Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

Knoa Software, a provider of user experience management (UEM) software, is launching the latest version of Knoa UEM for Enterprise Applications, extending the monitor platform for new application environments and integrations to new BI tools. This enhanced release builds on previous versions, accelerating the solution's value for SAP S/4HANA implementations through increased extensibility of the Knoa UEM monitoring and analytical platform. These features also position the solution as a key analytical tool for initiatives involving SAP Leonardo.

Posted June 12, 2018

At Data Summit 2018 in Boston just 2 days before GDPR went into effect, Kristina Podnar, digital policy consultant, NativeTrust Consulting, LLC, presented a talk on what you need to know to become compliant with the new regulation—and maintain compliance. In her presentation, Podnar cut through the legal and regulatory noise, taking the 99 articles of GDPR and distilling them into 10 key areas so attendees could identify the things that they really need to deal with—and those that do not apply.

Posted June 12, 2018

ALTR is emerging from nearly four years of stealth to release a platform that unleashes the security benefits of blockchain. The new ALTR platform is built on ALTRchain, the only high-performance, enterprise-grade blockchain technology for ultra-secure data access and storage.

Posted June 08, 2018

Since the EU's General Data Protection Regulation (GDPR) took effect in May 2018, organizations have  hopefully already emerged from the strategy phase and are now well into implementation. However, the nuances of GDPR are something most of us are still trying to comprehend—and we probably won't truly understand all of it for a while. In the hustle to reach compliance, errors will likely have been made. In the process of GDPR planning and execution, there are four key areas that companies need to be wary of. If not managed carefully, they can slow down the process of achieving, and maintaining, compliance goals.

Posted June 06, 2018

SolarWinds is making a series of updates to its network management product portfolio, allowing the platform to support networks up to four times larger. This improvement makes it easy to consolidate monitoring solutions to a single provider enterprise-wise, and gives IT professionals' far greater flexibility to scale up and support larger data center networks as workloads increase, or scale out to address complex distributed networks. 

Posted June 04, 2018

Attunity, a provider of data integration and big data management software solutions, is introducing a comprehensive data governance solution designed to assist companies with General Data Protection Regulation (GDPR) compliance in SAP environments. The new Attunity Gold Client for Data Protection solution helps to identify and mask the personally identifiable information (PII) of customers, vendors, employees, and partners across production SAP ECC applications to address the "right to be forgotten" mandate.

Posted June 04, 2018

As Hadoop adoption in the enterprise continues to grow, so does commitment to the data lake strategy. DBTA recently held a webinar with Mark Van de Wiel, CTO, HVR, Dale Kim, Sr. director, products/solutions, Arcadia Data, and Rick Golba, product marketing manager, Percona, who discussed unlocking the power of the data lake.

Posted June 04, 2018

Whether you're an Oracle system or database administrator, an IT manager, or executive, or even just an end user or customer, security should be as important to you as almost anything else. We all hear about breaches in the news all too often. From the executive level to the end customer, none of us want to be anywhere near such a breach.

Posted June 01, 2018

With all of the data breaches and accusations of improper data usage in the news these days, the question of who owns data looms large. Understanding who owns which data is a complex question that can't be answered quickly or easily.

Posted June 01, 2018

The unprecedented volumes of data now pouring forth from virtualization technologies and cloud-based infrastructure have taxed traditional storage architectures beyond their limits. Organizations want to store their data in an efficient and affordable way that is also flexible. Software-defined storage (SDS) meets these criteria and, therefore, is enjoying a surge in adoption.

Posted June 01, 2018

It's spring-cleaning season, meaning many diligent homeowners are busy trying to organize their closets and homes in preparation for the spring and summer. Organizations, both small and large, also must keep up with cleaning their virtual dust bunnies on a regular basis, just as one would do within their own home.

Posted June 01, 2018

Looker, a data platform provider, is releasing new tools and integrations to optimize data science workflows. Looker is improving its governed data workflow with an SDK for R and connections for Python, as well as streamed and merged results, Google TensorFlow integrations, and clean, visual recommendations for users.

Posted May 30, 2018

Cloud-driven automation is creating the need for an evolution throughout IT and the enterprise. DBTA recently held a webcast featuring Joe McKendrick, independent analyst and author, and Maria Colgan, Oracle master product manager, who examined how cloud is driving change and how Oracle can help.

Posted May 25, 2018

Technology is constantly changing, and IT architects need to keep up with modern developments to ensure that their companies are achieving the best possible return on their IT investment.

Posted May 24, 2018

Today, data is increasingly seen as the fuel of the business, rather than its byproduct. As a result, the old adage "garbage in, garbage out" couldn't ring truer when it comes to maximizing the value of machine learning in the enterprise, according to Steve Zisk, senior product marketing manager of RedPoint Global, which provides a customer data platform and engagement hub. 

Posted May 24, 2018

Pick Cloud and Rocket Software will present a webinar focused on how to use D3 Hot Backup with the Google Cloud Platform to ensure MultiValue users are covered in case of a disaster. D3 Hot Backup can save the business in the event of a disaster, and a cloud solution can make it easier to maintain mission-critical operations.

Posted May 23, 2018

OneLogin has announced a new product that allows companies to manage access for on-premises and cloud-based applications with a single identity-as-a-service (IDaaS) solution.

Posted May 23, 2018

In financial services, the ability to spot fraud faster can be a key differentiator. At Data Summit 2018, Karun Komirishetty, senior manager, Software Engineering, Capital One, presented a session on how Capital One has created a fraud engine for Zelle payments, which are replacing traditional forms of payments such as checks, cash, and credit cards.

Posted May 23, 2018

While companies are collecting treasure troves of information about their customers, they are increasingly looking for the right tools and technologies to gain a 360° view that is critical to leveraging the data's full value. Zak Pines, VP marketing, Bedrock Data, presented his session, "Overcoming Data Silos to Get a Unified View of Customers" on Tuesday, May 22, 2018 during Data Summit 2018.

Posted May 22, 2018

MariaDB Server 10.3 introduces Oracle compatibility, allowing users to utilize Oracle PL/SQL and Oracle sequences in an open source database. This makes it easier for DBAs and developers to migrate and/or reuse database code.

Posted May 22, 2018

Nutanix, provider of enterprise cloud computing, has released Nutanix Flow, a software-defined networking (SDN) security solution built for the multi-cloud era. Flow provides application-centric security to protect against internal and external threats not detected by traditional perimeter-oriented security products. Flow capabilities are integrated into Nutanix's Acropolis software and will also be enhanced with real-time application visibility and discovery technology from the company's recent acquisition of Netsil.

Posted May 21, 2018

As the value and volume of data continues to rise, the need to effectively assess and communicate data-related risks has never been greater. Business executives need a focused set of metrics that enable fast and effective decisions. IT and security pros often lack the right metrics, information, and approach needed to embed themselves into business conversations and positively affect data security practices.

Posted May 16, 2018

Enterprise NoSQL database provider MarkLogic has announced the release of MarkLogic 9.0-5. MarkLogic 9.0-5 is part of MarkLogic's continuing mission to make use of MarkLogic easier to use and more automatic, said David Gorbet, SVP of engineering, MarkLogic. Beyond that, he said, the new enhancements can be divided into two main themes, one of which is "smart database technology," with the database providing the ability to understand more about the context of a company's data so it can govern and manage it better.

Posted May 16, 2018

Silicon Valley has achieved an almost mythical status in both modern American popular culture as well as the annals of world economic history. Located south of San Francisco, the name "Silicon Valley" was coined in the early 1970s due to the volume of silicon chip innovators and manufacturers in the area. Today, the valley is synonymous with technology innovation and venture capital: two mighty forces of change.

Posted May 11, 2018

Although security is often related to privacy, they are not synonymous. Data security can be defined as the set of policies and techniques to ensure the confidentiality, availability, and integrity of data at all times. Data privacy refers to the fact that the parties accessing and using the data do so only in ways that comply with the agreed-upon purposes of data use in their roles. These purposes can be expressed as part of a company's policy, but are also subject to legislation. In this way, several aspects of security can be considered as necessary instruments to guarantee data privacy.

Posted May 11, 2018

Technology is constantly changing, and IT architects need to keep up with modern developments to ensure that their companies are achieving the best possible return on their IT investment. This can be achieved by architecting a solid IT infrastructure with modern components spanning the hardware, software, network resources, and services required for the operation and management of an enterprise IT environment.

Posted May 11, 2018

If blockchain could only be described in one word, that word would be "trust." It is an ideal mechanism to establish trust among multiple parties, demonstrated by its seminal use case as an abstraction for currency. The currency paradigm is instructive because it demonstrates the core concepts that could be leveraged in other use cases.

Posted May 11, 2018

Fueled by the growing demand for data-driven insights, as well as the explosion of new data sources and formats, innovative big data technologies continue to expand. While the long-trusted RDBMS still reigns supreme in most organizations, the surging force of data from social media, mobile devices, IoT, and other sources, as well as the availability of additional options for data storage and processing, means that there is plenty of room for disruptive new approaches.

Posted May 11, 2018

Offered in partnership with Rackspace, Couchbase Managed Cloud is a fully-managed database service that allows IT teams to solve cloud and database infrastructure challenges and to reallocate resources toward business initiatives that drive growth. With Couchbase Managed Cloud, Couchbase combines powerful NoSQL technology with the capabilities and expertise of Rackspace, which provides transformation as a service across applications, data, security, and infrastructure, to deliver a single solution for a unified customer experience.

Posted May 10, 2018

Organizations worldwide are grappling with the requirements of the European Union's General Data Protection Regulation (GDPR) and it's no secret that finding ways to remain compliant has become one of the most visible challenges, and one that has dominated the conversation. What's more pertinent; however, is the root of the problem: outdated systems which organizations use to track and understand where their data lives. This has grown more difficult day-by-day, as the amount of data collected by organizations grows exponentially. GDPR is a good forcing function to spur them to dig into this problem before it gets worse.

Posted May 08, 2018

Today, data is understood to be the fuel that propels companies' growth and success. As a result, safeguarding that valuable resource is more important—but also harder—than ever. To help companies on their journey to data security and compliance, DBTA and Big Data Quarterly have launched the 2018 Cybersecurity Sourcebook, a "go-to" resource for IT and business stakeholders looking for real direction on the challenges and imperatives of cybersecurity and new regulatory initiatives.

Posted May 08, 2018

It's time to vote for the annual Database Trends and Applications Readers' Choice Awards Program in which the winning information management solutions, products, and services are chosen by you—the people who actually use them. Voting ends Friday, May 11, 2018, so be sure cast your ballot now for the candidates of your choice.

Posted May 08, 2018

Thales is broadening the reach of its multi-cloud Bring Your Own Encryption (BYOE) solutions to encompass the most cost-effective cloud storage tiers, which include AWS S3, Azure Files, and Google Cloud Storage. The company's BYOE solutions available in the Vormetric Data Security Platform span public cloud and private cloud providers, allowing users to establish strong safeguards, controls and security around their sensitive data in the cloud.

Posted May 07, 2018

We're all familiar with the IT "war room" scenario. When there's an issue, members of the IT team come together to troubleshoot and find a solution. For organizations with important applications, such as SQL Server running in virtual infrastructures, these IT teams are no strangers to the IT war room environment. In this case, input from the SQL Server system administrators and DBAs isn't considered (or even requested) when the infrastructure team implements it virtualization plan.

Posted May 07, 2018

GDPR has gone into effect. Rex Ahlstrom, chief strategy and technology officer at BackOffice Associates, a provider of information governance and data stewardship solutions, discussed what's at stake.

Posted May 01, 2018

Recently, the revised Markets in Financial Instruments Directions (MiFID II) launched in the EU. The sweeping regulatory changes will impact transaction reporting on all financial instruments traded in Europe and affect all U.S. firms that do business with European counterparts or customers. Firms will face new requirements in tracking data—including emails, texts, and documents related to every transaction—and will need to be able to quickly reconstruct trades and search across data silos,  presenting a significant challenge. Here, Ken Krupa, CTO at enterprise database company MarkLogic, discusses the impact to U.S. firms, and how new regulations underscore the importance of increasing transparency, consumer protection, and data integrity.

Posted April 30, 2018

Syncsort and Collibra have  announced delivery of automated connectivity between Syncsort's Trillium Discovery product and the Collibra Data Governance Center. This integration can help companies address data quality under the European Union's General Data Protection Regulation (GDPR) and other key regulatory initiatives. Data quality is important to GDPR because the regulation gives customers the right to access and correct their personal data and have a say in how long the data can be retained, ultimately empowering citizens' data privacy.

Posted April 30, 2018

erwin has introduced the next generation of erwin DM NoSQL, which supports native integration with the Couchbase Data Platform for new enterprise applications and legacy RDBMS-based migrations. With this integration, erwin DM NoSQL provides native (non-relational) data modeling for document databases, automating the creation of platform-specific deployment scripts, to strengthen data governance. It also helps reduce the risks and costs associated with new platform adoption and accelerates the time-to-value, the company says.

Posted April 30, 2018

Due to the constant influx of data, data warehousing has been forced to evolve or get left behind. Conventional, on-premises data warehouses are simply unable to provide the agility, elasticity or pay-as-you-go efficiency that today's businesses and analytics use cases demand.

Posted April 26, 2018

When it comes to data strategy, sometimes it's an all or nothing sum game. Things continue to ramp up in the big data space and supporting that data is more important than ever before. It's time to change the approach to data governance.

Posted April 26, 2018

Companies continue to get wrapped up in this constant big data deluge. Expanding data volumes and longer data retention requirements are putting enormous and previously unforeseen stresses on organizations' data security and compliance environments.

Posted April 26, 2018

With the General Data Protection Regulation (GDPR) deadline quickly approaching in May, many organizations are scrambling to get their customer information systems in order to meet the requirements. Any company that collects and processes the personal data of European citizens and residents—whether it is names, IP addresses, photos, videos, health and biometric info, or other types of data—will be impacted.

Posted April 26, 2018

For enterprises storing sensitive data in the cloud, an enhanced security strategy is key to monitoring and protecting that data. In fact, according to Oracle research, 40% of respondents say that detecting and responding to cloud security incidents is now their top cyber security challenge. As part of efforts to address this concern, four in 10 companies have hired dedicated cloud security architects, while 84% say they are committed to using more automation to effectively defend against sophisticated attackers.

Posted April 26, 2018

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45

Sponsors