Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

IBM announced a data deduplication solution for z/OS mainframe environments. The System Storage TS7680 ProtecTIER Deduplication Gateway for System z combines IBM's virtual tape library (VTL) technology with its HyperFactor inline data deduplication software.

Posted March 08, 2010

For many organizations, application information lifecycle management, or ILM, now offers expedient - and badly needed - measures for properly defining, managing, and storing data. Many enterprises are being stymied by a massive proliferation of data in their databases and applications. Growing volumes of transaction data are being digitally captured and stored, along with unstructured forms of data files such as email, video, and graphics. Adding to this tsunami are multiple copies of all this data being stored throughout organizations. At the same time, increasingly tight mandates and regulations put the onus on organizations to maintain this data and keep it available for years to come. Much of this data still resides on legacy systems, which are costly to operate and maintain.

Posted March 04, 2010

Sentrigo, Inc., a provider of database security software, has announced Repscan version 3.0, a major new release of its database vulnerability assessment and security scanning software. Version 3.0 incorporates new and improved features that allow users to more easily navigate, identify and interpret critical data within an enterprise. Among new product features is a graphical user interface, which has been redesigned to allow even security experts with limited database knowledge to run and interpret results. The whole user interface was redesigned from ground up to be more approachable by someone who was not necessarily a database expert, Andy Feit, vice president of marketing for Sentrigo, tells 5 Minute Briefing.

Posted March 03, 2010

Zmanda, a provider of open source and cloud-based backup solutions, has announced a product that enables Tivoli administrators to incorporate backups of MySQL databases as part of an enterprise-wide backup and disaster recovery strategy. The solution, Tivoli Storage Manager (TSM) Option for Zmanda Recovery Manager (ZRM) for MySQL, enables MySQL users to manage their data protection policies through Tivoli.

Posted March 03, 2010

Confio Software today announced availability of Ignite 8, a major expansion of its database performance solution. Ignite 8 expands the Ignite for SQL Server, Oracle, DB2 and Sybase products to include comprehensive performance monitoring in combination with the response-time analysis for which Ignite has been known.

Posted March 02, 2010

Sybase, Inc. recently reported financial results for the fourth quarter and full year ended December 31, 2009. "2009 was obviously a great year of major accomplishment for Sybase," stated John Chen, chairman, CEO and president, during the Q4 earnings call. "We are very pleased that we delivered consistent financial performance throughout the year," which culminated in "the best quarter of the company history in Q4 and a third consecutive year of record revenue, earnings, as well as cash flow." For the full year, he noted, revenue came in at $1.17 billion, the highest ever, and above the company's outlook as it entered into 2009, 12 months ago.

Posted February 25, 2010

Rocket Software is planning a complimentary webcast series focused on the latest release of RocketU2 SystemBuilder Extensible Architecture (SB/XA). SB/XA is a Rapid Application Development (RAD) and deployment environment delivering up-to-the-minute interface design and portable reporting capabilities. Existing SB+ applications can automatically convert without requiring changes to the underlying code.

Posted February 24, 2010

Sentrigo, Inc., a provider of database security software, has announced Repscan version 3.0, a major new release of its database vulnerability assessment and security scanning software.

Posted February 23, 2010

Sybase has announced that its Sybase IQ column-based analytics server, in collaboration with solutions from HP and Red Hat, achieved the top data warehousing benchmark result among currently published non-clustered Linux and x86 systems in the TPC-H benchmark at the 1 TB scale factor.

Posted February 23, 2010

CA says it has extended two of its web access security products to include support for JBoss Enterprise Middleware deployments. CA SiteMinder and CA SOA Security Manager now offer secure access management for Web applications and services deployed on JBoss Enterprise Middleware, including JBoss Enterprise Application Platform, JBoss Enterprise Portal Platform, and JBoss Enterprise SOA Platform.

Posted February 22, 2010

Cloud computing emerged as a key technology trend in 2009. While concerns about economic payback and data protection may be holding organizations back, Unisys predicts that in 2010 previously reluctant users will clearly see the potential the cloud represents and start making the move to take advantage of it. 5 Minute Briefing recently chatted with Brian Ott, vice president of Unisys' worldwide cloud program, about what the company sees ahead this year in terms of the enterprise embrace of cloud computing and the cloud trends Unisys expects to dominate 2010.

Posted February 10, 2010

When the Sarbanes-Oxley Act (SOX) was first enacted in 2002 in the wake of several very visible accounting scandals, small to medium enterprises may have felt they dodged a very expensive bullet. The requirement to document processes for governance, risk management and compliance (GRC), and have them confirmed by outside auditors only applied to publicly traded companies. Unlike their publicly traded brethren, SMEs were not forced to purchase costly GRC software, did not have to re-direct resources from their normal daily tasks to prepare for audits, and did not have to change their methods of operation to comply with a government mandate.

Posted February 09, 2010

Have you ever read those inserts that your bank, credit card providers, insurance company, mutual fund company, and others slip inside your statements and bills? We all get them. You know, those flimsy pieces of paper, printed in small type and written in convoluted English. I have started collecting them - sort of like baseball cards. But I doubt they'll ever be valuable. They are entertaining, though ... and disheartening.

Posted February 09, 2010

Continuity Software, a provider of disaster recovery and high availability management software, announced the general availability of RecoverGuard version 5.0, intended to deliver an end-to-end solution for validating and assuring both recovery point objectives, and recovery time objectives. Version 5.0 includes added functionality and enhancements in the areas of service level agreement management, cluster support, graphical user interface, risk detection, configuration management database systems integration, Microsoft Active Directory support and reporting capabilities.

Posted February 08, 2010

CommVault is shipping an integrated cloud storage connector for its Simpana software platform designed to enable customers to move on-premises backup and archive data into, and out of, private and public cloud storage without complex scripting or the addition of disparate cloud gateway appliances. With the addition of this new connector, the Simpana software can treat cloud storage providers as simply another target storage destination, along with on-site disk, VTL, and optical devices.

Posted February 08, 2010

Imperva, a security vendor, picked up on a major hacking of the social-networking site RockYou.com, which resulted in the exposure of 32 million user IDs and passwords. The result was a view of the most commonly used passwords of all time.

Posted January 25, 2010

KOM Networks, a provider of data storage archiving and retention solutions, has certified its KOMpliance product with CommVault Simpana 8 software to provide what KOM Networks describes as an affordable and flexible high performance data archive, search and management solution.

Posted January 25, 2010

Symantec Corp. has signed a definitive agreement to acquire privately-held Gideon Technologies, Inc., a provider of information security solutions that automate and orchestrate IT security and risk management. Symantec is acquiring Gideon Technologies to extend Symantec's security portfolio with a Security Content Automation Protocol (SCAP) validated configuration and vulnerability assessment solution and to enhance its ability to serve the needs of public sector customers.

Posted January 25, 2010

Novell announced the release of an integrated file storage solution that provisions, moves, optimizes and reports on file storage based on user roles and customized business policies. The solution, Novell File Management Suite, enables organizations, regardless of operating system or existing storage management solution, to intelligently manage file storage at its source, tying the file to the user for the entire data lifecycle, the vendor says. This helps address storage costs as well as data compliance requirements.

Posted January 25, 2010

IBM reported a decrease in annual revenues between 2008 and 2009, but revenues for the most recent quarter held steady. Overall, the company reports, revenues for 2009 totaled $95.8 billion, a decrease of 8% (5%, adjusting for currency), compared with $103.6 billion in 2008.

Posted January 25, 2010

Pillar Data Systems has announced advancements to the Axiom 600 storage system with the new Slammer Series 2. The new Slammer combined with Pillar's fourth-generation AxiomONE software provides twice the cache and twice the processing power, for a 50% increase in overall performance.

Posted January 20, 2010

dataguise, a provider of security solutions for protecting sensitive data, has announced the availability of its dgmasker enterprise application templates. Developed with leading application experts, the dataguise dgmasker templates provide enterprise organizations that have deployed Oracle E-Business Suite, PeopleSoft Enterprise, SAP ERP and NextGen Healthcare Software with the ability to quickly secure personally identifiable information for use in non-production application development, testing, QA and training environments.

Posted January 20, 2010

dataguise, a provider of security solutions for protecting sensitive data, has announced the availability of its dgmasker enterprise application templates. Developed with leading application experts, the dataguise dgmasker templates provide enterprise organizations that have deployed Oracle E-Business Suite, PeopleSoft Enterprise, SAP ERP and NextGen Healthcare Software with the ability to quickly secure personally identifiable information for use in non-production application development, testing, QA and training environments.

Posted January 19, 2010

KOM Networks, a provider of data storage archiving and retention solutions, has certified its KOMpliance product with CommVault Simpana 8 software to provide an affordable and flexible high performance data archive, search and management solution.

Posted January 19, 2010

Symantec Corp. has signed a definitive agreement to acquire privately-held Gideon Technologies, Inc., a provider of standards-based information security solutions that automate and orchestrate IT security and risk management. Symantec is acquiring Gideon Technologies to extend Symantec's security portfolio with a leading Security Content Automation Protocol (SCAP) validated configuration and vulnerability assessment solution and to enhance its ability to serve the needs of public sector customers.

Posted January 19, 2010

Ingres Corporation, an open source database management company, and the Government of Jordan announced today that they have joined forces to promote and drive open source adoption. Ingres and the Ministry of Information and Communications Technology of Jordan (MOICT) have entered into a memorandum of understanding (MOU) to achieve the widespread use of information technology and communication, particularly open source technology from Ingres, throughout the local software infrastructure in Jordan.

Posted January 12, 2010

CA announced that three of its leading mainframe security management software products—CA ACF2, CA Top Secret r14 and CA Compliance Manager for z/OS r1—are officially in evaluation for EAL4+ certification under the Common Criteria International security standard. Common Criteria evaluation of security products is mandated for commercial information security products purchased by the U.S. government for use in national security systems.

Posted January 11, 2010

EMC Corporation, a provider of information infrastructure solutions, announced that it has signed a definitive agreement to acquire Kansas-based Archer Technologies, a privately-held provider of governance, risk and compliance (GRC) software.

Posted January 11, 2010

As we enter the next decade of the millennium, we will see information technology becoming more ubiquitous, driving an even greater share of business decision-making and operations. IT has proven its muster through the recent downturn as both a tactical and strategic weapon for streamlining, as well as maintaining competitive edge. Now, as we begin the next round of economic recovery, companies will be relying on IT even more to better understand and serve their markets and customers.

Posted January 11, 2010

Enterprises that downplay the importance of storage management may be putting other key enterprise objectives at risk. That's the message from Kyle Fitze, Director of Marketing, Storage Platforms Division, HP StorageWorks. With IT shops facing constrained budgets and data volumes continuing to escalate, Fitze says, greater efficiency in the IT infrastructure is a requirement so that more money and time can be targeted at IT projects that will drive business growth. "Today, we believe that most customers spend upward of 70% of their budget just keeping the systems running and the lights on and everything cooled, on maintenance and operations, and the remainder of their budget on innovative IT projects," he observes. What HP would like to do, "is flip that ratio, so that customers, while they spend less on IT overall, are spending a smaller percentage of their budget on operations and the larger percentage then on innovation and business intelligence, and the kind of IT projects that can help them navigate these rough waters of economic decline."

Posted January 11, 2010

Continuent, Inc., a provider of solutions for continuous data availability, advanced database replication, backup and database performance scalability, has introduced Continuent Tungsten 1.2.1 for MySQL and PostgreSQL. Continuent Tungsten offers an easy to manage, dynamic database replication solution with automatic failover, cluster management, high availability and scalability. "Early adopter customers have noticed the speed and enhanced usability provided by this new version," says Eero Teerikorpi, CEO of Continuent. "Continuent Tungsten enables our customers to reduce the cost, risk, and complexity of data availability and database performance."

Posted January 06, 2010

EMC Corporation, a provider of information infrastructure solutions, yesterday announced that it has signed a definitive agreement to acquire Kansas-based Archer Technologies, a privately-held provider of governance, risk and compliance (GRC) software. According to EMC, the combination of Archer with industry-leading technologies for information risk management and information security from EMC's RSA Security Division will significantly extend EMC's solutions portfolio for visualizing and managing risk, enabling customers to automate GRC visibility and policy enforcement across both physical and virtualized IT environments. Archer will remain in Overland Park, Kan., upon completion of the acquisition and operate as a part of RSA, The Security Division of EMC.

Posted January 05, 2010

Continuent, Inc., a provider of solutions for continuous data availability, advanced database replication, backup and database performance scalability, has introduced Continuent Tungsten 1.2.1 for MySQL and PostgreSQL. Continuent Tungsten offers an easy to manage, dynamic database replication solution with automatic failover, cluster management, high availability and scalability. "Early adopter customers have noticed the speed and enhanced usability provided by this new version," says Eero Teerikorpi, CEO of Continuent. "Continuent Tungsten enables our customers to reduce the cost, risk, and complexity of data availability and database performance."

Posted January 05, 2010

Symantec Corp. has made enhancements to Veritas Storage Foundation, Veritas Cluster File System and Veritas Cluster Server, which are heterogeneous storage management and high availability solutions for Unix, Linux and Windows environments. These latest releases are intended to help organizations to employ the latest storage innovations—from SSDs to thin provisioned hardware and virtual environments including Hyper-V. The new releases also provide capabilities needed to optimize any storage or server platform. Additionally, the vendor says near instantaneous recovery of applications is now possible with Veritas Cluster File System through tight integration with Sybase, Oracle and IBM DB2-enabling faster failover of structured information and near-linear scalability.

Posted December 16, 2009

Sybase 365 , a subsidiary of Sybase, Inc., has announced a strategic partnership with the New York State Emergency Management Office (SEMO) to deploy SMS messaging services through NY-ALERT, the state's All - Hazards Alert and Notification System. The web-based portal allows state agencies, county and local governments, emergency service agencies and institutions of higher learning, to provide emergency alerting information and private notifications to a def ined audience through SMS alerts.

Posted December 16, 2009

Oracle has extended its Governance, Risk, and Compliance application suite, with the introduction of Oracle Enterprise Governance, Risk, and Compliance Manager (Oracle Enterprise GRC Manager) and the latest release of Oracle Enterprise Governance, Risk, and Compliance Controls (Oracle Enterprise GRC Controls) to deliver a closed-loop approach to regulatory compliance, risk management, and controls automation.

Posted December 16, 2009

Continuent, Inc., a provider of software solutions for continuous data availability, advanced database replication, backup, and database performance scalability, recently announced the availability of Continuent Tungsten 1.2. Tungsten 1.2 Community Edition is available free of charge, while customers who want more advanced features and on-call technical support are encouraged to purchase the commercial Tungsten Enterprise 1.2 edition.

Posted December 16, 2009

Sentrigo, Inc., a provider of database security software, has released the latest version of its flagship product, the Hedgehog Enterprise database activity monitoring and intrusion prevention solution, for leading database management systems. The new version incorporates features that allow for easier and faster deployment of highly customized security and audit policies aimed at protecting sensitive information so that organizations can meet their risk and compliance requirements.

Posted December 16, 2009

CommVault announced yesterday that it has formed a partnership with Informatica to deliver an integrated archiving solution that extends support to leading databases and applications, including Microsoft SQL Server, Oracle, DB2, SAP, PeopleSoft, Siebel and other custom or legacy applications. This new technology partnership will enable CommVault Simpana software customers to easily archive large databases from mission-critical business applications, such as CRM and ERP systems, to better streamline e-discovery and improve database space management.

Posted December 15, 2009

AmberPoint unveiled a new product intended to help organizations to govern their distributed and SOA-based applications. AmberPoint Governance System is intended to foster agile governance, ensuring continual compliance across both on- and off-premise clouds and all stages of the application lifecycle.

Posted December 14, 2009

Zmanda, a provider of open source backup and recovery software, has announced Zmanda Backup Appliance (ZBA), a pre-configured virtual backup server powered by SUSE Linux Enterprise Server which the vendor says runs on VMware Server, vSphere4, ESX, and ESXi. ZBA is intended to enable IT organizations to install a backup and recovery solution for heterogeneous desktops and servers, and backs up data to local disks, tape drives or clouds. Zmanda developed the ZBA solution as part of the SUSE Appliance Program, a business and technology program that was created to help ISVs build, configure and go to market with software and virtual appliances.

Posted December 14, 2009

As we enter the next decade of the millennium, we will see information technology becoming more ubiquitous, driving an even greater share of business decisionmaking and operations. IT has proven its muster through the recent downturn as both a tactical and strategic weapon for streamlining, as well as maintaining competitive edge. Now, as we begin the next round of economic recovery, companies will be relying on IT even more to better understand and serve their markets and customers. Yet, there are many challenges with managing a growing array of IT hardware, software, and services. To address these requirements, businesses continue to look to approaches such as analytics, virtualization, and cloud computing. To capture the trends shaping the year ahead, Database Trends and Applications spoke to a range of industry leaders and experts.

Posted December 14, 2009

Listen to a group of database professionals talk for awhile and someone will eventually bring up the topic of data deduplication. Data deduplication is a means to eliminate redundant data, either through hardware or software technologies. To illustrate, imagine you've drafted a new project plan and sent it to five teammates asking for input. That single file has now been reproduced, in identical bits and bytes, on a total of six computers. If everyone's email inbox is backed up every night, that's another six copies backed up on the email backup server. Through data deduplication technology, only a single instance of your project plan would be backed up, and all other instances of the identical file would simply be tiny on-disk pointers to the original.

Posted December 14, 2009

Corporate management is complacent about data security. Efforts to address data security are still ad hoc, and not part of an overall database security strategy or plan. Companies are not keeping up with the need to monitor for potential risks. More monitoring tends to be ad hoc or on-the-fly, versus more organized or automated systematic approaches. These are the findings from new research from Unisphere Research and the Independent Oracle Users Group (IOUG), which shows that the recent economic downturn has taken a toll on data security efforts within enterprises.

Posted December 14, 2009

Credit card security is a top priority - for both consumers and businesses. But what happens if there is a security breach exposing critical data to unknown sources? What can businesses do from an IT perspective to ensure they're protecting consumer information? When sensitive cardholder information resides in legacy host systems, host access technology can be a critical tool to help organizations successfully achieve PCI DSS compliance.

Posted December 14, 2009

Xceedium, Inc., a provider of access control and audit solutions, is shipping the latest release of its security appliance, which includes full support for mainframe and virtualized environments. The Xceedium GateKeeper Version 5 appliance is designed to proactively enforces policy to protect critical infrastructure and information assets.

Posted December 07, 2009

Oracle has announced the availability of Oracle Audit Vault Release 10.2.3.2, including key new reporting and alerting capabilities that streamline and help reduce the cost of the database audit process. To help ensure that the new Oracle Audit Vault entitlements and compliance-specific reports contain the information needed to pass real-world database audits, Oracle consulted with IT auditors, notes Vipin Samar, vice president of database security, Oracle. "This new release of Oracle Audit Vault will allow organizations to further automate their database activity monitoring and auditing processes, reducing the overall cost of meeting regulatory requirements and securing critical data."

Posted December 02, 2009

IBM yesterday announced it has acquired Guardium, a provider of real-time enterprise database monitoring and protection solutions. Guardium's technology helps clients safeguard data, monitor database activity and reduce operational costs by automating regulatory compliance tasks. Guardium is a privately held company based in Waltham, Mass. Financial terms were not disclosed.

Posted December 01, 2009

IBM today announced it has acquired Guardium, a provider of real-time enterprise database monitoring and protection solutions. Guardium's technology helps clients safeguard data, monitor database activity and reduce operational costs by automating regulatory compliance tasks. Guardium is a privately held company based in Waltham, Mass. Financial terms were not disclosed.

Posted November 30, 2009

Sentrigo, Inc., a provider of database security software, has released the latest version of its flagship product, the Hedgehog Enterprise database activity monitoring and intrusion prevention solution, for leading database management systems. The new version incorporates features that allow for easier and faster deployment of highly customized security and audit policies aimed at protecting sensitive information so that organizations can meet their risk and compliance requirements.

Posted November 24, 2009

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42

Sponsors