Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

ManageEngine, the real-time IT management company, is adding smart card support to ADManager Plus, its Active Directory management and reporting software solution. Smart cards are a simple and flexible option to help secure user data and set up user or role-based access to organizational data.

Posted October 12, 2016

Cyberattacks happen. How can you recover quickly? If you are in IT management, everywhere you turn, you see warnings of malicious forces working diligently with the one aim of compromising your security and eating your data for lunch. It's not a question of if anymore but rather of when. Many times, the cybersecurity tools will not prevent the break-in, but only alert you of the compromise.

Posted October 12, 2016

SAP is revealing a new version of its SAP Master Data Governance application with updates that include intuitive analytics and enhanced mobile functionality with SAP Smart Business cockpits powered by SAP HANA and new SAP Fiori apps for master data governance. The latest version of SAP Master Data Governance, version 9.0, expands master data consolidation functionality to the material data domain in addition to supplier and customer data.

Posted October 10, 2016

A new world of self-service BI brings with it its own issue of data chaos. When everyone is looking at the data their own way, people find different answers to the same questions.

Posted October 10, 2016

Organizational issues such as governance and skills—not technology requirements—are the greatest challenges that IT and corporate managers are facing in the emerging world of big data. To get a better handle on the complex new world big data is catalyzing, executives and professionals recognize they must reimagine and re-architect the concept of the "data center"—and what ultimately is coming out of may be a surprise to everyone. These are some key takeaways from a recent survey of 319 corporate and IT managers, conducted by Unisphere Research, a division of Information Today, Inc., in partnership with Cloudera and Intel.

Posted October 07, 2016

For many years now, Cassandra has been renowned for its ability to handle massive scaling and global availability. Based on Amazon's Dynamo, Cassandra implements a masterless architecture which allows database transactions to continue even when the database is subjected to massive network or data center disruption. Even in the circumstance in which two geographically separate data centers are completely isolated through a network outage, a Cassandra database may continue to operate in both geographies, reconciling conflicting transactions—albeit possibly imperfectly—when the outage is resolved.

Posted October 07, 2016

Internet of Things (IoT) devices are revolutionizing the way we share data and carry a huge charter to improve our banking, shopping, transportation, patient, and individual care and safety, to name a just a few. The mission is admirable, but with thousands of devices flooding the market, the lack of standards and multitude of security deficiencies are creating an on-ramp to corporate, government, and private networks that is wide open to cyberattacks.

Posted October 07, 2016

Arcserve, a provider of data protection for cloud, virtual, and physical environments, has released its second-generation Unified Data Protection (UDP) Appliance series. Integrated with the Arcserve UDP software, the new appliance series aims to simplify disaster recovery for small or overstretched IT teams that require an enterprise-grade data protection solution.

Posted October 06, 2016

Vormetric, a Thales company, is releasing a new platform called Thales Orchestrator, to help reduce the cost of protecting data at rest across organizations. Thales Orchestrator's features include live data transformation, key management-as-a-service, Bring Your Own (encryption) Key management for AWS with Thales HSMs, vaultless tokenization, and Docker Encryption and Access Controls. Docker data-at-rest encryption and access controls that help to assure container images and file systems are controlled and secure.

Posted October 06, 2016

In his second keynote at Oracle OpenWorld 2016, Oracle executive chairman and CTO Larry Ellison highlighted key features of Oracle's recent product announcements. While in his first keynote, Ellison identified Amazon for infrastructure and Workday for applications as Oracle's chief competitors, throughout his second presentation, he centered Amazon in Oracle's competitive cross-hairs. In addition, in the 1-hour address, Ellison continued to expand on hybrid on-premise-and-cloud computing, security, and infrastructure as a service capabilities as areas of focus and differentiation in Oracle's ongoing strategy.

Posted October 05, 2016

The rise of big data with new sources of data for analytics represents new opportunity to put data to work in organizations for a wide range of uses. A developing use case for leveraging data analytics on large datasets is fraud discovery.

Posted October 05, 2016

Choosing when to leverage cloud infrastructure is a topic that should not be taken lightly. There are a few issues that should be considered when debating cloud as part of a business strategy.

Posted October 04, 2016

Dell Software Group unveiled an update to its analytics platform Dell Statistica that will help users transform their businesses with analytics. Key features of Statistica 13.2 include new collective intelligence capabilities to enable native integration with open source and application marketplaces, a new user interface designed to mask complexity and simplify workflows for citizen data scientists, and the ability to distribute data preparation and analytic workflows to any edge device or gateway.

Posted October 04, 2016

Zaloni, the data lake company, unveiled new platform updates at Strata + Hadoop World 2016 including new enhancements to Bedrock Data Lake Management Platform and its Mica self-service data preparation solution. Bedrock helps businesses govern and manage data across the enterprise, and Bedrock 4.2 adds new capabilities around data privacy, security, and data lifecycle management.

Posted October 03, 2016

Paxata is releasing Paxata Connect to extend the Paxata Platform with a connectivity framework that creates a nexus to acquire, shape, and publish meaningful data for faster time to value. With Connect, information architects and developers can take advantage of out-of-the-box connectors, build their own repeatable data services and pipelines, and maintain transparency and oversight to ensure data provides a greater and faster return.

Posted September 30, 2016

Attendees of Strata + Hadoop saw their fair share of solutions that tout that they are "next big thing" to solve a multitude of big data problems. Eric Sammer, CTO and co-founder, and Bryce Hein, vice president of Marketing, at Rocana observed that the focus is more on how platforms can help issues rather than the infrastructure behind it.

Posted September 29, 2016

Dataguise announced general availability of the Dataguise DgSecure Dashboard, a dashboard for visualization of all sensitive data throughout the enterprise—including government-protected PII, PHI, and PCI data—and demonstrated the capability at Strata + Hadoop World Conference in New York City.

Posted September 29, 2016

IDERA, a provider of database lifecycle management solutions, has added new capabilities in the latest version of its SQL Secure product, including proactive security and permissions auditing capabilities.

Posted September 27, 2016

At Strata + Hadoop World, Pentaho announced five new improvements, including SQL on Spark, to help enterprises overcome big data complexity, skills shortages and integration challenges in complex, enterprise environments. According to Donna Prlich, senior vice president, product management, Product Marketing & Solutions, at Pentaho, the enhancements are part of Pentaho's mission to help make big data projects operational and deliver value by strengthening and supporting analytic data pipelines.

Posted September 26, 2016

As the details of the Yahoo data breach have come to light, the news seems eerily similar to other such cyber-attacks. Data management and security professionals reflected on what the breach means for companies and their customers in terms of current security best practices.

Posted September 26, 2016

Oracle executive chairman and CTO Larry Ellison presented his annual opening keynote at OpenWorld 2016 on Sunday night. Amid announcements of new products and services, his remarks repeatedly returned to three key themes.

Posted September 21, 2016

In his keynote on Monday at Oracle OpenWorld 2016, Oracle CEO Mark Hurd showcased customer success stories and offered three new predictions for the future of cloud, which, he said, represents a generational shift in the IT market.

Posted September 21, 2016

Cloud is changing how the world interacts with data. A majority of enterprises are considering, and many have already deployed, cloud services for applications, platform, and infrastructure needs.

Posted September 21, 2016

"In this coming year, you'll see us aggressively moving into infrastructure-as-a-service," Larry Ellison, Oracle's chief technology officer and executive chairman of the board, said to kick off the company's OpenWorld conference Sunday night at the Moscone Center. In the first of his two scheduled keynote addresses, Ellison went on to outline a number of strategic announcements that aim to strengthen the company's offerings, as well as to help it compete with Amazon.com, one of its top challengers.

Posted September 19, 2016

To help organizations continue to get the most from their data, Big Data Quarterly has published the second annual "Big Data 50," a list of companies driving big data innovation. The Big Data 50 includes forward-thinking companies that are expanding what is possible in terms of managing and deriving value from data.

Posted September 14, 2016

Hewlett Packard Enterprise (HPE) revealed several new solutions designed to strengthen the approach to intelligent security operations, DevOps, and data protection. "We're providing visibility without boundaries," said Mark Alba, senior director of product marketing for HP Security. "In an intelligent security operations environment, customers need to have access to all types of data in order to establish their security posture, understand what's happening within their environment, and be able to make real-time, fast decisions on how to remediate potential breaches and protect against them."

Posted September 14, 2016

The year 2015 was especially rich in cyberattacks with companies such as T-Mobile, Kaspersky, and Anthem having had their security compromised and all sorts of personal information about users exposed. The urgent need to solve the problem of anomaly detection lies in the fact that any deviation from a general picture showing the current state of the system may carry important information about the existing issue.

Posted September 14, 2016

With the growth of data variety, volume, and velocity, innovative data management approaches are needed. To help organizations get the most from their data, Big Data Quarterly presents the second annual "Big Data 50," our list of companies driving innovation.

Posted September 14, 2016

Can Oracle and its partners keep up with the increasing demands of customers for real-time digital capabilities? Is the Oracle constellation of solutions—from data analytics to enterprise applications—ready for the burgeoning requirements of the Internet of Things (IoT) and data-driven businesses? For Oracle—along with its far-flung network of software vendors, integrators, and partners—times have never been so challenging.

Posted September 07, 2016

The Independent Oracle Users Group (IOUG) is excited to be joining the Oracle technology community in San Francisco once again at Oracle OpenWorld 2016, September 18-22. IOUG's 30,0000+ member community is comprised of the top Oracle technology experts from around the globe, several of whom will be presenting sessions on hot topics like Data Intelligence, iOT, Data Security, and Cloud migrations.

Posted September 07, 2016

Datawatch Corporation unveiled an enhanced version of its self-service data preparation solution, making the platform faster and more intuitive. Datawatch Monarch 13.5 empowers business users and data analysts to overcome traditional data access and preparation challenges by enabling them to easily and rapidly mine data from virtually any source and then manipulate, blend, enrich, and prepare it for use in analytics tools or optimizing manually intensive business processes.

Posted September 07, 2016

Dell has completed the acquisition of EMC, creating a $74 billion company with a technology portfolio spanning hybrid cloud, software-defined data center, converged infrastructure, platform-as-a-service, data analytics, mobility and cybersecurity. Describing itself as the world's largest privately-controlled technology company, the combined entity will be known as Dell Technologies.

Posted September 07, 2016

SVA Software, a provider of storage performance management software, announced its company launch in North America along with a new partner program to capitalize on the demand for its BVQ storage optimization solutions, intended to simplify the management of virtualized data center operations.

Posted September 06, 2016

Being able to deliver a rapid response to problems is a core need for the modern enterprise. While many network "issues" can suffer a delay in response time, true problems such as security breaches and network outages cannot. Let's look at two situations that require a rapid response, five questions that IT never wants to hear, and one example of a solution that IT can implement.

Posted August 24, 2016

While Hadoop can store and access vast amounts of detailed data at lower costs, businesses are still encountering high-performance demands and they face a bevy of business questions. Emerging in-memory frameworks, such as Apache Spark and SAP HANA Vora, are enabling enterprises with the tools to overcome the limitations of batch-oriented processing and achieve real-time, iterative access to data on Hadoop clusters.

Posted August 24, 2016

EMC has unveiled new products and support to optimize the protection of VMware workloads to enable protection everywhere. The enhanced support spans VMware Virtual SAN, VMware vSphere and expanded data protection options for VCE VxRail Appliances.

Posted August 23, 2016

Perhaps the biggest and most overlooked is how to create accurate test data. You're implementing a new system in order to deal with a massive amount of data, and perhaps your relational database can't handle the volume, so it's vitally important to properly test this new system and ensure that it doesn't fall over as soon as the data floods in.

Posted August 23, 2016

HyTrust Inc. has added enhanced capabilities for its workload security platform to support organizations with virtualized, public, private or multi-cloud environments for popular cloud technologies including Amazon Web Services, IBM, EMC, Intel, Microsoft and VMware. The releases, HyTrust DataControl 3.2 and HyTrust CloudControl 5.0, are intended to address data center complexity.

Posted August 22, 2016

Waterline Data, the Smart Data Catalog company, is releasing an enhanced version of its Smart Data Catalog, allowing users to gain easier self-service access to trusted, high quality data for faster discovery, understanding, use and governance.

Posted August 17, 2016

Regulatory compliance is a critical aspect of the IT landscape these days, and the ability to audit database activities showing who did what to which data when is a specific requirement of many industry and governmental regulations. There are six primary methods that can be used to accomplish database auditing.

Posted August 16, 2016

MuleSoft is teaming up with Pivotal to deliver application networks on the Pivotal Cloud Foundry platform. Customers who want to create a network of applications, data, and devices using MuleSoft can now deploy to Pivotal Cloud Foundry and manage their application network with Anypoint Platform.

Posted August 10, 2016

Nimbus Data is releasing a new all-flash platform for cloud, big data, virtualization, and massive digital content that will offer unprecedented scale and efficiency.

Posted August 09, 2016

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39

Sponsors