Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

Oracle has expanded the Oracle Cloud Platform's data integration offerings with the launch of Oracle Data Integrator Cloud. The new cloud service is aimed at speeding and simplifying cross-enterprise data integration to support real-time analytics.

Posted February 13, 2017

Baffle, Inc. has announced that its encryption as a service (EaaS) solution now supports SQL databases, to ensure that sensitive data remains encrypted end-to-end—from production through processing, while being stored on-premise, in the cloud, and while being processed by databases and applications.

Posted February 10, 2017

Innovative technologies, such as artificial intelligence, augmented reality, robotics, and IoT, have had, and will continue to have, broad impact that we don't yet fully understand. Organizations that adopt these technologies will require new business models and processes. We will need to understand who our customers are and what they expect. The world of work as we know it today will continue to evolve at a faster pace—this is why adaptability and resilience are critical to a vibrant career.

Posted February 08, 2017

As businesses realize the importance of big data, adoption is on the rise. But big data is still not in full-scale production everywhere, and many companies say operational challenges hold them back. So what are the operational challenges that big data presents? It's a confluence of three key features of big data.

Posted February 08, 2017

Are enterprises more or less secure than 5 years ago? That's the big question of the moment, especially with ongoing revelations about state-sponsored hacking, as well as an unending stream of reports about customer and employee data being compromised by even the most seemingly security-conscious organizations. Awareness of data security is running at a fever pitch at the highest levels of government and business organizations. There have been plenty of technology advances, and awareness has grown. Still, the wave of breaches and threats never seems to abate, and likely never will.

Posted February 08, 2017

The role of the DBA is growing and becoming more complicated in the age of digital transformation. As the amount and type of information we store expands, DBAs must become versed in administering not just one type of DBMS (e.g., relational), but multiple types (document, key/value, wide column stores, and graph) and even non-DBMS data platforms (e.g., Hadoop). Furthermore, cloud computing can change the manner in which existing applications and databases operate.

Posted February 08, 2017

As news of data breaches continues to grab headlines, data security is becoming a greater enterprise concern. However, at the same time, it is becoming clear that many organizations are actually doing things that make their data more vulnerable. Recently, Joe Pasqua, executive vice president of products at MarkLogic, provider of enterprise NoSQL database technology, discussed the ways organizations and their employees are unintentionally putting their data at greater risk—and the ways to address it.

Posted February 03, 2017

Hewlett Packard Enterprise (HPE) has acquired Niara Inc., a Sunnyvale, California-based provider of software for the user and entity behavior analytics (UEBA) market segment. Niara will operate within HPE Aruba to enhance the company's ClearPass network security portfolio for wired and wireless network infrastructure. Terms of the transaction were not disclosed.

Posted February 02, 2017

Oracle Financial Services Analytical Applications and PwC have formed a global collaboration to offer technology, implementation and consulting solutions to help financial institutions meet compliance with the International Accounting Standards Board's (IASB) new IFRS9 and FASB's proposed CECL reporting standards.

Posted February 01, 2017

Carbonite, a provider of data protection solutions for small and midsize businesses (SMBs), has acquired Double-Take Software, enhancing Carbonite's its existing suite of data protection solutions with high availability technology that minimizes downtime. The aggregate purchase price for Double-Take Software was $65.25 million.

Posted January 31, 2017

IBM announced its second-quarter 2016 earnings results, and its cloud business continues to accelerate. Overall, revenue was $20.2 billion for the quarter, and "strategic imperatives"—which include cloud and data analytics—were $8.3 billion in the quarter, up 12% year to year. Cloud revenues (public, private and hybrid) for the quarter increased 30%. Cloud as-a-service revenues saw an annual run rate of $6.7 billion in the quarter, up 50% year to year.

Posted January 30, 2017

SS8, which provides breach detection software, has announced the latest version of its BreachDetect technology which makes advanced threat detection and investigation capabilities accessible to enterprise security and IT administrators.

Posted January 26, 2017

The past year was a blockbuster one for those working in the data space. Businesses have wrapped their fates around data analytics in an even tighter embrace as competition intensifies and the drive for greater innovation becomes a top priority. The year ahead promises to get even more interesting, especially for data managers and professionals. Leading experts in the field have witnessed a number of data trends emerge in 2016, and now see new developments coming into view for 2017.

Posted January 25, 2017

vArmour has been awarded a patent by the USPTO for security technology for container microservices. Marc Woolward, CTO of vArmour described what's changing in the world of clouds, containers, and microservices.

Posted January 24, 2017

Collibra, a provider of data governance software for business users, has closed $50 million in Series C financing led by San Francisco-based ICONIQ Capital with participation from investment firm Battery Ventures and existing backers Dawn Capital, Index Ventures, and Newion Investments.

Posted January 20, 2017

MapR Technologies, Inc has been granted a patent (US9,501,483) from the United States Patent and Trademark Office to protect file, table and stream processing for convergence, security, and more. This patent, in particular, covers key technology underpinning components of the MapR Converged Data Platform, including the multi-modal NoSQL database (MapR-DB) and global streaming engine (MapR Streams).

Posted January 18, 2017

At Oracle CloudWorld in New York City, Oracle unveiled new enhancements to the Oracle Cloud Platform to help customers move business-critical applications to the cloud. Describing the industry's move to the cloud as an "irresistible force," Oracle CEO Mark Hurd said, "This is not a what-if; this is the way things are going to go. The sooner you get on board with that the better."

Posted January 18, 2017

Oracle has announced the availability of Oracle Retail Release 16, which allows retailers to deliver unified consumer experiences across e-commerce and brick and mortar locations.

Posted January 18, 2017

Vanguard Integrity Professionals has introduced enhanced Multifactor Authentication solution across its enterprise-wide cybersecurity software suite.

Posted January 17, 2017

IBM broke the U.S. patent record with 8,088 patents granted to its inventors in 2016. IBM's 2016 patent output covers inventions in artificial intelligence and cognitive computing, cognitive health, cloud, cybersecurity and other strategic growth areas for the company.

Posted January 16, 2017

Patrick Hubbard, head geek and technical product marketing director at SolarWinds, recently discussed key themes that will emerge on the IT front in 2017. Smarter use of container technologies, a greater emphasis on security, and the continued shifting of IT roles, he says are some of the key trends that will take hold in the year ahead.

Posted January 13, 2017

Clustrix, a provider of a distributed SQL database, and Zettaset, a provider of big data security, are partnering on data protection and privacy for companies that rely on large-scale OLTP databases.

Posted January 11, 2017

Hortonworks has forged an open source collaboration with Neustar, a provider of real-time information services, on security and identity management tools for IoT devices.

Posted January 11, 2017

Dataguise, a provider of sensitive data governance solutions, is partnering with WHISHWORKS, a provider of IT services and systems integration. The partnership is focused on helping organizations to overcome difficulties in unlocking big data's potential because of the compliance requirements that will be imposed by the General Data Protection Regulation (GDPR) in May, 2018.

Posted January 10, 2017

Verizon and Cypress Semiconductor Corp. have announced they are partnering on wireless connectivity with end-to-end security for IoT developers. Their offering, which is planned to be commercially available early in the second quarter of 2017, will give developers the ability to access Verizon's ThingSpace software development kit via the Cypress Wireless Internet Connectivity for Embedded Devices (WICED) Studio 4 development platform. Developers using WICED can integrate cloud connectivity with the Verizon ThingSpace platform in a single development environment.

Posted January 06, 2017

By now it's well documented that employees will take IT tasks into their own hands when IT cannot give them the support they need, and when they need it. The phenomenon is ubiquitous and persistent, even to the point that it's been dubbed "shadow IT." Gartner recently noted that by 2020, a third of successful attacks experienced by enterprises will be on their shadow IT resources.

Posted January 04, 2017

Dashlane, a provider of online identity management software, is collaborating with Intel to deploy Intel Software Guard Extension (SGX) technology with Dashlane's password manager.

Posted January 03, 2017

Rocana is releasing Rocana Ops 2.0, updating its event alerting and orchestration capabilities, offering unique visual experience for first responders, and providing wider cloud platform visibility. Now with Rocana Ops 2.0, IT teams can take real-time intelligent action on all of their event data. Rocana Reflex is a new event alerting and orchestration system that enables operations teams to provide smart, instant, and automated reactions based on what is happening in their environment.

Posted January 03, 2017

There was a time when what you saw was what you got. Building up the components of a business intelligence area was very straight-forward. A staging area was a staging area; an operational data store was an operational data store. But like buying a pitcher of beer for $2, or gas for less than a dollar per gallon, those days are gone. The dynamics have changed, things are more federated, and IT must accept more than one standard tool.

Posted January 03, 2017

One of the long-standing differentiators between SQL Server's Enterprise Edition (EE) and Standard Edition (SE), besides price, were the large number of features available only in EE. This is also true for other lower editions of SQL Server such as Web Edition and Express Edition. But there's big news in the air!

Posted January 03, 2017

As enterprises accelerate their movement of data into the cloud, a slew of new challenges are presenting themselves on the security front. For users of external or public cloud services, the risks are well understood. However, private and hybrid clouds are not immune to security vulnerabilities either. Thanks to private clouds, data is proliferating across various parts of the enterprise, along with the potential for insider abuse, according to a new Unisphere Research report.

Posted January 03, 2017

MicroStrategy, a provider of enterprise software platforms, has announced the general availability of MicroStrategy 10.6, the newest feature release to the company's MicroStrategy 10 platform. The latest release offers several new features across MicroStrategy Desktop, MicroStrategy Web and MicroStrategy Mobile.

Posted December 21, 2016

As 2016 comes to a close, experts at SAP are looking ahead at what 2017 may offer. Ken Tsai, vice president, head of cloud platform and data management, product marketing, at SAP, and David Jonker, senior director, product marketing, at SAP, foresee several trends on the horizon that the company will tackle moving forward.

Posted December 14, 2016

IT operations teams have been furiously preparing for this year's holiday season - the retail industry's busiest time of the year for web traffic. Here is a checklist of the key factors IT operations teams need to consider to ensure their IT infrastructure is ready now - and stays that way throughout the shopping season.

Posted December 14, 2016

ZeroPoint technology focuses on analyzing documents, email, web content and server traffic for hazardous content such as malicious code

Posted December 13, 2016

Thales, a provider of cybersecurity and data security solutions, has added new capabilities for its Vormetric Data Security Platform. The new capabilities extend data-at-rest security with integrated Docker encryption and access controls, the ability to encrypt and rekey data without having to take applications offline, FIPS certified remote administration and management of data security policies and protections, and the ability to accelerate the deployment of tokenization, static data masking and application encryption.

Posted December 09, 2016

It has become all too clear that no organization is immune from the risk of a data breach, and that anyone accessing data can pose a threat - including trusted employees and partners. Here, IT executives speculate on the impact newer technologies such as IoT, blockchain, and cloud, as well as the need for data protection, including disaster recovery plans, encryption, and comprehensive oversight.

Posted December 07, 2016

Terms such as "active," "inactive," and "canceled" may seem mundane and inconsequential, and when folks hear the term,"valid values," their eyes glaze and expectations of interest diminish. But exciting or not, reference values and an understanding of them are important to every organization.

Posted December 01, 2016

It is not uncommon for a medium-to-large company to have 50 or more different security technologies in place. While fiscally inefficient, this approach has been somewhat effective up to this point in dealing with the types of attacks launched against it. But the threat landscape is currently changing more rapidly than ever, forcing businesses to shift to a more forward-thinking security model.

Posted December 01, 2016

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90

Sponsors