Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

There is an emerging field of companies looking to take on the challenges presented by the roiling tide of big data. While their visions vary, each has identified a market need that it believes its technology uniquely addresses. Here, DBTA highlights the approaches of 10 companies we think are worth watching.

Posted June 03, 2013

Open source software has enjoyed a surge in interest and demand over the last two years for its quality and cost savings. Companies like VMware, Microsoft (Skype), Apple, and Facebook (Instagram) are using PostgreSQL, the open source database. Other PostgreSQL users include the Federal Aviation Administration, the US State Department, ABN Amro, Fujitsu, Sony-Ericsson, and Sony Online Entertainment.

Posted June 03, 2013

Database Trends and Applications introduces the inaugural "DBTA 100," a list of the companies that matter most in data. The past several years have transformed enterprise information management, creating challenges and opportunities for companies seeking to extract value from a sea of data assets. In response to this, established IT vendors as well as legions of newer solution providers have rushed to create the tools to do just that.

Posted June 03, 2013

DBTA's Big Data Boot Camp provided attendees with an immersion experience in the world of big data. Presentations and panel discussions with data experts covered the value provided by Hadoop and related solutions, how it all fits into the overall enterprise data management picture, real-world use cases in which big data technologies are now being deployed, how to get started, the legal implications of big data management that organizations need to be aware of before they initiate a big data project, and how to successfully engage with customers through social media. Ten salient points emerged from the two-day conference which wrapped up at the Hilton New York on Wednesday.

Posted May 23, 2013

Gazzang, a provider of data security solutions, has released Gazzang CloudEncrypt, offering data encryption and key management at every stage of the Amazon Elastic MapReduce (EMR) data lifecycle. Gazzang CloudEncrypt secures data in-flight and at-rest within Amazon EMR environments while allowing customers to maintain control of the massive volume of encryption keys and separate those keys from the data itself.

Posted May 21, 2013

Varonis Systems Inc. has integrated its data governance software with Hitachi NAS Platform (HNAS) and Hitachi Unified Storage (HUS). The integration utilizes Varonis DatAdvantage to gain visibility, intelligence and control over the information stored within HNAS and HUS systems, enabling organizations to manage, analyze and protect big data more effectively and efficiently.

Posted May 21, 2013

Informatica Corporation, a provider of data integration software, has introduced Informatica Cloud Summer 2013, the latest release of its cloud-based integration and data management software as a service (SaaS) solutions. Cloud Summer 2013 features the new Informatica Cloud SAP Connector, new Informatica Cloud Extend capabilities, new cloud connectors and integration templates, as well as general availability of the Informatica Cloud Data Masking service.

Posted May 14, 2013

Index Engines, an enterprise information management and archiving solutions vendor, has released the Catalyst Data Profiling Engine, providing a cost- and time-effective solution to big data issues. Processing all forms of unstructured files and document types, it creates a searchable index of what exists, where it's located, who owns it, when it was last accessed and what key terms are in it. This information is provided through summary reports for immediate insight into enterprise storage.

Posted May 14, 2013

New offerings from HP are aimed at helping small and midsize businesses and government agencies to maximize storage investments. The products include the next generation of its MSA entry disk array, enhancements to the HP StoreEasy Storage portfolio, and a new program for HP channel partners. "We have seen more and more data center needs start to apply to smaller environments," Brad Parks, a senior manager focused on go-to-market strategies at HP Storage, tells 5 Minute Briefing.

Posted May 13, 2013

Dimension Data has acquired Earthwave Corporation Pty Limited, a privately-owned Australian managed security services provider. Dimension Data says the acquisition extends and strengthens its managed security services, and supports its growth in the areas of cloud services, IT outsourcing and enterprise mobility.

Posted May 10, 2013

PerspecSys Inc., a provider of cloud data protection solutions for the enterprise, announced it has raised $12 million in funding co-led by new investors Paladin Capital Group and Ascent Venture Partners, and joined by return backer Intel Capital and other existing institutional investors. The new round of financing, combined with Series A funding, brings the total investment in PerspecSys to over $20 million. With offices in the U.S., U.K. and Canada, PerspecSys aims to remove what it says are primary barriers to cloud adoption at the enterprise level - security and control.

Posted May 10, 2013

Veeam Software, a provider of backup, replication and virtualization management solutions for VMware vSphere and Microsoft Hyper-V, has announced Veeam Explorer for Microsoft SharePoint, a new capability planned to be available in an upcoming free public beta. Supporting e-discovery, Veeam Explorer for Microsoft SharePoint enables users to pinpoint the information required to quickly locate and restore individual SharePoint items.

Posted April 02, 2013

The Independent Oracle Users Group (IOUG) will celebrate its 20th anniversary at COLLABORATE 13, a conference on Oracle technology presented jointly by the IOUG, OAUG (Oracle Applications User Group) and the Quest International User Group. The event will be held April 7 to 11 at the Colorado Convention Center in Denver. As part of the conference, the IOUG will host the COLLABORATE 13-IOUG Forum with nearly 1,000 sessions providing user-driven content. The theme of this year's COLLABORATE 13-IOUG Forum is "Elevate - take control of your career and elevate your Oracle ecosystem knowledge and expertise," says IOUG president John Matelski.

Posted March 27, 2013

SAP has achieved expanded Samsung For Enterprise (SAFE) Certification for the SAP Afaria mobile device management solution. SAFE certified devices are guaranteed to have met Samsung's security criteria and feature enhancements suitable for business use.

Posted March 27, 2013

Embarcadero Technologies, a provider of software solutions for application and database development, has introduced DB PowerStudio XE3.5, the latest release of the company's database management and development platform. DB PowerStudio XE3.5 is a key component of Embarcadero's new metadata governance platform, which allows organizations to leverage diverse data across information management and the software development lifecycle for data governance initiatives.

Posted March 27, 2013

When data professionals think about regulatory compliance we tend to consider only data in our production databases. After all, it is this data that runs our business and that must be protected. So we work to implement database auditing to know who did what to which data when; or we tackle database security and data protection initiatives to protect our data from prying eyes; or we focus on improving data quality to ensure the accuracy of our processes.

Posted March 27, 2013

Sepaton, Inc., a backup and recovery provider, has released the S2100-ES3 series 2925 purpose-built backup appliance (PBBA) with version 7.0 software. Featuring new processing nodes and enhanced multiprotocol network connectivity options, the enterprise-class data protection platform nearly doubles its data ingest performance up to 80 TB/hour. New high performance compression cards provide compression and encryption of data at rest in a unified pipeline without compromising performance.

Posted March 19, 2013

Cloud-based data delivery provider DataMotion has made available SecureMail Automation, an email encryption service that automates secure digital message distribution for businesses that send large volumes of sensitive communications such as email notices, monthly statements, patient information and document delivery. This is required for compliance with HIPAA/HITECH, GLBA and PCI regulations.

Posted March 19, 2013

Did you hear the one about the prisoner who hacked his prison's mainframe? That's what reportedly happened in the U.K., when an incarcerated cybercriminal took a behind-the-walls IT course, and used the opportunity to hack into his prison's mainframe. The lesson learned is that no system - even a prison mainframe - is immune to security risks.

Posted March 18, 2013

STORServer, a provider of data backup solutions for the mid-market, has launched a new Hybrid Appliance (HA), designed to use qualified, customer-supplied hardware to provide a fully integrated STORServer solution. The HA is built by taking STORServer's software bundle and integrating it with customers' own hardware, and enables data backup across multiple platforms and locations, including virtual machines and local and remote devices and supports most operating systems, applications and database technologies.

Posted March 18, 2013

Vanguard Integrity Professionals, providers of information security for System z, is shipping a new application designed to improve enterprise security and streamline audit and compliance requirements. The new solution, Vanguard Cleanup, automatically monitors IBM RACF databases, identifies and reports on unreferenced, unused and duplicate RACF entities, and generates commands to delete unwanted user, group, connect, permit, data set and general resource profiles.

Posted March 18, 2013

The continued expansion of structured and unstructured data storage seems to be never-ending. At the same time, database administrators' need to reduce their storage consumption is accelerating as its cost becomes more visible. Today, however, there are data optimization technologies available that can help with the continued data growth.

Posted February 27, 2013

SAP and NetApp say they are tightening their collaboration with the goal of better supporting solutions such as SAP's HANA platform and SAP's NetWeaver Landscape Virtualization Management software. According to the companies, by complementing database solutions from SAP with NetApp storage and data management solutions, they can provide customers an agile data infrastructure for SAP applications that can help them be more competitive and reduce cost of ownership.

Posted February 27, 2013

Oracle has added a new utility to its storage software portfolio that is designed to streamline and automate critical tasks for customers using Oracle Database with Oracle's Sun ZFS Storage Appliance.

Posted February 20, 2013

INNOVATION Data Processing is teaming with storage infrastructure vendor EMC to support customers installing or migrating to the EMC Disk Library for mainframe (Dlm) virtual tape libraries. As part of this arrangement, EMC will offer INNOVATION's FATSCOPY Tape Migration Utility.

Posted February 19, 2013

CA Technologies has begun shipping a new version of its identity and access management (IAM) service solution that extends its reach across multiple vendor cloud platforms. CA CloudMinder now provides support for social identities and additional on-premise and cloud applications such as Microsoft Office 365.

Posted February 19, 2013

Expanding its cloud portfolio, Oracle has unveiled Oracle Infrastructure as a Service (Oracle IaaS) with "Capacity on Demand." "For the first time, you can get Oracle engineered systems deployed on premise behind your firewall for a monthly fee," said Oracle president Mark Hurd, during a live webcast that presented details of the offering. Announced by Oracle CEO Larry Ellison at Oracle OpenWorld in 2012, Oracle IaaS enables organizations to deploy fully integrated engineered systems, including Oracle Exadata Database Machine, Oracle Exalogic Elastic Cloud, Oracle SPARC SuperCluster, Oracle Exalytics In-Memory Machine and Oracle Sun ZFS Storage Appliance in their data centers.

Posted February 13, 2013

FAIR Health has chosen the Oracle Exadata Database Machine with a cluster of Oracle's Sun ZFS Storage 7420 appliances for backup to support its database of more than 15 billion claims. An additional Sun ZFS Storage Appliance supports remote disaster recovery and development. FAIR Health, which is an independent not-for-profit corporation committed to bringing transparency to healthcare costs and out-of-network reimbursement, sought a solution to streamline performance and eliminate the storage bottlenecks in its existing environment. With Oracle Exadata, the organization achieved substantial performance improvements, including a 5x reduction in claims processing time and a 10x faster average performance improvement in applying complex statistical methodologies.

Posted February 13, 2013

Attunity Ltd. and KOM Networks have formed a technology alliance to provide managed file transfer capabilities and archive storage for organizations with rigorous compliance and regulatory requirements through the integration of the Attunity Managed File Transfer (MFT) and KOM Network's KOMpliance. The alliance answers an emerging market need, Matt Benati, vice president of global marketing, Attunity, tells 5 Minute Briefing.

Posted February 12, 2013

Veeam Software Group, a provider of backup, replication and virtualization management solutions for VMware vSphere and Windows Sever Hyper-V, has released Veeam Backup & Replication Cloud Edition. According to the vendor, the solution turns public storage cloud into a data repository for backups, enabling an alternative to tape and traditional offsite backup storage.

Posted February 12, 2013

Zetta.net.net, a provider of backup, disaster recovery and archiving technology, has released Zetta.net DataProtect for NetApp, a new solution for cloud-based offsite backup, replication and disaster recovery for environments that use NetApp filers. According to the company, DataProtect for NetApp does not require any additional hardware, tapes or third-party software, and can deploy an offsite backup solution in less than 30 minutes.

Posted February 12, 2013

HP introduced the new HP StoreEver Storage tape portfolio featuring sixth-generation Linear Tape-open (LTO-6) technology that the company says delivers twice the capacity and 44% faster performance than LTO-5 in the same footprint. HP StoreEver Storage integrates HP's tape products and technologies with HP Converged Storage, HP Data Protector and third-party backup software. According to HP, this integration, coupled with new LTO-6 capabilities, enables HP StoreEver Storage to deliver reliable long-term data protection and retention in a format that meets the needs of nearly any environment.

Posted February 04, 2013

Oracle has merged the core capabilities of the Oracle Audit Vault and Oracle Database Firewall products, creating the new Oracle Audit Vault and Database Firewall product which expands protection beyond Oracle and third-party databases with support for auditing the operating system, directories and custom sources. "It is really one single, streamlined solution to do both security and compliance for Oracle and non-Oracle databases, and extending beyond databases, to operating systems, file systems, and directories - essentially the structure surrounding your database," notes Vipin Samar, vice president, Database Security, Oracle. "Data governance is increasingly important in many organizations and, as we know from the IOUG survey that we did earlier this year, we have very few organizations that are monitoring sensitive data access," adds Roxana Bradescu, director of product marketing, Data Security, Oracle.

Posted January 24, 2013

Oracle has introduced StorageTek LTO 6 Tape Drives with Fibre Channel connectivity for its StorageTek SL8500 and SL3000 Tape Libraries. The new drives offer increased capacity for better with 2.5 TB native storage capacity on a single tape cartridge, enabling customers to process more data in less time, while driving down the cost of tape operations.

Posted January 23, 2013

Verizon Terremark announced it is enhancing its Enterprise Cloud service in terms of increased availability, security and flexibility. Enterprise Cloud computing platforms are being expanded in two of the company's data center facilities located in Dallas and London, Tony Savoy, senior director, Product Management, Verizon Terremark, tells 5 Minute Briefing. Verizon Terremark operates about 50 data centers worldwide, and of those a portion are what the company calls cloud-enabled to support its delivery of cloud family products to clients. The expansion in Dallas extends Verizon Terremark's presence in the central U.S., where it already has a Denver, Colorado, facility. The facility in London is Verizon Terremark's second in the EMEA region.

Posted January 22, 2013

NovaStor, a backup management software provider, announced it has redesigned its backup and restore software for data center administrators. NovaBACKUP DataCenter 5.0 features a new graphic user interface that provides greater access to all backup features.

Posted January 22, 2013

Kroll Ontrack, a provider of data recovery, e-discovery and information management, has introduced the latest version of Ontrack Eraser, a software tool that enables overwrite erasure of data on hard drives to ensure security and so that drives can be re-purposed. The new 4.0 release provides VMware eraser capabilities, expanded drive wiping capacity, and new reporting and security management functionality. "The one thing that the industry is struggling with today is being able to confirm that VMDKs (virtual machine disks), are wiped securely. It is a very manual mundane process today that we have made easier because we have essentially created a software product to help automate that process as well as easier for the customer to select specifically which virtual disks they want to wipe," Abhik Mitra, data recovery product manager at Kroll Ontrack, tells 5 Minute Briefing.

Posted January 10, 2013

IBM has entered into a definitive agreement to acquire StoredIQ Inc., a privately held company based in Austin, Texas. IBM says StoredIQ will advance its efforts to help clients derive value from big data and respond more efficiently to litigation and regulations, dispose of information that has outlived its purpose and lower data storage costs. The acquisition is about "information economics," Ken Bisconti, VP of ECM Marketing, IBM, tells 5 Minute Briefing. "It is really about managing the value of content and information, and helping also to dispose of it defensibly as it becomes of less value."

Posted December 20, 2012

For many years, enterprise data center managers have struggled to implement disaster recovery strategies that meet their RTO/RPOs and business continuity objectives while staying within their budget. While the challenges of moving, managing, and storing massive data volumes for effective disaster protection have not changed - exponential data growth and the advent of big data technologies, have made the challenge of disaster recovery protection more difficult than ever before.

Posted December 19, 2012

The latest IOUG study on database security finds that there are measures that need to be taken to safeguard data from internal abuse; however, preventing privileged users from negligence or malfeasance is a serious challenge. According to this year's study, human error has beat out internal hackers or unauthorized users as the biggest security risk. In addition, more than half of respondents say their organizations still do not have, or are unaware of, data security plans to help address contingencies as they arise. These enterprise data security challenges, and more, are highlighted in a new survey of 350 data managers and professionals by the Independent Oracle Users Group. Underwritten by Oracle Corporation and conducted by Unisphere Research, a division of Information Today, Inc., it covered progress within three key areas of database security - prevention, detection, and administration.

Posted December 19, 2012

Attunity Ltd., a provider of information availability software solutions, has officially launched Attunity CloudBeam, a fully-managed data transfer SaaS platform for Amazon Web Services (AWS) Simple Storage Service (S3). With its beta completed, the high-performance data transfer solution was unveiled and demonstrated live at the AWS re: Invent Customer and Partner Conference from in Las Vegas, NV. "This is aimed at folks today that are using AWS or will be using AWS for all kinds of use cases where data is core to their strategy," Matt Benati, vice president of Global Marketing at Attunity, tells DBTA. "All these use cases demand the movement of data and it really has to be a frictionless movement of data at scale. That is what Attunity does best."

Posted December 19, 2012

In the never-ending battle for enterprise data security, industry experts say there has been progress on several fronts, but there is still much work that needs to be done. There is an enormous amount of data that tends to leak out of the secure confines of data centers, creating a range of security issues. "There are many copies of data which have less security and scrutiny than production environments," Joseph Santangelo, principal consultant with Axis Technology, tells DBTA. "The increased reliance on outsourcers and internal contractors leave sensitive data within corporate walls open to misuse or mistakes." Or, as another industry expert describes it, the supply chain often proves to be the greatest vulnerability for data security. "A typical organization has a direct relationship with only 10% of the organizations in its supply chain — the other 90% are suppliers to suppliers," Steve Durbin, global vice president of the Information Security Forum, tells DBTA.

Posted December 19, 2012

Protecting databases using encryption is a basic data security best practice and a regulatory compliance requirement in many industries. Databases represent the hub of an information supply chain. However, only securing the hub by encrypting the database leaves security gaps because sensitive data also exists alongside the database in temporary files, Extract-Transform-Load (ETL) data, debug files, log files, and other secondary sources. According to the "Verizon 2011 Payment Card Industry Compliance Report," unencrypted data that resides outside databases is commonly stolen by hackers because it is easier to access

Posted December 19, 2012

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43

Sponsors