Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

Dashlane, a provider of online identity management software, is collaborating with Intel to deploy Intel Software Guard Extension (SGX) technology with Dashlane's password manager.

Posted January 03, 2017

Our friends at SpiceWorks recently shared some of their data from 900 IT buyers with us. For the year ahead, mobile computing, security, and IT automation are topping IT spending agendas. However, expect IT budgets to remain relatively flat—with the exception of cloud services, storage and IT consulting services. Overall, new IT purchasing won't be automatic—it will only happen as systems reach their end of life, or a significant new business requirement emerges.

Posted January 03, 2017

Rocana is releasing Rocana Ops 2.0, updating its event alerting and orchestration capabilities, offering unique visual experience for first responders, and providing wider cloud platform visibility. Now with Rocana Ops 2.0, IT teams can take real-time intelligent action on all of their event data. Rocana Reflex is a new event alerting and orchestration system that enables operations teams to provide smart, instant, and automated reactions based on what is happening in their environment.

Posted January 03, 2017

There was a time when what you saw was what you got. Building up the components of a business intelligence area was very straight-forward. A staging area was a staging area; an operational data store was an operational data store. But like buying a pitcher of beer for $2, or gas for less than a dollar per gallon, those days are gone. The dynamics have changed, things are more federated, and IT must accept more than one standard tool.

Posted January 03, 2017

One of the long-standing differentiators between SQL Server's Enterprise Edition (EE) and Standard Edition (SE), besides price, were the large number of features available only in EE. This is also true for other lower editions of SQL Server such as Web Edition and Express Edition. But there's big news in the air!

Posted January 03, 2017

The past year was a blockbuster one for those working in the data space. Businesses have wrapped their fates around data analytics in an even tighter embrace as competition intensifies and the drive for greater innovation becomes a top priority. The year ahead promises to get even more interesting, especially for data managers and professionals. Leading experts in the field have witnessed a number of data trends emerge in 2016, and now see new developments coming into view for 2017.

Posted January 03, 2017

As enterprises accelerate their movement of data into the cloud, a slew of new challenges are presenting themselves on the security front. For users of external or public cloud services, the risks are well understood. However, private and hybrid clouds are not immune to security vulnerabilities either. Thanks to private clouds, data is proliferating across various parts of the enterprise, along with the potential for insider abuse, according to a new Unisphere Research report.

Posted January 03, 2017

MicroStrategy, a provider of enterprise software platforms, has announced the general availability of MicroStrategy 10.6, the newest feature release to the company's MicroStrategy 10 platform. The latest release offers several new features across MicroStrategy Desktop, MicroStrategy Web and MicroStrategy Mobile.

Posted December 21, 2016

IT management is at the front lines of ensuring its enterprise infrastructure is optimized and cost effective in order to deliver critical services. In a recent DBTA roundtable webinar, Wally Waltner, director of global IT asset management (ITAM) at First Data, and Cathy Won, product marketing director from BDNA, discussed tips and tricks for how to manage all types of data, and offered insight on how to leverage a ITAM project for other cost cutting and risk management initiatives.

Posted December 20, 2016

By now it's well documented that employees will take IT tasks into their own hands when IT cannot give them the support they need, and when they need it. The phenomenon is ubiquitous and persistent, even to the point that it's been dubbed "shadow IT." Gartner recently noted that by 2020, a third of successful attacks experienced by enterprises will be on their shadow IT resources.

Posted December 14, 2016

As 2016 comes to a close, experts at SAP are looking ahead at what 2017 may offer. Ken Tsai, vice president, head of cloud platform and data management, product marketing, at SAP, and David Jonker, senior director, product marketing, at SAP, foresee several trends on the horizon that the company will tackle moving forward.

Posted December 14, 2016

IT operations teams have been furiously preparing for this year's holiday season - the retail industry's busiest time of the year for web traffic. Here is a checklist of the key factors IT operations teams need to consider to ensure their IT infrastructure is ready now - and stays that way throughout the shopping season.

Posted December 14, 2016

ZeroPoint technology focuses on analyzing documents, email, web content and server traffic for hazardous content such as malicious code

Posted December 13, 2016

The past year has seen big data get bigger, complex systems get more complex, and cloudy systems get cloudier. The coming year guarantees more of the same. We wish all our readers a happy holiday season, and look forward to serving you in 2017!

Posted December 12, 2016

Thales, a provider of cybersecurity and data security solutions, has added new capabilities for its Vormetric Data Security Platform. The new capabilities extend data-at-rest security with integrated Docker encryption and access controls, the ability to encrypt and rekey data without having to take applications offline, FIPS certified remote administration and management of data security policies and protections, and the ability to accelerate the deployment of tokenization, static data masking and application encryption.

Posted December 09, 2016

It has become all too clear that no organization is immune from the risk of a data breach, and that anyone accessing data can pose a threat - including trusted employees and partners. Here, IT executives speculate on the impact newer technologies such as IoT, blockchain, and cloud, as well as the need for data protection, including disaster recovery plans, encryption, and comprehensive oversight.

Posted December 07, 2016

Terms such as "active," "inactive," and "canceled" may seem mundane and inconsequential, and when folks hear the term,"valid values," their eyes glaze and expectations of interest diminish. But exciting or not, reference values and an understanding of them are important to every organization.

Posted December 01, 2016

To shed light on the enterprise and technology issues IT professionals will be facing in 2017 as business or organizational leadership seeks strategies to leverage the "big data" phenomenon, the fourth annual edition of the Big Data Sourcebook is now available for download.

Posted December 01, 2016

It is not uncommon for a medium-to-large company to have 50 or more different security technologies in place. While fiscally inefficient, this approach has been somewhat effective up to this point in dealing with the types of attacks launched against it. But the threat landscape is currently changing more rapidly than ever, forcing businesses to shift to a more forward-thinking security model.

Posted December 01, 2016

Yellowfin, business intelligence (BI) and analytics software vendor, is launching a virtualized data preparation module for analytics, fully integrating it into the metadata layer of its BI platform. Yellowfin's Data Preparation Module will enable organizations to model, profile, clean, shape, enrich, secure, and publish all data for reporting and analytics in a single BI environment.

Posted December 01, 2016

Dataguise - through its DgSecure platform - is now supporting sensitive data discovery on Amazon Redshift and Amazon RDS, as well as Amazon Simple Storage Service (S3). The platform will now scan for sensitive information stored on Amazon Redshift, RDS, and S3 and provide ongoing monitoring of sensitive data in S3 throughout its lifecycle.

Posted December 01, 2016

What's ahead for 2017 in terms of big data and IoT? IT executives reflect on the impact that Spark, blockchain, data lakes, cognitive computing,AI and machine learning, and other cutting-edge approaches may have on data management and analytics over the year ahead.

Posted November 30, 2016

SUSE is acquiring OpenStack IaaS and Cloud Foundry PaaS Talent and Technology Assets from HPE. The agreement aims to accelerate SUSE's entry into the growing Cloud Foundry Platform-as-a-Service (PaaS) market.

Posted November 30, 2016

Splice Machine is releasing an updated version of its signature platform for intelligent applications, strengthening its ability to run enterprise-scale transactional and analytical workloads. Version 2.5 of the Splice Machine platform introduces new abilities including columnar external tables that enables hybrid columnar and row-based querying; in-memory caching via pinning; statistics via sketching; and offers cost optimized storage for AWS users.

Posted November 30, 2016

Databricks, the company founded by the creators of the Apache Spark project, has introduced a Health Insurance Portability and Accountability Act (HIPAA)-compliant Apache Spark, cloud-based platform. The announcement was made today at the 2016 Amazon Web Services (AWS) re:Invent conference.

Posted November 30, 2016

Reltio, an enterprise data-driven applications and modern data management platform as a service (PaaS) company, announced it has earned HITRUST CSF Certification status for information security by the Health Information Trust Alliance (HITRUST) for Reltio Cloud.

Posted November 29, 2016

CA Technologies is incorporating predictive analytics capabilities for monitoring data that touches the mainframe. CA Mainframe Operations Intelligence is a new algorithms-based solution suite that identifies and predicts system issues before they impact performance. Machine learning is applied to make sure there is no downtime and provides the intelligence that reduces the effort and skill to run data centers.

Posted November 28, 2016

IBM has announced the launch of a global practice that will feature 1,500 experts across IBM Watson IoT solutions. The service, IBM Watson IoT Consulting Solutions, integrates IBM Watson IoT Platform APIs and technologies, including cognitive, analytics, mobile, security and cloud capabilities, together with development and implementation consulting and ongoing support.

Posted November 28, 2016

Resilient, an IBM Company unveiled the results of a new survey which found that only 32% of IT and security professionals feel their organization is ready for a cyberattack - down slightly from 35% in 2015. The annual Cyber Resilient Organization study also found that 66% of respondents say their organization is not prepared to recover from cyberattacks.

Posted November 28, 2016

Mentis, an enterprise data security provider, announced a new release of its platform, designed to improve security in critical data stores such as unstructured data, data in the cloud, and data in mainframe databases. Mentis 8 includes data security solutions tackle sensitive data risk along the full information lifecycle.

Posted November 28, 2016

Symantec Corp. and LifeLock, Inc. recently announced they have entered into a definitive agreement for Symantec to acquire LifeLock for $2.3 billion in enterprise value. The deal is expected to close in the first calendar quarter of 2017.

Posted November 28, 2016

At CA WORLD '16, CA Technologies announced two new security solutions. CA Threat Analytics for PAM, a new behavior analytics solution that integrates with CA Privileged Access Manager (PAM), features machine-learning capabilities for better threat detection and breach prevention associated with privileged users. In addition, CA Identity Service, a new, turn-key identity-as-a-service solution, has been introduced to address identity and access management (IAM) needs for both on-premises and cloud-based applications.

Posted November 21, 2016

Compuverde, a provider of software-defined storage solutions, based in Sweden, has released its Metro cluster, a high-availability solution designed to tolerate the loss of an entire data center with zero downtime.

Posted November 18, 2016

Aerospike, a provider of NoSQL solutions, is releasing a new version of its Aerospike platform, transforming how organizations store, access, and analyze data. The new version of Aerospike includes features such as SortedMap, durable delete, IPv6, improved cluster management, and updated network naming.

Posted November 17, 2016

Introduced at Oracle OpenWorld, Oracle's new MySQL Cloud Service provides the benefits of MySQL Enterprise Edition through the Oracle Public Cloud. Diby Malakar, a vice president of product management at Oracle, recently discussed the latest database service from Oracle.

Posted November 16, 2016

BMC, a provider of IT solutions for the digital enterprise, has announced enhancements to its BMC Discovery solution to improve its interaction with other systems while also increasing security and efficiency. Using a RESTful API, BMC Discovery v11.1 now provides an open platform enabling other systems to take advantage of discovery data and drive discovery configuration. The new version also leverages integration with the CyberArk Privileged Account Security Solution to manage and secure privileged access to scanned environments.

Posted November 16, 2016

Many providers of cloud services market the idea that all critical computing functions should be run using their public cloud services because this paradigm is the future and the future is now. While we do share that long-term vision, the reality is less impressive, and the solution is not yet complete. Amazon itself does not run 100% of its critical business systems in the AWS Public Cloud, a fact that was revealed in The Wall Street Journal article, "Cloud-Computing Kingpins Slow to Adapt to Own Movement." This is also true for Google, Microsoft, and other top cloud providers.

Posted November 15, 2016

Data has become a disruptive force for global businesses and a catalyst for digital transformation. But data can only be leveraged for BI initiatives to the extent it can be accessed and trusted. And, while today's self-service BI and analytics tools satisfy a user's craving for more "consumerized" technology, they often leave an analyst stuck in neutral because the users, first and foremost, cannot find the data they need to perform any analysis.

Posted November 02, 2016

Redis Labs, the home of Redis, is introducing an open source project called Redis-ML, the Redis Module for Machine Learning. The new project will accelerate the delivery of real-time recommendations and predictions for interactive apps in combination with Spark Machine Learning (Spark ML).

Posted November 01, 2016

IBM has signed a definitive agreement to acquire Sanovi Technologies, a privately held company that provides hybrid cloud recovery, cloud migration and business continuity software for enterprise data centers and cloud infrastructure. Financial details of the deal were not disclosed.

Posted October 31, 2016

With data flowing into enterprises from so many different sources, and at varying speeds and times, effective solutions are needed to enable insights to be uncovered for faster decision making. To delve into the issues involved in making big data usable more quickly within organizations, DBTA recently presented a webinar featuring executives from the Federal Home Loan Mortgage Corp., known as Freddie Mac.

Posted October 27, 2016

It can be easy for those of us who live and breathe MultiValue databases every day to forget the outside world exists. After all, we're all so busy juggling massive amounts of data and programming requests that we sometimes tune out other important factors that can affect how well IT organizations function. One of the main issues most commonly overlooked is disaster recovery, which is often treated with an "out of sight, out of mind" mentality as we deal with more pressing issues. In fact, high availability/disaster recovery should be a critical part of every MultiValue deployment.

Posted October 26, 2016

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44

Sponsors