Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

With Oracle's new ZS3 Series for backup, Oracle ZFS Storage ZS3-BA, the company is providing customers with a pre-configured, pre-racked solution co-engineered with Oracle Database to provide extreme backup and restore performance to help meet SLAs. According to Oracle, ZS3-BA helps ensure backup and recovery SLAs are met by scaling to 26 TB/hr for full backups and 17 TB/hr for full restores - a 30% increase for backups and 80% increase for restores over the previous generation.

Posted June 11, 2014

MySQL Fabric is now generally available, providing an integrated system that makes it simpler to manage groups of MySQL databases. It delivers both high availability - via failure detection and failover - and scalability through automated data sharding.

Posted June 11, 2014

Oracle has joined the OpenDaylight Project as a Silver Member, and is expanding its application-driven software defined networking (SDN) capabilities in Oracle Solaris 11.2 with plans to integrate OpenDaylight SDN. The aim with the new integration is to help customers improve service quality and take advantage of apps-to-disk SLAs through compatibility with a range of SDN devices, applications and services. It will also allow them to use a common and open SDN platform with OpenStack to manage Oracle Solaris-based clouds.

Posted June 11, 2014

Good data quality starts with metadata. Accurate data definitions are required in order to apply the controls for compliance to the correct data. Without proper metadata definitions, it is impossible to apply regulatory compliance to data.

Posted June 11, 2014

Dataguise, a provider of big data security and protective intelligence solutions, has introduced the Dataguise DgSecure data protection platform with the MapR Sandbox for Hadoop, and also announced the Dataguise DgSecure data protection platform with the Hortonworks HDP 2.1 Sandbox. "In order to realize the benefits of big data, enterprises are getting more proactive about addressing security, privacy and risk in Hadoop," said Patty Nghiem, vice president of marketing and business development at Dataguise.

Posted June 10, 2014

Cloudera has acquired Gazzang to add enterprise-grade data encryption and key management. The move is designed to address the challenges associated with securing and processing sensitive and legally protected data within the Hadoop ecosystem, and also fulfill a requirement posed by compliance regulations such as HIPAA-HITECH, PCI-DSS, FERPA and the EU Data Protection Directive.

Posted June 10, 2014

STORServer is offering CommVault-Dell appliance customers the opportunity to evaluate or upgrade their current systems risk-free and at a discount in the wake of Dell's announcement that it is ending sales of backup appliances powered by CommVault Simpana. The options for current CommVault-Dell appliance customers to evaluate their current backup environments include 50% off a Health Check as well as a free software upgrade from Simpana 8 or 9 to version 10.

Posted June 09, 2014

RainStor 5.5 has been certified to run on Cloudera Enterprise 5. This new certification enables Cloudera customers to run RainStor natively on HDFS, while offering enterprise-grade security features. "RainStor running on Cloudera Enterprise 5 is a significant step forward for customers taking a serious look at Hadoop," said Mark Cusack, chief architect, RainStor.

Posted May 22, 2014

Big data is causing a big shift in three areas - people, process and technology, said SAS thought leader Anne Buff, who gave a keynote at Data Summit dotted with examples of the rich opportunities for greater customer insight that can be achieved as well as the pitfalls lying in wait for companies that fail to use their data wisely.

Posted May 21, 2014

Dell KACE K1000 version 6.0 enables organizations to boost their Internet of Things (IoT) readiness with new features that provide greater visibility across their entire IT infrastructure, and create a foundation for improved endpoint security.

Posted May 13, 2014

CA is shipping CA arcserve Unified Data Protection, a new resource-saving recovery point server (RPS), combining global source-side de-duplication, integrated block-level replication, AES 256-bit level encryption, and cascading retention policies.

Posted May 12, 2014

It's an inevitable fact that every software system will have problems, but an enterprise-grade Hadoop infrastructure puts minimizing and managing these system errors at the forefront. When considering a distribution's dependability, you should evaluate a Hadoop distribution's position in five foundational necessities.

Posted May 08, 2014

At an event in NYC, Oracle president Mark Hurd and EVP John Fowler unveiled Solaris 11.2, which represents an evolution from operating system to a complete platform, they said. The phenomena of cloud and engineered systems are driven by the same requirement, which is the need to transfer work from the IT budget to the R&D budget to make things work more efficiently, observed Hurd, who asked, "Who really wants to glue an operating system to a server?"

Posted May 08, 2014

Varonis Systems has announced the upcoming beta release of DatAnswers, a new solution for secure, relevant search for NAS, Windows file servers and SharePoint.

Posted May 06, 2014

Dell and DataMotion have formed a partnership that will allow users of Dell SonicWALL email security solutions to exceed privacy standards with compliance-grade encryption capabilities for all emails and file attachments, right from their Outlook client.

Posted April 29, 2014

FalconStor Software has signed a reseller agreement allowing X-IO, an enterprise storage provider, to package and sell FalconStor Network Storage Server (NSS). By combining X-IO's Intelligent Storage Element (ISE) solutions with FalconStor NSS, customers will have access to a flash-enabled storage solution that includes data protection and DR solutions.

Posted April 28, 2014

Anew version of EMC Disk Library for mainframe (Dlm) offers improved performance, enhanced usability and more storage choices. DLm release 4.1 provides for simplification of D/R testing for EMC VNX based Dlms, single drive performance improvements, deeper operational insights, and IPv6 compliance.

Posted April 28, 2014

NaviSite, Inc., a Time Warner Cable Company, has launched NaviCloud Vault: Data Domain, which provides an on-demand, cloud-based model to scale off-site storage capacity.

Posted April 28, 2014

TEKsystems, an IT staffing solutions provider, says that employers are finding it increasingly difficult to hire business intelligence and security experts.

Posted April 23, 2014

Windows-upgrade procrastinators, watch out. That's the message coming through from some security experts who estimate that there is a significant portion of business users who still have not moved off Windows XP, despite the fact that patches will no longer be issued. Users have been warned by Microsoft for years now that support for the more-than-decade-old operating system, as well as for Office 2003, would end on April 8, 2014.

Posted April 23, 2014

Hadoop distribution companies Cloudera, Hortonworks and MapR have joined a new Big Data Protection Partner Program launched by Dataguise, a provider of data privacy protection and risk management analytics.

Posted April 22, 2014

Enhancing its portfolio of enterprise cloud services, Oracle has introduced two new services, Oracle Database Backup Service and Oracle Storage Cloud Service. According to Rex Wang, vice president, Product Marketing, Oracle, the new services help simplify IT, reduce costs, and accelerate innovation to drive competitive advantage.

Posted April 16, 2014

New offerings for IBM System z are aimed at helping customers with rapid development and deployment of mobile applications as well as the ability to integrate them with core business processes, applications, and data. As part of this effort, As part IBM is enabling the industry's first commercial Hadoop for Linux on System z - zDoop software - provided through through Veristorm, an IBM partner.

Posted April 14, 2014

With cloud, outsourcing and BYOD posing new challenges to ensuring authorized access to data, Oracle introduced enhancements to Oracle Identity Management 11g Release 2 that are aimed at helping organizations extend access policies and controls beyond enterprise applications and systems to cloud-based systems and mobile devices.

Posted April 14, 2014

Kelly Stirman, director of product marketing at MongoDB, emphasized simplicity, reliability, and security in a recent conversation about the new capabilities of MongoDB 2.6. "Don't let the 2.6 fool you. It is absolutely the biggest release we have ever done."

Posted April 08, 2014

Ntirety, a provider of remote DBA, data consulting, and DBA on-demand services for Oracle, SQL Server and MySQL, has been acquired by HOSTING. With the acquisition, said Ntirety founder Michael Corey, the Dedham-based company becomes a division of HOSTING, with Corey as president of the division.

Posted April 04, 2014

The theme for COLLABORATE 14-IOUG Forum is "Become Your Office Superhero," because, while you may look like a mild mannered technical resource in meetings or at your desk, you fight a daily battle to protect your organization's data, improve performance and generate new business opportunities. COLLABORATE is your chance to recharge your superpowers and to take on new skills.

Posted April 02, 2014

Organizations should exercise caution when it comes to implementing new technologies for data governance. Sometimes, the lowest tech solution is the best one and spending money on more software without laying the groundwork actually sets companies up to fail.

Posted April 02, 2014

SAP has officially announced Adaptive Server Enterprise (ASE) 16, a major release of the company's RDBMS, as well as Replication Server, 15.7 SP200 which includes synchronous replication for HA/DR for SAP Business Suite on ASE. It has been 9 years since Sybase (acquired by SAP in 2010) announced ASE 15 in August 2005. With the new release, said Dan Lahl, SAP VP, Database & Technology Marketing, SAP is providing "the right system of record that is going to be able to handle the new world of transaction processing."

Posted April 02, 2014

Attunity Replicate, a data replication and loading solution, has introduced new support for MySQL as a source and target as well as for multiple non-relational sources including Enscribe, RMS, IMS, and VSAM.

Posted April 02, 2014

A new Development Milestone Release for MySQL 5.7, as well as other MySQL product releases and early access features, has been announced by Oracle. With MySQL 5.7.4 DMR, the open source database is twice as fast as the previous version.

Posted April 01, 2014

STORServer is shipping the BA641-CV, a new entry-level backup appliance that incorporates solid-state drives (SSDs), as well as a new expansion system, the EBA-EXPSM-CV.

Posted March 31, 2014

Zettaset introduced a new encryption capability integrated into its existing security solution for enterprises using Hadoop.

Posted March 27, 2014

The need for better Hadoop security is widely acknowledged. However, the transformative potential of big data is spurring the industry to quickly fill Hadoop's security gaps. To keep pace with these developments, organizations must keep a close watch on the new tools and practices being deployed.

Posted March 27, 2014

Wind and water pose their own unique threats to data centers - and, as more than one pundit has observed, we seem to be experiencing a "storm of the century" every few years. Fortunately, there are approaches companies can take to mitigate risk.

Posted March 26, 2014

Attachmate Reflection 2014, the newest version of Attachmate's terminal emulation software, provides enterprise customers with support for advanced security protocols and the Windows 8.1 operating system, as well as features that make it easier to access legacy applications from mobile devices.

Posted March 17, 2014

Embarcadero, a provider of software solutions for application and database development, is acquiring CA Technologies' ERwin Data Modeling solution. The acquisition will provide Embarcadero additional channel partners. ERwin is sold almost exclusively through more than 500 partners in over 70 countries.

Posted March 17, 2014

New integration between the Vormetric Data Security platform and IBM QRadar provides companies with automated data access pattern analysis, enabling them to identify potential threats to sensitive data at the source. The combined solution identifies unauthorized data access attempts - indicating accounts that represent a possible threat - and includes capabilities to monitor and alert on data access patterns that may indicate the presence of an Advanced Persistent Threat (APT) or a malicious insider attack.

Posted March 13, 2014

Database disaster recovery must be an integral component of your overall business recovery plan. Just because your organization has not yet experienced a disaster, or is not in a high-risk area, does not absolve you from the need for contingency planning. Here is what all DBAs should do to be prepared.

Posted March 12, 2014

Rogue IT practices have grown exponentially with the use of public cloud services. Will these herald the end of internal IT or a means for healthy IT transformation? The risk exists for either outcome. It all depends on how IT organizations approach it.

Posted March 12, 2014

KnowBe4 has announced the latest release of KnowBe4 Compliance Manager, a cloud-based audit and compliance workflow automation tool which now includes self-assessment capabilities.

Posted March 11, 2014

McAfee, a provider of security solutions and services for systems, networks, and mobile devices, has improved its capabilities for finding, freezing, and fixing advanced threats faster to thwart targeted attacks. The McAfee solution binds and shares threat intelligence and workflows across endpoints, network and the cloud , resulting in a level of protection that the company says cannot be achieved with individual point products.

Posted March 05, 2014

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60

Sponsors