Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

Datawatch Corporation unveiled an enhanced version of its self-service data preparation solution, making the platform faster and more intuitive. Datawatch Monarch 13.5 empowers business users and data analysts to overcome traditional data access and preparation challenges by enabling them to easily and rapidly mine data from virtually any source and then manipulate, blend, enrich, and prepare it for use in analytics tools or optimizing manually intensive business processes.

Posted September 07, 2016

Dell has completed the acquisition of EMC, creating a $74 billion company with a technology portfolio spanning hybrid cloud, software-defined data center, converged infrastructure, platform-as-a-service, data analytics, mobility and cybersecurity. Describing itself as the world's largest privately-controlled technology company, the combined entity will be known as Dell Technologies.

Posted September 07, 2016

SVA Software, a provider of storage performance management software, announced its company launch in North America along with a new partner program to capitalize on the demand for its BVQ storage optimization solutions, intended to simplify the management of virtualized data center operations.

Posted September 06, 2016

Being able to deliver a rapid response to problems is a core need for the modern enterprise. While many network "issues" can suffer a delay in response time, true problems such as security breaches and network outages cannot. Let's look at two situations that require a rapid response, five questions that IT never wants to hear, and one example of a solution that IT can implement.

Posted August 24, 2016

EMC has unveiled new products and support to optimize the protection of VMware workloads to enable protection everywhere. The enhanced support spans VMware Virtual SAN, VMware vSphere and expanded data protection options for VCE VxRail Appliances.

Posted August 23, 2016

Perhaps the biggest and most overlooked is how to create accurate test data. You're implementing a new system in order to deal with a massive amount of data, and perhaps your relational database can't handle the volume, so it's vitally important to properly test this new system and ensure that it doesn't fall over as soon as the data floods in.

Posted August 23, 2016

HyTrust Inc. has added enhanced capabilities for its workload security platform to support organizations with virtualized, public, private or multi-cloud environments for popular cloud technologies including Amazon Web Services, IBM, EMC, Intel, Microsoft and VMware. The releases, HyTrust DataControl 3.2 and HyTrust CloudControl 5.0, are intended to address data center complexity.

Posted August 22, 2016

Waterline Data, the Smart Data Catalog company, is releasing an enhanced version of its Smart Data Catalog, allowing users to gain easier self-service access to trusted, high quality data for faster discovery, understanding, use and governance.

Posted August 17, 2016

Regulatory compliance is a critical aspect of the IT landscape these days, and the ability to audit database activities showing who did what to which data when is a specific requirement of many industry and governmental regulations. There are six primary methods that can be used to accomplish database auditing.

Posted August 16, 2016

MuleSoft is teaming up with Pivotal to deliver application networks on the Pivotal Cloud Foundry platform. Customers who want to create a network of applications, data, and devices using MuleSoft can now deploy to Pivotal Cloud Foundry and manage their application network with Anypoint Platform.

Posted August 10, 2016

Nimbus Data is releasing a new all-flash platform for cloud, big data, virtualization, and massive digital content that will offer unprecedented scale and efficiency.

Posted August 09, 2016

Datameer is launching a newly redesigned Global Partner Program to recruit and enable a dynamic ecosystem of technology, services, and reseller partners. Datameer's new program introduces a rewards system that recognizes partners and helps form a trusted and easily accessible network for customers.

Posted August 09, 2016

The Independent Oracle Users Group (IOUG) is excited to be joining the Oracle technology community in San Francisco once again at Oracle OpenWorld 2016, September 18-22. IOUG's 30,0000+ member community is comprised of the top Oracle technology experts from around the globe, several of whom will be presenting sessions on hot topics like Data Intelligence, iOT, Data Security, and Cloud migrations.

Posted August 04, 2016

Thousands of members of the Oracle Applications Users Group (OAUG) get the answers they need by sharing best practices, case studies and lessons learned. As the world's largest education, networking and advocacy forum for users of Oracle Applications, the OAUG helps members connect to find the solutions they need to do their jobs better and to improve their organizations' return on investment in Oracle Applications.

Posted August 04, 2016

Anyone who has ever attended Oracle OpenWorld knows that you must plan ahead. The conference held in San Francisco each fall is vast, and the upcoming conference, scheduled for September 18-22, 2016, promises to be equally expansive. Just as in years before, tens of thousands of attendees from well over 100 countries can be expected converge to learn more about Oracle's ever-expanding ecosystem of technologies, products and services during thousands of sessions held at the Moscone Center and multiple additional venues in downtown San Francisco. Here, Database Trends and Applications presents the annual Who to See @ Oracle OpenWorld special section.

Posted August 04, 2016

Can Oracle and its partners keep up with the increasing demands of customers for real-time digital capabilities? Is the Oracle constellation of solutions—from data analytics to enterprise applications—ready for the burgeoning requirements of the Internet of Things (IoT) and data-driven businesses? For Oracle—along with its far-flung network of software vendors, integrators, and partners—times have never been so challenging.

Posted August 04, 2016

The month of June heralded the long-awaited release of Microsoft's SQL Server 2016. The 2016 edition includes unique security functionality with Always Encrypted that protects data both at rest and in motion, ground-breaking performance and scale as evidenced by the number-one performance benchmarks, and accelerated hybrid cloud scenarios and Stretch Database functionality that supports historical data on the cloud.

Posted August 04, 2016

To manage growing data volumes and pressing SLAs, many companies are leveraging Apache™ Kafka and award-winning Attunity Replicate with next-generation change data capture (CDC) for streaming data ingest and processing.

Posted August 03, 2016

The potential of your business intelligence or data processing application is limited without a comprehensive data connectivity solution. Staying competitive and relevant requires a breadth of data connectivity options.

Posted August 03, 2016

Our goal at Amazon Web Services (AWS) is to enable our customers to do things that were previously not possible, and make things that our customers can already do simpler and better at a much lower cost.

Posted August 03, 2016

It is both exciting and validating to be selected as the number 1 data modeling solution by DBTA's discerning readers for the third consecutive year in a row!

Posted August 03, 2016

Data replication advances a number of enterprise goals, supporting scenarios such as distribution of information as part of business intelligence and reporting initiatives, facilitating high availability and disaster recovery, and as part of a no-downtime migration initiative.

Posted August 03, 2016

Everyone knows the three Vs, volume, velocity, and variety, of big data but what's required is a solution that can extract valuable insights from new sources such as social networks email, sensors, connected devices as sensors, the web, and smartphones.

Posted August 03, 2016

Query and reporting solutions are part of a comprehensive business intelligence approach in every organization. As long as enterprises need to gather data, BI groups look to utilize query and report programs as primary applications that produce output from information systems

Posted August 03, 2016

As data grows, organizations are looking for ways to dig up insights from underneath layers of information. Data mining solutions provide the tools that enable them to view those hidden gems and facilitate better understanding of new business opportunities, competitive situations, and complex challenges.

Posted August 03, 2016

Business intelligence encompasses a variety of tools that enable organizations to collect data from internal systems and external sources, prepare it for analysis, develop, and run queries against the data, and create reports, dashboards and data visualizations.

Posted August 03, 2016

Data virtualization provides organizations with the ability to allow the business and IT sides of organizations to work closer together in a much more agile fashion, and helps to reduce the complexity.

Posted August 03, 2016

Data integration is critical to many organizational initiatives such as business intelligence, sales and marketing, customer service, R&D, and engineering. For many enterprises, however, the road to data-driven nirvana is stymied by the inflexible, calcified systems and processes that were laid out decades earlier and still control the data flow within many enterprises, according to Joe McKendrick, lead research analyst at Unisphere Research.

Posted August 03, 2016

The last thing companies want is tainted data merging with incorrect information. The process of maintaining data integrity enhances the reliability of information for use by a business. This is where tools to ensure data quality come in.

Posted August 03, 2016

Data is increasingly appreciated by companies as their most valuable asset. But the problem is that this view is not just held by organizations themselves, there are others - including hackers and - who see it that way as well. IT and data managers can play a pivotal role in enterprise security because they are the insiders with trusted status and they are aware of where the data is stored and how best to reduce or eliminate threats. Newer security technology can also relieve many of the manual burdens associated with database monitoring.

Posted August 03, 2016

For fast-paced, turn-on-a-dime digital enterprises, with demands for 24-by-7 uptime, no activity is more vital than keeping database systems up and running. Today, database availability is no longer just a critical IT issue; it is a critical business issue. To be prepared in the event of system failures, infrastructure owners and DBAs have developed strategies to increase resiliency and assure availability of data.

Posted August 03, 2016

Database development is growing more challenging all the time. Releases are expected to come out faster than ever, and teams are more spread out across, global geographies, time zones, and skill levels. Software deployment, meanwhile needs to be spread across cloud and onsite, and accessible through more devices than ever. What's needed is an integrated end-to-end environment with multi-platform support that helps simplify development and provides automation to achieve repeatable processes and avoid potential risks that can translate into unanticipated delays.

Posted August 03, 2016

If information is the lifeblood of organizations today, then delivering information where it is needed faster can be considered a matter of business health, and in some cases, even business survival.

Posted August 03, 2016

There is more data available to organizations than ever before, but the goal remains the same - to unlock nuggets of gold, the useful information that will result in competitive advantage for the organization, allowing it to react to customer's needs with lightning speed, uncover new opportunities, and act fast to counter competitive threats.

Posted August 03, 2016

Over the years, MultiValue technology has maintained its base of committed advocates despite the decades-long trend toward relational database management systems. And, now with an expanding appreciation for polyglot persistence, or put more simply, the selection of the best tool for the job, there is a growing recognition that different data management systems offer different benefits with some simply better suited for certain requirements than others.

Posted August 03, 2016

Today, data is being recognized and appreciated as an asset, and even, some have suggested, a kind of currency. But beyond the obvious businesses built on data - such as Airbnb's rental business, Uber's car service app, and Alibaba's online marketplace - every business today is striving to become a data-driven organization, with turn-on-a-dime agility and rapid insights into customer behaviors and desires.

Posted August 03, 2016

NTT Security Corporation is bringing together its advanced analytics technologies to launch a specialized security company. NTT Security delivers Managed Security Services (MSS) and specialized security professional services that support the Full Security Life Cycle. These services will be taken to market globally and client engagement will be managed by NTT operating companies Dimension Data, NTT Communications and NTT Data.

Posted August 01, 2016

FogHorn Systems, a developer of "edge intelligence" software for industrial and commercial Internet of Things (IoT) applications, has secured $12 million in Series A funding to further innovate its offerings. The funding round was led by March Capital and GE Ventures, with additional funds provided by Robert Bosch Venture Capital GmbH, Yokogawa Electric Corporation, and Darling Ventures.

Posted July 27, 2016

Accellion, Inc., a provider of private cloud solutions for secure file sharing and collaboration, has added new security features in the kiteworks content platform to help enterprises keep their critical enterprise data secure while extending compliance with rigorous industry requirements.

Posted July 27, 2016

SAP SE is making big changes and introducing product innovations in its enterprise information management (EIM) portfolio to offer improved support for cloud and Big Data environments, enhancements for more self-service capabilities, and comprehensive support for governing enterprise information.

Posted July 27, 2016

EMC has announced that, based on a preliminary vote tally from the Special Meeting of Shareholders held on July 19, EMC shareholders approved the merger agreement among Denali Holding Inc., Dell Inc., Universal Acquisition Co., and EMC, and approved the other two proposals described in EMC's proxy statement relating to the meeting.

Posted July 27, 2016

IDERA has released SQL Query Store Optimizer, a new tool in its portfolio of database monitoring tools to help database administrators (DBAs) manage and troubleshoot SQL Query Stores in SQL Server 2016.

Posted July 20, 2016

Monte Zweben, CEO and co-founder of the company that was founded in 2012, talks with Big Data Quarterly about why Splice Machine has rolled out an open source Community Edition - and why it is doing so now

Posted July 18, 2016

Actiance, a provider of communications compliance, archiving, and analytics solutions, announced that Vantage has been certified for Skype for Business Server 2015, giving joint customers assurance that they can meet communications compliance and governance requirements.

Posted July 14, 2016

Vormetric, a provider of data security solutions spanning physical, virtual and cloud environments, is partnering with Salesforce on a pilot program to offer Key Management-as-a-Service (KMaaS) for Salesforce Shield Platform Encryption.

Posted July 14, 2016

TIBCO's social enterprise collaboration platform, tibbr 7, has achieved certification by the Federal Risk and Authorization Management Program (FedRAMP). According to TIBCO, the certification offers assurance to users that in an increasingly connected world, they can feel confident that their projects, ideas, and communications in general are private and safe.

Posted July 12, 2016

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90

Sponsors