Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

There are reports circulating that Target's point-of-sale files may have been compromised as a result of a phishing email breach that took place at a third-party heating and air-conditioning vendor's site. An employee of the maintenance firm may have opened the malware-infested file, which then infected Target's systems. Whether or not this turns out to be the case, it points to a vulnerability seen in many IT systems - lax security procedures among third-party partners … another lesson in the Achille's Heel of many corporate networks.

Posted February 18, 2014

Extending Imperva's data center security strategy across the cloud, the company is acquiring cloud security gateway startup Skyfence, and also intends to acquire the remaining shares of cloud-based web application security company Incapsula. Imperva's new strategy is intended to address security gaps within various cloud deployment models.

Posted February 18, 2014

To help secure sensitive data, including regulated and high-risk data like medical, payment, insurance and financial data, Gazzang is providing data encryption and key management support for Pivotal HD, the Hadoop distribution from Pivotal.

Posted February 11, 2014

A new report provides an accurate and consistent assessment of current enterprise database management practices, solutions and tools in use, and the important challenges facing database administrators and their organizations. The report is based on an Oracle-sponsored survey conducted by Unisphere Research, the research arm of Datbase Trends and Applications (DBTA).

Posted February 11, 2014

Mission-critical applications in the banking, education, retail, healthcare, oil and gas, government, and travel industries depend on trusted MultiValue database systems. Yet, new requirements are emerging for MultiValue technology vendors to support integration with other enterprise data sources, enable mobile and web access, provide comprehensive business intelligence, and enforce greater security. In this special report, executives of seven leading MultiValue companies discuss how they are responding to their customers' evolving needs.

Posted February 10, 2014

There's no doubt that the management at Target had a miserable holiday season at the end of last year, between all the bad PR that came out about the online theft of 40 million customers' data records—later revised to be even higher—and the costs of providing disclosures and working with banks, and the headaches of potentially expensive lawsuits that are being filed. Such is every organization's nightmare, the price of openness and accessibility. According to a new survey of 322 data and IT managers, there is a growing awareness among enterprise executives and managers about the potential issues to enterprise data security.

Posted February 10, 2014

A new Virtual Appliance from Axcient enables organizations to protect data and replicate to the cloud without the need to purchase onsite hardware. The new virtual appliance is designed for VMware environments, and gives businesses access to Axcient's recovery-as-a-service cloud for rapid recovery of information, applications, and IT infrastructures.

Posted February 10, 2014

DocAve Online, AvePoint's software-as-a-service platform for Microsoft Office 365 management, has added enhanced data protection, governance, and reporting to help companies improve the protection and control of their cloud-based assets. The company says the policy enforcement enhancements in DocAve Online Service Pack (SP) 3, hosted on Windows Azure, enable companies to have comprehensive governance policies that will address all-in cloud, hybrid, or on-premises deployments.

Posted January 27, 2014

DBTA is seeking speakers who possess unique insight into leading technologies, and experience with successful IT and business strategies for the Data Summit conference in New York City, May 12-14, 2014. The deadline to submit your proposal is January 31, 2014.

Posted January 20, 2014

Enterprises are making a greater effort to monitor and audit data for threats to data security, but organizations that are fully security aware—leaders that practice prevention, detection and administrative controls across their data assets—are still in the minority of enterprises, according to a new survey underwritten by Oracle and fielded among IOUG (Independent Oracle Users Group) members.

Posted January 08, 2014

IBM inventors have received a patent for a data encryption technique called "fully homomorphic encryption" which, the company says, can enable deep and unrestricted analysis of encrypted information while preserving confidentiality.

Posted January 06, 2014

Delphix, a provider of agile data delivery solutions, and Axis Technology, a provider of enterprise data security and masking solutions, have formed a partnership with hopes of accelerating and simplifying data masking initiatives.

Posted December 30, 2013

The data-driven demands on organizations have never been greater. Two of the most pressing concerns that organizations face today are the need to provide analytic access to newer data types such as machine-generated data, documents and graphics, and the need to control the cost of information management for growing data stores. DBTA's new list of Trend-Setting Products in Data for 2014 highlights the products, platforms, and services that seek to provide organizations with the tools necessary to address rapidly changing market requirements.

Posted December 20, 2013

Sepaton has been assigned two new patents by the U.S Patent and Trademark Office. With the new patents, "System Health Monitor" and "Distributed Garbage Collection," Sepaton's patent portfolio includes 15 patents covering the building blocks for enterprise data protection.

Posted December 17, 2013

Big data can be a Siren, whose beautiful call lures unsuspecting sailors to a rocky destruction. The potential value of big data analysis to increase income (or lower expenses) for the company tends to drown out the calls for risk oversight. Understanding the legal and regulatory consequences will help keep your company safe from those dangerous rocks.

Posted December 17, 2013

SOA Software, an API and SOA management tools provider, has undergone a series of audits by an independent Quality Security Assessor (QSA) to ensure that it met best practices and security controls needed to keep sensitive data secure during transit, processing and storage. As a result, SOA Software is now an 'Approved Service Provider' for major credit card brands.

Posted December 09, 2013

Modern data centers contain a mix of physical and virtual systems and must be able to provide access to highly distributed collaborative applications as well as support systems that leverage cloud computing. Here are 8 best practices for achieving data center security and an in-depth analysis of the new security concerns presented by next-generation data centers.

Posted December 04, 2013

New technology from CA is aimed at helping organizations lower the cost of storing data processed on IBM System z by backing up the data and archiving it to the cloud. According to CA, by using its Cloud Storage for System z with Amazon Web Services (AWS) cloud storage in conjunction with the Riverbed Whitewater cloud storage appliance from Riverbed Technology, organizations can decrease storage costs while also improving disaster recovery readiness.

Posted November 25, 2013

When it comes to service recovery, speed matters. The costs of recovery from failures can be staggering in terms of business service downtime, in lost revenues and damaged reputations. For DR preparedness to significantly improve, companies should consider these 5 dimensions of disaster recovery.

Posted November 13, 2013

AFORE has announced a portfolio of Amazon Web Services (AWS) security solutions. The data security suite is targeted at enterprise customers and service providers planning to offer EaaS and enables them to take control of securing sensitive data within the AWS. Built for cloud and virtualized environments, the security suite delivers data protection that eliminates traditional costs and deployment complexity barriers, according to AFORE.

Posted November 12, 2013

Trustwave, a provider of services and technologies for information security and compliance, has acquired data security provider Application Security, Inc., which offers security software for relational databases and big data stores. According to Trustwave, the acquisition will augment its existing managed security services and extend protection of data and management of threats across endpoints, networks, applications and databases.

Posted November 11, 2013

CodeFutures has introduced dbShards/Migrate, a new continuous replication technology that is aimed at solving the problem of extended downtime when migrating a large database for an application across data centers or cloud environments.

Posted November 05, 2013

MapR Technologies has introduced native authentication in its MapR Distribution for Apache Hadoop to enable Hadoop to be used more broadly within healthcare, financial services, and government organizations. The new capability, now in beta, is meant to address the needs of customers who have been looking for a security approach as simple and easy to use as a web-based-banking application.

Posted October 28, 2013

Syncsort, a provider of big data software, has sold its Data Protection business to an investor group formed by members of its executive management team, industry veterans Robert Belau and Ken Barth of Bedford Venture Partners, and established Syncsort investor Windcrest Partners.

Posted October 16, 2013

Sepaton, Inc., a provider of backup and recovery platforms, today unveiled a new data protection solution called Sepaton VirtuoSO that is intended to address the challenges organizations are facing due to the exponential growth of both structured and unstructured information. According to the vendor, the scale-out NAS-based data protection solution provides five times the capacity of competitive solutions at initial release with up to 22 times the capacity planned for future releases.

Posted October 15, 2013

Software Diversified Services (SDS) is partnering with McAfee to provide support, maintenance, new enhancements, and compliance upgrades for McAfee's E-Business Server, a comprehensive suite of products using industry-standard encryption to automatically protect corporate data within applications, email, file transfers, and transaction processing. As part of the agreement to take over support and development of E-Business Server, SDS says it will assume full and ongoing responsibility for all current and future customer support functions and also deliver a series of customer-requested upgrades and enhancements.

Posted October 14, 2013

With the upcoming release of SQL Server 2014 (SQL2014), Microsoft is making advancements in the area of mission-critical performance. Microsoft wants to stake out this ground not only as performance enhancements in the relational engine, but also in terms of features which support better data availability, performance, security, and data integration. Here's what SQL2014 will do for you in those key areas.

Posted October 09, 2013

Oracle OpenWorld, the company's annual Oracle event for business decision-makers, IT management, partners and end users, introduced a flurry of new and updated products and technologies. Here, a round-up of some of the major announcements unveiled at the conference.

Posted October 02, 2013

Dataguise, a provider of data security intelligence and protection solutions, has secured $13 billion in Series B funding. According to Dataguise, traditional approaches to securing Hadoop fail because they are too complex, expensive, and incapable of selectively protecting the data that matters in large and diverse environments. Dataguise's solution, DG for Hadoop, aims to provide an efficient and economical method of determining where and how to secure sensitive data in Hadoop. "We are helping people go from a sandbox environment to the production environment," Manmeet Singh, CEO, Dataguise, said in an interview.

Posted September 30, 2013

In its latest release of Oracle Identity and Access Management, Oracle has added enhancements to Oracle Identity Governance, a single governance solution combining provisioning, analytics and privileged account management that Oracle says can reduce the time to certify accounts by 30 percent when compared with running separate tools. Oracle Identity Governance Suite has been certified on both Oracle Weblogic and IBM WebSphere.

Posted September 25, 2013

Intralinks Holdings, Inc., a SaaS provider of inter-enterprise content management and collaboration solutions, has announced the next generation of its secure enterprise file-sharing and collaboration solution. Intralinks VIA addresses the security issues posed by file-sharing among employees, particularly those in regulated industries and with companies with stringent security requirements

Posted September 17, 2013

Oracle holds an enviable position in the IT marketplace with a wide array of database systems, development tools, languages, platforms, enterprise applications, and servers. Riding the coattails of this industry giant is a healthy and far-flung ecosystem of software developers, integrators, consultants, and OEMs. These are the partners that will help make or break Oracle's struggle with new forces disrupting the very foundations of IT. And lately, Oracle—long known for its own brand of xenophobia and disdain for direct competitors—has been making a lot of waves by forging new alliances with old foes. This is opening up potentially lucrative new frontiers for business partners at all levels.

Posted September 16, 2013

EnterpriseDB, provider of enterprise-class PostgreSQL products and Oracle database compatibility solutions, has formed a partnership with Zmanda, a provider of open source and cloud backup solutions. Through the partnership, Zmanda has created and certified a NetBackup agent for EnterpriseDB's flagship Postgres Plus Advanced Server.

Posted September 10, 2013

Confio Software, which offers the Ignite line of database performance monitoring tools, has secured the Certificate of Networthiness (CoN) from the United States Department of Defense. Confio's CoN applies to all Ignite solutions for Oracle, Microsoft SQL Server, VMware, DB2 and Sybase.

Posted September 10, 2013

Grant Thornton LLP has acquired the Oracle consulting business of MarketSphere LLC, a Kansas City, Mo.-based business consulting firm. The acquisition brings more than 160 consultants to Grant Thornton's Technology Solutions practice, which is part of the firm's Business Advisory Services. The acquisition was effective Sept. 1.

Posted September 04, 2013

SQL Sentry, Inc., the developer of software for Microsoft SQL Server, has introduced v7.5 of SQL Sentry, which provides integrated, visual monitoring and management for the high availability and disaster recovery solution, SQL Server AlwaysOn. The SQL Sentry Monitoring service actively collects data from availability group primaries, secondaries and failover cluster instances as appropriate to present a seamless view of the AlwaysOn environment.

Posted September 03, 2013

SAP AG introduced new high availability and disaster recovery functionality with SAP Sybase Replication Server for SAP Business Suite software running on SAP Sybase Adaptive Server Enterprise (SAP Sybase ASE). "After only a year and a quarter supporting the Business Suite, ASE has already garnered about 2,000 customer installations. This easily provides that near zero-downtime for HA/DR that is non-intrusive to the system using Replication Server as the key enabling technology," said Dan Lahl, vice president, Database Product Marketing, SAP, in an interview.

Posted August 31, 2013

Vormetric, a provider of data security solutions for physical, virtual and cloud environments, has become a technology partner with Splunk Inc., which provides a software platform for real-time operational intelligence. Vormetric has also announced the general availability of Vormetric Data Security (VDS) for Splunk Enterprise, which provides customers with security intelligence for sensitive data using its Vormetric Data Firewall technology.

Posted August 27, 2013

EMC has announced the next generation of its Disk Library for Mainframe (DLm) systems, designed to deliver twice the scalability of the previous generation, with support for up to 11.4 PB of logical capacity and up to 80% faster performance. EMC's DLm 8100 and DLm 2100 systems are enabled by an enhanced virtual tape engine and eight new Gb/s FICON adapters.

Posted August 19, 2013

Luminex Software, Inc. announced the Luminex Synchronous Tape Matrix (STM) feature for its Mainframe Virtual Tape (MVT) and Channel Gateway X (CGX) solutions. Luminex STM provides multiple data centers in campus or metro regions support for active-active tape operations, with continuous availability and redundancy.

Posted August 19, 2013

Protegrity USA, Inc., a provider of end-to-end data security solutions, has announced general availability of release 6.5 of its Data Security Platform. This latest release expands the Protegrity Big Data Protector capabilities to include support and certification on many Apache Hadoop distributions. In addition, the new File Protector Gateway Server provides another option for fine-grain data protection of sensitive data before it enters Hadoop or other data stores.

Posted August 06, 2013

Symantec has released Data Insight 4.0, the latest version of its unstructured data governance solution, which provides insight into the ownership and usage of unstructured data, such as documents, presentations, spreadsheets and emails. "Many organizations are in the dark as to what data they have, what information they have, who owns that data, and the relevance of that data to the business. The unstructured data environment is pretty much like a black hole with limited or no visibility," Ketan Shah, product manager, Symantec Storage & Availability Management Group, told 5 Minute Briefing during a recent interview.

Posted July 23, 2013

Perhaps the most common question I am asked by readers is "How can I become a DBA?" The question is actually not as simple as it seems and there are many different aspects to the answer. Sometimes it is an application programmer who wants to become a DBA. Sometimes a DBA for one DBMS wants to support a different DBMS; for example, a SQL Server DBA wants to move to become an Oracle DBA. And other times someone with no IT background at all asks the question. The answer is different for all of these folks.

Posted July 09, 2013

The U.S. Government Services Administration (GSA) has identified SAP Afaria as a potential source of mobility management solutions for federal government agencies. This identification facilitates an improved procurement process that enables government agencies to provide their employees with secure mobile tools to serve the U.S. public better.

Posted June 27, 2013

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42

Sponsors