Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

Not too long ago, large volumes of information were available only to the select few organizations able to afford the expensive IT infrastructure to collect, store, manage, and analyze it—the big-budget companies with seemingly bottomless pockets, or the professional research services that built empires on collecting and interpreting data. But now, through the realized effects of Moore's law, along with the consumerization of BI tools, this data is increasingly available to everyone—and without having to dig deep into budgets or employ robust IT departments.

Posted November 13, 2015

A typical organization loses about 5% of its revenues to fraud each year. The total cost of non-health insurance fraud in the U.S. is estimated to be more than $40 billion per year. These numbers stress the importance and need of finding sophisticated tools to both detect and prevent fraud. Big data and analytics offer a new valuable toolkit in the fight against fraud.

Posted November 13, 2015

At Oracle OpenWorld each year, there are significant announcements about Oracle products and insight provided on key areas of focus for the future. Melissa English, president of the Oracle Applications Users Group (OAUG), recently reflected on some of the key developments at the 2015 OpenWorld conference and their relevance for OAUG members. In particular, said English, "Oracle's announcements about continuing to support on-premises apps for the next 10 years and beyond are significant."

Posted November 12, 2015

Credit card fraud is on the increase and identity theft is growing. In a new white paper about fraud in the modern world, Mike Ferguson of Intelligent Business Strategies writes about the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can help reduce risk exposure and loss from fraud.

Posted November 11, 2015

Dell expanded its PowerEdge 13th generation servers with the introduction of four new entry-level servers that provide greater performance, flexibility and efficiency for small and midsize businesses (SMBs). The latest Dell PowerEdge servers are designed to address the top IT pain points of SMBs which Dell says are performance, hardware capacity, and IT complexity. The new Dell PowerEdge servers include the PowerEdge R330 and R230 rack servers and the PowerEdge T330 and T130 tower servers.

Posted November 11, 2015

Informatica has announced a new big data management solution called Informatica Big Data Management that brings together big data Integration, big data quality and governance, and big data security in a single integrated solution. According to the vendor, while more than 67% of enterprises see the big opportunity in big data, the majority of big data projects fail. The new Informatica solution aims to help organizations more effectively overcome the data management challenges that are often at the root of big data project failures. In addition, Informatica Big Data Management is also designed to reduce the need for hand-coding and big data skill sets that are expensive and hard to come by.

Posted November 10, 2015

Splunk, which provides operational intelligence, is making major changes to its key platforms, delivering out-of-the-box capabilities driven by machine learning and advanced analytics to help detect cyberattacks and insider threats. "We've significantly improved the ability for our customers to both detect and respond to breaches," said Robert Ma, Splunk senior director of security markets.

Posted November 10, 2015

The concept of the data lake has become a hot topic. The data lake retains data in its original format to allow the data to be more flexible for everyone involved. While this sounds fine in theory, it is a more complicated in practice due to the need for governance and security.

Posted November 09, 2015

The DBA's role is becoming increasingly complex and now often involves managing data both on premise and in the cloud, and in a variety of database management systems including not only traditional relational systems such as Oracle, SQL Server, MySQL and others, but also new open source and NoSQL technologies, according to Gerardo Dada, vice president of product marketing, at SolarWinds.

Posted November 09, 2015

Progress announced the latest release of its application development platform, with new features targeted at enterprise mobile capabilities. The Telerik Platform for OpenEdge applications enables users to extend OpenEdge applications with advanced mobile app development capabilities, test and deployment features, as well as JavaScript Data Objects (JSDO) for integration of mobile apps with existing Progress OpenEdge business logic.

Posted November 09, 2015

Oracle has announced that the new Oracle Exadata Database Machine X5-8, the latest in the X5 family of engineered systems which integrate hardware and software, is now available. The new Exadata X5-8 offers up to 576 CPU cores, more than 1.3 petabytes of disk storage or 180 terabytes of PCIe flash, and up to 24 terabytes of memory. The Oracle Exadata X5-8 is the new companion model to Oracle Exadata X5-2 and incorporates the same storage and networking capabilities of Oracle Exadata X5-2, which was announced in January 2015.

Posted November 04, 2015

Following its separation from Hewlett-Packard Company, Hewlett Packard Enterprise made its debut today as an enterprise technology provider with $53 billion in annual revenue and a comprehensive product portfolio. HP announced plans to separate into two new publicly traded companies a year ago with one including HP's enterprise technology infrastructure, software and services businesses, doing business as Hewlett-Packard Enterprise, and the other comprising HP's personal systems and printing businesses, operating as HP Inc. and retain the current logo.

Posted November 02, 2015

Until the safe harbor agreement between U.S. and Europe was ruled invalid recently in a European court, it was understood that for any European company the U.S. was safe, and the data security in the U.S. was acceptable. But the recent ruling by the European Court of Justice says that is "actually not true," said Andreas Gauger, chief marketing officer and cofounder of Profitbricks, a cloud computing IaaS company. Now, a new agreement will have to be forged between the different entities. "Now that band-aid has been ripped off and the wound is open. Now they have to sit down and finally agree on something."

Posted October 28, 2015

SearchYourCloud (SYC), a provider of a patented federated search and security application, is entering an OEM agreement with SAP, allowing SYC to integrate and offer the capabilities of SAP HANA Cloud Platform with the SearchYourCloud Server.

Posted October 28, 2015

The latest IBM quarterly results (for Q3 2015), show that the mainframe continues to be a leading revenue producer for Big Blue. The reasons for this are evident, according to a new survey of mainframe sites conducted by our friends at BMC, which shows that security, availability, a superior data server, and transactional throughput are the primary drivers for the continued increase in mainframe capacity, which is especially timely as the digital economy increasingly runs on transactions.

Posted October 26, 2015

At Oracle OpenWorld 2015 Oracle announced new Oracle Database Cloud offerings, expanding its portfolio of Oracle Cloud Platform, services that enable organizations to deliver reliable, scalable, and secure database-driven solutions and applications in the cloud.

Posted October 26, 2015

Enterprise data security provider Protegrity has announced that it has earned Oracle Exadata Optimized status through the Oracle PartnerNetwork (OPN), demonstrating that Protegrity Database Protector for Oracle Exadata is recognized as having been tested and tuned on Oracle Exadata Database Machine to deliver speed, scalability and reliability to customers.

Posted October 21, 2015

In the 1989 movie, "Back to the Future Part II," actor Michael J. Fox's character traveled in time to October 21, 2015. And today, October 21, 2015, in his keynote at Dell World 2015 in Austin, Michael S. Dell, founder and CEO of Dell, expanded on what it means for organizations to be future-ready, and what Dell is doing to help. Referring to the recently announced plans for Dell to acquire EMC in a deal valued at $67 billion, Dell said, "I started this company 32 years ago, just a few blocks from here in my dorm room, building PCs. And as I speak to you here today with this agreement in place Dell is set to become an enterprise solutions powerhouse."

Posted October 21, 2015

Thales, a French multi-national company, has signed a definitive agreement to acquire Vormetric, a provider of data protection solutions in physical, virtual and cloud infrastructures, for $400 million. The transaction is expected to close in the first quarter of 2016.

Posted October 20, 2015

As more and more applications, websites, and basic smart home devices ask users permissions for their data, people are starting to wonder where their information is going. The question of privacy, the Internet of Things, and what companies do with an individual's personal information was the subject of two different sessions at Strata + Hadoop World in NYC.

Posted October 13, 2015

In what is being hailed as the biggest tech merger ever, Dell Inc. and EMC Corp. today formally announced they have signed a definitive agreement under which Dell will acquire EMC. The total transaction is valued at $67 billion. The deal is expected to close in the second or third quarter of Dell's fiscal year which ends February 3, 2017 (within the months of May to October 2016). The industry is going through a "tremendous transformation," with the old style of IT being "pretty quickly disrupted" yet this rapid change is also presenting "incredibly rich" opportunities, said Joe Tucci, chairman and chief executive officer of EMC, during a conference call with media and industry analysts.

Posted October 12, 2015

IBM has entered into a definitive agreement to acquire Cleversafe, Inc., a developer and manufacturer of object-based storage software and appliances. The acquisition will enhance IBM's positions in storage and hybrid cloud.

Posted October 12, 2015

Prior to SQL Server 2016, currently in CTP, your main method for encrypting a SQL Server application was to use a feature called Transparent Data Encryption. TDE provides strong encryption, but with some shortcomings. First, you have to encrypt an entire database. No granularity is offered at a lower level, such as encrypting specific tables or certain data within a table. Second, TDE encrypts only data at rest, in files. Data in memory or in-flight between the application and server are unencrypted. Enter Always Encrypted.

Posted October 07, 2015

DataTorrent is teaming up with two big companies that will allow it to provide access to better security and make adoption of Hadoop easier. DataTorrent is partnering with Cisco to allow integration between its DataTorrent RTS platform and Cisco's Application Centric Infrastructure (ACI) through the Application Policy Infrastructure Controller (APIC), offering a unified management architecture for enterprises to manage their big data applications along with network and security. DataTorrent is also integrating its platform with Microsoft Azure HDInsight via the Microsoft Azure Marketplace.

Posted September 29, 2015

Cloudera has launched a public beta release of RecordService, a new high-performance security layer for Apache Hadoop that centrally enforces role-based access control policies across the platform. Complementing Apache Sentry (incubating), which provides unified policy definition, RecordService delivers complete row- and column-based security, and dynamic data masking, for every Hadoop access engine. The announcement was made at Strata + Hadoop World in New York City.

Posted September 28, 2015

IBM introduced a new cloud security technology that helps safeguard the increasing use of "bring-your-own" cloud-based apps at work. Cloud Security Enforcer combines cloud identity management (Identity-as-a-Service) with the ability for companies to discover outside apps being accessed by employees, including those they are using on their mobile devices. These combined capabilities enable companies to equip their workforce with a secure way to access and use the apps that they want.

Posted September 28, 2015

Join this webcast, as Bradmark welcomes guest presenter Peter Thawley, Vice President & Chief Technology Advisor, ASE Engineering, HANA Platform & Databases, SAP Products & Innovation, who will discuss how key SAP customers are solving this broad dilemma.

Posted September 23, 2015

Datos IO has announced a recovery platform for next-generation scale-out databases. The company, headquartered in San Jose, Calif., was founded by former Data Domain (EMC), Veritas and IBM Research veteran Tarun Thakur, CEO, and Prasenjit Sarkar, CTO, who spent more than 15 years at IBM Research. The company is now offering its Early Access Program (EAP), and the product will is planned to be generally available in 2016.

Posted September 22, 2015

MongoDB deepened its partnership with IBM, announcing plans to offer support for MongoDB's products on IBM z Systems mainframe. This support reflects the strong momentum for mission critical deployments of the database by adding support for the speed, security and availability of z Systems.

Posted September 16, 2015

There are a lot of moving parts that data managers and professionals need to attend to in today's enterprises. Here are the eight things that matter the most in today's market.

Posted September 09, 2015

It's no secret that the world of information technology is changing fast. Data is being created in ways not possible a few years ago. It is now feasible to collect and analyze data from a wide range of sources, including mobile devices, machines, social media, documents, and emails. To help organizations navigate the rapidly changing big data landscape, Big Data Quarterly presents the "Big Data 50," a list of companies driving innovation.

Posted September 09, 2015

IBM reports that nearly 15 petabytes of data are created every day; eight times greater than the amount of information stored in all of the libraries in the U.S. To keep up, enterprises are deploying web-scale architectures that enable virtualization, compute and storage functionality on a vast scale.

Posted September 08, 2015

Oracle has expanded its flash storage portfolio with the announcement of an all-flash model of its Oracle FS1 Flash Storage System. Designed to handle concurrent mixed workloads, such as OLTP and high-speed data backup, in enterprise SAN environments as well as in private or public clouds, the system delivers up to 64 all-flash domains, and enables secure data isolation in multitenant cloud environments.

Posted September 02, 2015

With the release of Oracle Cloud Platform 2015 and new Oracle Cloud Platform Services, things are clouding up across the Oracle landscape—but in a positive way. Larry Ellison, chairman and chief technology officer for Oracle, has made it clear in pronouncements that Oracle is in the cloud to stay.

Posted September 02, 2015

At VMworld going on in San Francisco this week, Unitrends, a provider of enterprise-level cloud recovery, introduced Unitrends Free support for the free VMware vSphere Hypervisor (ESXi).

Posted August 31, 2015

Many enterprises are vulnerable to losing business or revenue despite an investment in governance, risk and compliance (GRC) and companies are not satisfied with their solutions to meet regulations, according to a new study commissioned by SAP.

Posted August 26, 2015

Unless you've been living under a rock, you've heard Microsoft has introduced the initial release of Windows 10. Windows 10 has been a widely anticipated release on the part of consumers and business alike, with Microsoft aiming to deploy Windows 10 on more than one billion devices within the next few years. Here are 10 technical and market reasons why Windows 10 will become Microsoft's biggest release ever.

Posted August 26, 2015

Hundreds of enterprise IT professionals converged in Orlando, August 9th-14th, for the annual SHARE summer conference, which featured more than 500 educational sessions. "Mainframe data is growing tremendously and companies want to utilize it," said James Vincent, president of SHARE. "They are investing in data analytics," he added. "But data security and privacy are really growing in importance."

Posted August 25, 2015

Some industry pundits have been speculating that with cloud and IT automation, the need for database administrators (DBAs) is going to fade. However, this is far from reality. In fact, the DBA is even more vital than ever to enterprises—and the jobs of DBAs are evolving rapidly to meet new challenges and technology paradigms.

Posted August 19, 2015

The Independent Oracle Users Group is headed to San Francisco this October to join the Oracle technology community at Oracle OpenWorld 2015. Representing the voice of Oracle technology professionals, IOUG members will present more than 35 sessions on critical Oracle technology topics, including big data, cloud, Oracle Enterprise Manager 12c, and more. There is a lot to discuss with the Oracle database and technology community, and I am looking forward to connecting with Oracle professionals with similar interests to address challenges and solutions face-to-face.

Posted August 19, 2015

Innovative Routines International (IRI) has released an enterprise-class, data-centric protection solution for corporations storing personally identifying information (PII) in Excel 2010 and 2013 spreadsheets. The IRI CellShield Enterprise Edition provides a full-featured, professional compliance package for Excel workbooks that can locate and automatically protect sensitive data across a network.

Posted August 18, 2015

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39

Sponsors