Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

Wind and water pose their own unique threats to data centers - and, as more than one pundit has observed, we seem to be experiencing a "storm of the century" every few years. Fortunately, there are approaches companies can take to mitigate risk.

Posted March 26, 2014

Be sure to nominate your favorite vendors' products now. The nominating process for the Database Trends and Applications' Readers' Choice Awards is well underway, and will conclude on Friday, March 28, 2014.

Posted March 24, 2014

Organizations should exercise caution when it comes to implementing new technologies for data governance. Sometimes, the lowest tech solution is the best one and spending money on more software without laying the groundwork actually sets companies up to fail.

Posted March 20, 2014

You have until April 11 to take advantage of special pricing for DBTA's Data Summit, which will take place at the New York Hilton Midtown, from May 12 to May 14. Providing an intensive 2-day immersion into critical technologies for becoming a data-driven enterprise, IT practitioners and business stakeholders alike will benefit from Data Summit.

Posted March 18, 2014

Attachmate Reflection 2014, the newest version of Attachmate's terminal emulation software, provides enterprise customers with support for advanced security protocols and the Windows 8.1 operating system, as well as features that make it easier to access legacy applications from mobile devices.

Posted March 17, 2014

Embarcadero, a provider of software solutions for application and database development, is acquiring CA Technologies' ERwin Data Modeling solution. The acquisition will provide Embarcadero additional channel partners. ERwin is sold almost exclusively through more than 500 partners in over 70 countries.

Posted March 17, 2014

New integration between the Vormetric Data Security platform and IBM QRadar provides companies with automated data access pattern analysis, enabling them to identify potential threats to sensitive data at the source. The combined solution identifies unauthorized data access attempts - indicating accounts that represent a possible threat - and includes capabilities to monitor and alert on data access patterns that may indicate the presence of an Advanced Persistent Threat (APT) or a malicious insider attack.

Posted March 13, 2014

Database disaster recovery must be an integral component of your overall business recovery plan. Just because your organization has not yet experienced a disaster, or is not in a high-risk area, does not absolve you from the need for contingency planning. Here is what all DBAs should do to be prepared.

Posted March 12, 2014

Much of the information contained in databases is sensitive and can be sold for cash or, such as in cases of theft by a disgruntled employee or by a hacker with political motivations, to cause the organization loss of business or reputation, especially if the organization is found to be in breach of regulations or industry standards that demand high levels of data security. However, there are 5 key steps that can be taken to ensure database security.

Posted March 12, 2014

Data Summit will take place at the New York Hilton Midtown, from May 12 to May 14. The advance program is now available and registration is open with a special early bird registration rate when you register before April 11, 2014.

Posted March 12, 2014

Rogue IT practices have grown exponentially with the use of public cloud services. Will these herald the end of internal IT or a means for healthy IT transformation? The risk exists for either outcome. It all depends on how IT organizations approach it.

Posted March 12, 2014

To recognize the best information management solutions in the marketplace, Database Trends and Applications has launched the DBTA Readers' Choice Awards, a program in which the winners will be selected by the experts whose opinions count above all others - you. The nominations period will conclude on March 28, 2014, and voting will begin on April 11.

Posted March 12, 2014

KnowBe4 has announced the latest release of KnowBe4 Compliance Manager, a cloud-based audit and compliance workflow automation tool which now includes self-assessment capabilities.

Posted March 11, 2014

McAfee, a provider of security solutions and services for systems, networks, and mobile devices, has improved its capabilities for finding, freezing, and fixing advanced threats faster to thwart targeted attacks. The McAfee solution binds and shares threat intelligence and workflows across endpoints, network and the cloud , resulting in a level of protection that the company says cannot be achieved with individual point products.

Posted March 05, 2014

Informatica Cloud Spring 2014, the latest Infomatica software release, introduces Informatica Cloud Designer which brings Informatica's integration design tools into a 100% cloud-based design environment.

Posted March 04, 2014

Teradata and EMC have collaborated to provide a certified backup and recovery approach for Teradata Database customers. The Teradata and EMC partnership was formed in October 2013 when Teradata certified the Data Domain Operating System 5.4. Teradata has also just certified EMC's latest product - the Data Domain DD720 - bringing greater backup performance improvements to customers.

Posted March 03, 2014

AvePoint Compliance Guardian Service Pack (SP) 2, the latest release of AvePoint's enterprise platform for managing information, availability, risk, and compliance adds support for cloud and social platforms, improved incident tracking and management and encryption and redaction.

Posted February 28, 2014

In many ways, IT protection is like a game of poker. There are two things you need to win: a strong ability to play and the best hand you can get. With the former, a lot of it comes down to knowing what not to do.

Posted February 26, 2014

These days, companies have more and more of their applications and data being accessed through mobile devices. To enable secure access to sensitive enterprise applications and data on mobile devices, Oracle rolled out the Oracle Mobile Security Suite, which, combined with Oracle's existing Identity and Access solutions, aims to deliver an integrated platform for managing access to all applications from a complete range of device types.

Posted February 26, 2014

In the last several years, there has been an explosion in the array of choices for not only managing relational and unstructured data but also protecting it and extracting value from it. To shine a spotlight on the best data management offerings, DBTA will soon open nominations for our first-ever Readers' Choice Awards.

Posted February 26, 2014

Mission-critical applications in the banking, education, retail, healthcare, oil and gas, government, and travel industries depend on trusted MultiValue database systems. Yet, new requirements are emerging for MultiValue technology vendors to support integration with other enterprise data sources, enable mobile and web access, provide comprehensive business intelligence, and enforce greater security. In this special report, executives of seven leading MultiValue companies discuss how they are responding to their customers' evolving needs.

Posted February 26, 2014

There are reports circulating that Target's point-of-sale files may have been compromised as a result of a phishing email breach that took place at a third-party heating and air-conditioning vendor's site. An employee of the maintenance firm may have opened the malware-infested file, which then infected Target's systems. Whether or not this turns out to be the case, it points to a vulnerability seen in many IT systems - lax security procedures among third-party partners … another lesson in the Achille's Heel of many corporate networks.

Posted February 18, 2014

Extending Imperva's data center security strategy across the cloud, the company is acquiring cloud security gateway startup Skyfence, and also intends to acquire the remaining shares of cloud-based web application security company Incapsula. Imperva's new strategy is intended to address security gaps within various cloud deployment models.

Posted February 18, 2014

To help secure sensitive data, including regulated and high-risk data like medical, payment, insurance and financial data, Gazzang is providing data encryption and key management support for Pivotal HD, the Hadoop distribution from Pivotal.

Posted February 11, 2014

A new report provides an accurate and consistent assessment of current enterprise database management practices, solutions and tools in use, and the important challenges facing database administrators and their organizations. The report is based on an Oracle-sponsored survey conducted by Unisphere Research, the research arm of Datbase Trends and Applications (DBTA).

Posted February 11, 2014

There's no doubt that the management at Target had a miserable holiday season at the end of last year, between all the bad PR that came out about the online theft of 40 million customers' data records—later revised to be even higher—and the costs of providing disclosures and working with banks, and the headaches of potentially expensive lawsuits that are being filed. Such is every organization's nightmare, the price of openness and accessibility. According to a new survey of 322 data and IT managers, there is a growing awareness among enterprise executives and managers about the potential issues to enterprise data security.

Posted February 10, 2014

A new Virtual Appliance from Axcient enables organizations to protect data and replicate to the cloud without the need to purchase onsite hardware. The new virtual appliance is designed for VMware environments, and gives businesses access to Axcient's recovery-as-a-service cloud for rapid recovery of information, applications, and IT infrastructures.

Posted February 10, 2014

DocAve Online, AvePoint's software-as-a-service platform for Microsoft Office 365 management, has added enhanced data protection, governance, and reporting to help companies improve the protection and control of their cloud-based assets. The company says the policy enforcement enhancements in DocAve Online Service Pack (SP) 3, hosted on Windows Azure, enable companies to have comprehensive governance policies that will address all-in cloud, hybrid, or on-premises deployments.

Posted January 27, 2014

DBTA is seeking speakers who possess unique insight into leading technologies, and experience with successful IT and business strategies for the Data Summit conference in New York City, May 12-14, 2014. The deadline to submit your proposal is January 31, 2014.

Posted January 20, 2014

Enterprises are making a greater effort to monitor and audit data for threats to data security, but organizations that are fully security aware—leaders that practice prevention, detection and administrative controls across their data assets—are still in the minority of enterprises, according to a new survey underwritten by Oracle and fielded among IOUG (Independent Oracle Users Group) members.

Posted January 08, 2014

IBM inventors have received a patent for a data encryption technique called "fully homomorphic encryption" which, the company says, can enable deep and unrestricted analysis of encrypted information while preserving confidentiality.

Posted January 06, 2014

Delphix, a provider of agile data delivery solutions, and Axis Technology, a provider of enterprise data security and masking solutions, have formed a partnership with hopes of accelerating and simplifying data masking initiatives.

Posted December 30, 2013

The data-driven demands on organizations have never been greater. Two of the most pressing concerns that organizations face today are the need to provide analytic access to newer data types such as machine-generated data, documents and graphics, and the need to control the cost of information management for growing data stores. DBTA's new list of Trend-Setting Products in Data for 2014 highlights the products, platforms, and services that seek to provide organizations with the tools necessary to address rapidly changing market requirements.

Posted December 20, 2013

Sepaton has been assigned two new patents by the U.S Patent and Trademark Office. With the new patents, "System Health Monitor" and "Distributed Garbage Collection," Sepaton's patent portfolio includes 15 patents covering the building blocks for enterprise data protection.

Posted December 17, 2013

Big data can be a Siren, whose beautiful call lures unsuspecting sailors to a rocky destruction. The potential value of big data analysis to increase income (or lower expenses) for the company tends to drown out the calls for risk oversight. Understanding the legal and regulatory consequences will help keep your company safe from those dangerous rocks.

Posted December 17, 2013

SOA Software, an API and SOA management tools provider, has undergone a series of audits by an independent Quality Security Assessor (QSA) to ensure that it met best practices and security controls needed to keep sensitive data secure during transit, processing and storage. As a result, SOA Software is now an 'Approved Service Provider' for major credit card brands.

Posted December 09, 2013

Modern data centers contain a mix of physical and virtual systems and must be able to provide access to highly distributed collaborative applications as well as support systems that leverage cloud computing. Here are 8 best practices for achieving data center security and an in-depth analysis of the new security concerns presented by next-generation data centers.

Posted December 04, 2013

New technology from CA is aimed at helping organizations lower the cost of storing data processed on IBM System z by backing up the data and archiving it to the cloud. According to CA, by using its Cloud Storage for System z with Amazon Web Services (AWS) cloud storage in conjunction with the Riverbed Whitewater cloud storage appliance from Riverbed Technology, organizations can decrease storage costs while also improving disaster recovery readiness.

Posted November 25, 2013

When it comes to service recovery, speed matters. The costs of recovery from failures can be staggering in terms of business service downtime, in lost revenues and damaged reputations. For DR preparedness to significantly improve, companies should consider these 5 dimensions of disaster recovery.

Posted November 13, 2013

AFORE has announced a portfolio of Amazon Web Services (AWS) security solutions. The data security suite is targeted at enterprise customers and service providers planning to offer EaaS and enables them to take control of securing sensitive data within the AWS. Built for cloud and virtualized environments, the security suite delivers data protection that eliminates traditional costs and deployment complexity barriers, according to AFORE.

Posted November 12, 2013

Trustwave, a provider of services and technologies for information security and compliance, has acquired data security provider Application Security, Inc., which offers security software for relational databases and big data stores. According to Trustwave, the acquisition will augment its existing managed security services and extend protection of data and management of threats across endpoints, networks, applications and databases.

Posted November 11, 2013

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37

Sponsors