many organizations talk about data governance, but rather than establishing an ongoing governance process that is involved with every project, the governance is viewed as a one-time task to be slogged through, over with and done. Such myopic approaches will only lead to failure. Data governance is like life, it is the journey, not a destination.Proper data governance brings commonality to an organization; it leads the journey to a single version of the truth. A single version of the truth does not mean everyone must kowtow to a single metric, but it does mean distinct calculations unique to dissimilar sub-groups have different specific names at the corporate level, even if those naming differences are subtle.

Posted March 07, 2018

It's time to submit nominations for the annual Database Trends and Applications Readers' Choice Awards Program in which the winning information management solutions, products, and services are chosen by you—the people who actually use them. This year, there are 28 categories in which to submit nominations.

Posted March 07, 2018

Take advantage of the many opportunities for peer interaction through panel discussions and provocative talks at this year's Data Summit conference. This unique event brings together IT practitioners and business stakeholders from all types of organizations.

Posted March 07, 2018

Startups with a mission to address an unanswered problem continue to emerge in the tech sector. These companies tap into new and still emerging technologies such as cloud, IoT, machine learning, containerization, AI, NoSQL, and blockchain to provide fresh solutions that simply were not possible before.

Posted March 07, 2018

Cisco and Rackspace announced a collaboration to deliver Rackspace cloud customers advanced protection against evolving sophisticated threats. Rackspace is deploying high volumes of Cisco's Next-Generation Firewalls and integrating them directly into its services, helping enable its customers to manage their hosted environments more efficiently and securely.

Posted March 05, 2018

Malware sophistication is increasing as adversaries begin to weaponize cloud services and evade detection through encryption, used as a tool to conceal command-and-control activity. To reduce adversaries' time to operate, security professionals said they will increasingly leverage and spend more on tools that use AI and machine learning, the 11th Cisco 2018 Annual Cybersecurity Report finds. 

Posted March 05, 2018

Waterline Data, a provider of data cataloging solutions and applications, is releasing the Waterline Metadata Discovery Platform, designed to help the petabyte enterprise accelerate the discovery, governance, and use of big data. Based on advanced data virtualization technology, the new solution serves as a platform for multiple applications, from data cataloging for analytics to the newly launched GDPR compliance application.

Posted March 05, 2018

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49

Sponsors