▼ Scroll to Site ▼

Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

Striim, provider of an enterprise-grade platform for streaming data integration, is forming a strategic partnership with Snowflake, Inc., the data warehouse built for the cloud. The partnership aims to simplify and speed loading of real-time data to Snowflake, accelerating data-driven analytics in the cloud.

Posted May 01, 2019

Machine learning can be used for a variety of roles such as troubleshooting, capacity planning, and performance analysis. Businesses can use machine learning to understand seasonality for trending and forecasting capabilities or view dashboards on data already collected. 

Posted May 01, 2019

patchVantage, an Oracle management software supplier, has added patching functionality for MySQL, and Microsoft's SQL Server on Linux. According patchVantage, since Oracle's RDBMS, MySQL, Microsoft's SQL Server together represent a high percentage of all databases in use today, it is important that systems can be managed from a single platform in order to manage database security patching efficiently.

Posted May 01, 2019

One of the most important and rapidly changing areas of database management is security and protection. The major DBMS vendors have been adding security features and improving the way you can protect your precious corporate data. But it can be difficult to keep up with these features, so let's take a brief look at some of the more interesting and useful database security options.

Posted May 01, 2019

A new IBM study has found that a majority of organizations are still unprepared to properly respond to cybersecurity incidents, with 77% of respondents indicating they do not have a cybersecurity incident response plan applied consistently across the enterprise.

Posted April 29, 2019

New technology trends continue to reshape the practice of database management as cloud computing, AI, and automation continue to change how data is acquired and insights gleaned. As a result, database professionals are faced with new challenges and opportunities. Today, database teams are tasked with managing more databases, bigger databases, and a greater variety of databases — on premises and in the cloud.

Posted April 29, 2019

SHARE has announced that Robyn Benincasa will deliver the opening keynote presentation at SHARE Pittsburgh, August 4-9, 2019, at the David L. Lawrence Convention Center in Pittsburgh, Pa.

Posted April 29, 2019

Today, there are more opportunities than ever for organizations to achieve new levels of success by capitalizing on data and analytics. Despite this fact, many organizations struggle to build, grow, and reinforce their analytics capabilities. Shelly Brown, director, Booz Allen Hamilton will explain how a framework known as ADAPT+C  can address an organization's most critical analytics problems with a "best-fit" approach during her Data Summit 2019 presentation, "ADAPT+C: A Framework for Building a Data-Driven Organization."

Posted April 29, 2019

Altova is launching a new product that will help enterprises acclimate to GDPR. The GDPR, or General Data Protection Regulation, which went into effect May 25, 2018, is a set of privacy and data protection rules that apply to organizations that process personal data of people residing in the European Union.

Posted April 26, 2019

Quest Software, a global systems management, data protection and security software provider, is releasing Foglight Container Management, a solution that provides real-time and historical analytics of containers. Foglight Container Management supports business's container initiative by empowering IT infrastructure teams to quickly identify incidents and proactively prevent issues from happening.

Posted April 26, 2019

Snowflake is partnering with Anodot, the autonomous analytics company, allowing Snowflake customers to access Anodot's real-time anomaly detection. With Anodot and Snowflake's emerging partnership, customers will have access to Snowflake's built-for-the-cloud data warehouse and can receive instant alerts and insights from Anodot for potential issues before they cost customers significant ROI.

Posted April 26, 2019

Databases these days are comprised of so many elements that it's important to remember to support a hybrid environment. A modern database should no longer be transactional or analytical, relational or non-relational, on-premises or in the cloud. It needs to support hybrid processing, hybrid data, and hybrid cloud. It needs to support hybrid everything.

Posted April 25, 2019

Unlike other awards programs that rely on our editorial staff's evaluations, the DBTA Readers' Choice Awards are unique in that the winning information management solutions are chosen by you—the people who actually use them.

Posted April 24, 2019

SAP is making enhancements to the SAP HANA database in the cloud and on premise, providing instant access to critical data and extreme performance to democratize in-memory computing. Updates include enhanced cloud support, persistent memory support with Intel, intelligent recommendations for efficient database management, new machine learning (ML) capabilities, hyper-converged infrastructure (HCI) certification, improved cost-effective data tiering, and data security enhancements.

Posted April 24, 2019

Platform9, a provider of a SaaS-managed hybrid cloud, is introducing Klusterkit - a set of three open source Kubernetes tools that enable organizations to easily deploy and operate production-grade Kubernetes clusters.

Posted April 18, 2019

Quobyte Inc., a developer of modern storage system software, will be offering a TensorFlow plug-in for its distributed file system, providing increased throughput performance and linear scalability for ML-powered applications. Using Quobyte storage with TensorFlow helps to simplify and streamline the operation of machine learning.

Posted April 18, 2019

The breach of Starwood's reservation system included names, addresses, phone numbers, passport numbers, birthdates, and genders in Starwood's Loyalty Program account information. Starwood brands include St. Regis Hotels & Resorts, Sheraton Hotels & Resorts, Westin Hotels & Resorts, Le Meridien Hotels & Resorts, and W Hotels. As the horror gradually revealed itself similar to a slowly opening barn door on a moonlit evening in a Stephen King short story, it became clear that the breach had been lurking within the system for an indeterminate number of years. As per its main focus of news-entertainment, much of the media has focused on the more sensational sound bites and dramatic visuals as opposed to taking the time to ask the really important questions, such as: What happened to the data?

Posted April 15, 2019

A new survey report on mainframe security reveals that organizations know that mainframe security is important, but they're not taking actions that reflect their priorities. Even though 95% of respondents say they're concerned about the potential of customer data breaches on the mainframe, 67% admit that only sometimes or rarely are they factoring security into mainframe decisions, putting the most critical IT systems at significant risk.

Posted April 15, 2019

"In a recent survey, Syncsort found security is the number-one priority for IT pros with IBM i systems. Given the increasing sophistication of cyberattacks, it's not surprising 41% of respondents reported that their company experienced a security breach and 20% more were unsure if they had been breached," said David Hodgson, CPO, Syncsort. To address these concerns, Syncsort says, Assure Security brings together IBM i security capabilities into an all-in-one solution, with the flexibility for customers to license individual modules.

Posted April 15, 2019

Cloudian, an object storage provider, is releasing a Cisco Validated Design (CVD) for Cloudian HyperStore on the Cisco Unified Computing System (Cisco UCS) platform. The CVD reflects the companies' expanded collaboration in providing best-of-breed infrastructure solutions for modernizing enterprise data centers, including accelerating the transition to hybrid cloud.

Posted April 11, 2019

RDX, an independent provider of managed database and cloud services, is expanding its clckwrk Ltd., an RDX company, to provide more Oracle-database-to-AWS-Cloud migration tools. Clckwrk is an online marketplace for Oracle database to AWS Cloud migration tools.

Posted April 10, 2019

This, in turn, offers different attack vectors than traditional applications and creates opportunities for cybercriminals seeking to manipulate or monetize the data being shared on the blockchain. X-Force Red is comprised of hackers who can break into blockchain networks using the same tools, techniques, practices and mindsets as criminals would use. Through vulnerability assessments, vulnerability management programs, adversary simulation exercises, and manual penetration testing, X-Force Red can help organizations identify and fix vulnerabilities before criminals find them. 

Posted April 10, 2019

There's not a business out there that wouldn't want to defend itself against fraudulent activities, hacking attempts, and operations disruptions. And with cases of fraud and cyberattacks on the rise—$16 billion was stolen from 15.4 million U.S. consumers in 2017—businesses need to pay attention to solutions that can help them identify this kind of behavior. Here's where anomaly detection comes in.

Posted April 09, 2019

Enterprise agility isn't a single initiative but rather a collection of activities and technologies that lead toward that goal. This includes adoption of microservices, containers, and Kubernetes to increase the flexibility of systems, applications, and data by releasing them from underlying hardware. In addition, practices such as DevOps are helping to increase the level of collaboration possible for fast-moving enterprises.

Posted April 09, 2019

Building performant ETL pipelines to address analytics requirements is difficult as data volumes and variety grow at an explosive pace. With existing technologies, data engineers are challenged to deliver data pipelines to support the real-time insight that business owners demand from their analytics.

Posted April 09, 2019

SentryOne is releasing SentryOne Test, an automated framework for testing and validating business-critical data. Available as a software-as-a-service (SaaS) offering, SentryOne Test helps companies ensure that the data underlying business decisions is accurate and current.

Posted April 09, 2019

Teradata, the Pervasive Data Intelligence company, is adding three new offerings for its Teradata Vantage platform, reflecting Teradata's commitment to offering as-a-service capabilities to meet the needs of their customers. These capabilities provide choice and flexibility for customers operating on Amazon Web Services (AWS) and Microsoft Azure, private cloud, or hybrid cloud environments.

Posted April 08, 2019

RackWare, Inc., a provider of cloud computing management in the enterprise, is releasing a hybrid cloud platform designed to unify functionality and leverage it across three solution areas: cloud migration, disaster recovery and backup, and hybrid cloud management. RackWare's Hybrid Cloud Platform is a distributed software solution that helps cloud service providers enable enterprises to increase and maximize cloud use.

Posted April 08, 2019

DBAs already undertake a large load in the enterprise and cloud is the latest factor changing how DBAs operate. As cloud gains momentum and migrations of applications and databases become more common, the question is often asked "Does cloud mean the end of the DBA?" DBTA recently held a webinar with Francisco Munoz Alvarez, director of innovation, Data Intensity, an Oracle partner, who discussed how cloud is bringing about that evolution and what today's DBAs must know to be successful in a cloud-enabled future.

Posted April 03, 2019

From AI and machine learning to data discovery and real-time analytics, creating a strong data architecture strategy is critical to supporting an organization's data-driven goals. DBTA recently held a roundtable webinar with Michael Coburn, product manager, PMM, Percona; Tyler Mitchell, senior product marketing manager, Couchbase; and Max Neunhöffer, senior developer and architect, ArangoDB, who discussed the top trends in modern data architecture for 2019.

Posted April 03, 2019

Your mileage may vary, but there is an allegorical household phenomenon that provides some lessons in understanding the data lake—the coffee can that often ends up in the garage or tool space of a home to collect all the stray, old-project hardware someone in the household cannot bear to part with.

Posted April 02, 2019

What happened to the 500 million data points from the Starwood data breach?

Posted April 02, 2019

Machine learning is the next great frontier in big data. AI is set to revolutionize everything from how we interact with each other to how we work. There are many ways to implement ML projects, but not all of them work out as planned. That's why Vadim Nareyko, CEO, EnCata Soft will be giving a primer on Machine learning during his Data Summit 2019 presentation, "The Five Biggest Mistakes in Machine Learning."

Posted April 01, 2019

Keeper Technology, a provider of integrated data management solutions, and Seagate Government Solutions, a subsidiary of Seagate Technology, provider of data storage solutions, have announced a strategic partnership to provide software-defined storage (SDS) solutions for the federal government and commercial sectors.

Posted April 01, 2019

Dell EMC has announced the results of the third Global Data Protection Index revealing an explosive growth rate of data of 569% and a jump in data protection "adopters" of nearly 50 percentage points since 2016.

Posted April 01, 2019

The IT landscape is constantly being reshaped and contoured as organizations mature, and others merge or are acquired. Startups that seek to address new challenges are also on the horizon. Many of these companies have fresh approaches that tap into blockchain, advanced analytics, AI, DevOps, and data security advances.

Posted April 01, 2019

Carbonite, Inc., a cloud-based data protection provider, is acquiring of Webroot Inc., combining cloud-based backup and recovery with cloud-based cybersecurity. The total purchase price for Webroot was $618.5 million in cash, as adjusted with respect to cash, debt, transaction expenses and working capital. The purchase price was funded with existing cash on hand and funds secured under a new $550 million term loan. The interest rate on the term loan is a floating rate based upon LIBOR plus 3.75%.

Posted March 29, 2019

NVIDIA will acquire Mellanox after reaching a definitive agreement, uniting two high-profile companies in high-performance computing (HPC). With the addition of Mellanox, NVIDIA says, it will optimize data center-scale workloads across the entire computing, networking, and storage stack to achieve higher performance, greater utilization, and lower operating cost for customers.

Posted March 28, 2019

RDX, an independent provider of managed database and cloud services, is acquiring ClearDB, further expanding RDX's Database-as-a-Service platform capabilities. Based in Plano, Texas, ClearDB is a Database-as-a-Service (DBaaS) provider that has deployed and managed more than one million cloud-based databases worldwide through its software platform, and is a private MySQL-as-a-Service provider.

Posted March 28, 2019

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48

Sponsors