Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

NOAD, a provider of enterprise platform management for SAP BusinessObjects business intelligence (BI) solutions, has announced that following a rigorous testing process the software solution NOAD EQM4, version 3.3, has achieved certified integration with the SAP BusinessObjects BI platform, version 4.1. NOAD EQM4 3.3 provides developers working with the SAP BusinessObjects BI platform a reliable and stable solution to develop independently in a controlled environment.

Posted March 25, 2015

Enterprise data security has become not only a major focus of attention in the tech industry, but has also become a concern for the mainstream public. With the steady stream of data breaches at companies such as the retail giant Target, the tech and media leader Sony, and most recently medical insurer Anthem, Inc., many organizations are now beginning to appreciate the importance of data security and just how much a financial toll a hack can cause. According to many executives, a turning point has been reached.

Posted March 25, 2015

Axxana's Phoenix System for Oracle version 1.2 has achieved Oracle Exadata Ready, Oracle Big Data Appliance Ready, and Oracle Linux Ready status through Oracle Partner Network (OPN). Axxana's Phoenix System for Oracle provides a disaster recovery solution for Oracle environments.

Posted March 18, 2015

Oracle announced that fiscal 2015 Q3 total revenues were unchanged at $9.3 billion. Without the currency headwinds caused by the strengthening of the U.S. dollar, the company said total revenues would have been up 6% as measured in constant currency. "Oracle now has a cloud revenue run rate of well over $2 billion a year. We are already the world's second largest SaaS and PaaS company," said Oracle chairman and CTO Larry Ellison during a conference call discussing Oracle's third quarter financial results.

Posted March 18, 2015

The Independent Oracle Users Groups (IOUG) has been serving Oracle technologists and professionals for more than 20 years, and we are very pleased with how much the community has grown as well as how much IOUG has accomplished. Having said this, we will not rest on our laurels. There are many great opportunities that lie ahead of us. While we set the bar pretty high in 2014 with the establishment of the content-rich blog #IOUGenius, an increased number of Master Classes offered across the nation and a truly inspirational COLLABORATE 14, you'll be very pleased with what IOUG has in store for 2015.

Posted March 17, 2015

COLLABORATE 15 - Technology and Applications Forum for the Oracle Community (hashtag #C15LV) is back in Las Vegas April 12-16, 2015 at the Mandalay Bay Resort and Casino, offering a wide variety of education and valuable opportunities for collaboration among peers. The more than 1250 planned education sessions in 17 tracks were sourced through the user communities of IOUG, OAUG and Quest and selected through a competitive process. The result is an agenda packed with relevant insights for functional as well as technical users, beginner to advanced.

Posted March 17, 2015

The 55,000+ member Quest International Users Group supports JD Edwards, PeopleSoft, Fusion, and many other Oracle edge application customers and offers tons of resources to make your job easier. Here are just a few reasons you should go Quest green at COLLABORATE 15.

Posted March 17, 2015

Violin Memory, Inc., which offers flash storage platform solutions for primary storage and active workloads, is launching a Global Partner Program and a new simplified online portal. The expanded Violin Global Partner Program will establish incentives and business models that will help organizations to achieve success through simplified partner programs, more predictable performance rewards, and tools to deliver consistency in partner engagement.

Posted March 17, 2015

In a recent blog from SHARE, Pam Taylor, senior product manager at IBM, shared her thoughts about the importance of establishing a framework for addressing governance, risk and compliance.

Posted March 16, 2015

Dell has announced a new endpoint security suite to help businesses protect employee devices from malware attacks, secure data and meet compliance requirements. The Dell Data Protection | Endpoint Security Suite (DDP | ESS) provides threat protection, authentication and data encryption with a single management console in an integrated, easy-to-deploy solution. It is available as a stand-alone software offering for both Dell and non-Dell hardware, and as an integrated offering with Dell commercial laptops, desktops and tablets, and is targeted at the mid-market, which Brett Hansen, executive director of end user computing software and mobility at Dell, defined as companies with 100 to 5,000 employees.

Posted March 10, 2015

Software-defined technologies and software-defined data centers (SDDCs) are generating significant traction in the IT community, and many organizations recognize the potential operational benefits to be had by software-defining their own IT infrastructure. What most do not realize, however, is that SDDC is not achieved by simply bolting together virtualization, software-defined networking (SDN), and software-defined storage (SDS).

Posted March 04, 2015

Sqrrl, a big data analytics company that develops software to uncover hidden patterns, trends, and links in data, has announced the launch of Sqrrl Enterprise 2.0 coinciding with receiving $7 million in new funding. Sqrrl was developed by former employees of the NSA. "We don't shy away from our NSA heritage, we see it as a strength," stated Ely Kahn, co-founder and director of business development for Sqrrl.

Posted February 24, 2015

Seagate has begun shipping a new backup device designed as an all-in-one appliance engineered for large enterprise companies and service providers seeking a data protection solution for multiple operating systems and applications, including Oracle databases. The BTA is based on Seagate's hybrid cloud model, which supports environments where both private (on-premises) and public (off-premise) storage is utilized. It enables backup to a private, public or partner cloud and features 65TB of useable storage capacity

Posted February 18, 2015

BMC Software announced plans to acquire assets of CDB Software, Inc., a mainframe data management company that has developed utilities for managing IBM DB2 databases with a minimum of outages. CDB's technology includes software utilities for DB2 administration, maintenance, application tuning, and backup/recovery.

Posted February 17, 2015

StackIQ Inc., a provider of server automation solutions, has released a new version of software offering key new data center automation capabilities. "Boss 5 extends our full stack server automation capabilities to Docker containers as well as enhancing all of our Hadoop and OpenStack solutions," says Tim McIntire, CEO and co-founder of StackIQ Inc.

Posted February 17, 2015

The OpenDaylight Project, a community-led and industry-supported open source platform to advance Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), announced that CA Technologies, IIX, Megaport, and Spirent have joined the project to support the development of one common and open SDN and NFV platform that can be leveraged by all.

Posted February 17, 2015

Most organizations, whether public or private sector, are facing exponential increases in the amount of information and data that they need to continuously track, manage, and protect to ensure organizational success, continuity of operations and long-term viability. While many attackers still focus on denial of service attacks, cybercriminals often target the database because that is where sensitive information resides that would interest someone looking to steal credit card information or personal identities

Posted February 11, 2015

Hitachi Data Systems Corporation (HDS), a subsidiary of Hitachi, Ltd., has announced plans to acquire Pentaho Corporation, a big data integration and business analytics company with an open source-based platform for diverse big data deployments. According to Hitachi, the acquisition helps to fulfill its strategy of delivering business innovations that integrate machine data, information technology, and analytics to distill value from big data and the Internet of Things. The acquisition of Pentaho is expected to be complete by June 2015.

Posted February 10, 2015

During a live event, Larry Ellison, Oracle's executive chairman of the board and CTO, outlined a new strategy for reducing customer costs and increasing value with the company's next generation of engineered systems. In the presentation today, Ellison emphasized two key points.

Posted February 04, 2015

Quantum Corp., a provider of storage solutions, announced three new solutions that integrate the cloud into multi-tier, hybrid storage architectures for demanding data workloads. "Effective data management is about putting data in the right place at the right time with the right technology, guided by a customer's workflow or application," said Geoff Stedman, senior vice president of StorNext Solutions for Quantum.

Posted February 02, 2015

Cisco Systems, Inc. is launching a new software licensing strategy aimed at consolidating enterprise cloud initiatives into a single solution set. The new licensing strategy, Cisco ONE Enterprise Cloud Suite, is an engineered software solution intended to deliver a hybrid-ready private cloud software solution.

Posted February 02, 2015

Rackspace has announced new support for Microsoft SQL Server 2014 In-Memory Online Transaction Processing (OLTP) and AlwaysOn Availability. Rackspace now powers more than 10,000 compute instances running Microsoft SQL Server on its private and public clouds. By combining In-Memory OLTP with Managed High Availability, Rackspace says it can help customers speed up OLTP workloads to up to 30x while enabling greater uptime.

Posted January 28, 2015

There's good news and bad news on the cybersecurity front, an IBM study finds. Over the past 2 years, there has been a 50% decline in the number of cyberattacks against U.S. retailers. However, the number of records stolen from them remains at near record highs. IBM security researchers report that in 2014, cyber attackers still managed to steal more than 61 million records from retailers despite the decline in attacks, demonstrating cyber criminals' increasing sophistication and efficiency. Ironically, while Black Friday and Cyber Monday were identified as the two biggest shopping days of the year by IBM's Digital Analytics Benchmark, cyber attackers reduced their activity across all industries on Black Friday and Cyber Monday, rather than taking action.

Posted January 28, 2015

Registration is now open for Data Summit 2015, providing the opportunity to connect with the best minds in the industry, learn what works, and chart your course forward in an increasingly data-driven world. The event is designed to offer a comprehensive educational experience designed to guide attendees through the key issues in data management and analysis today.

Posted January 21, 2015

Continuity Software has achieved Gold Partner status in the Oracle PartnerNetwork (OPN). "As a Gold level member of OPN, Continuity Software is able to help our customers benefit from solutions that are Oracle-ready and optimized," said Doron Pinhas, CTO Continuity Software.

Posted January 21, 2015

CloudLink Technologies, a provider of cloud security and data encryption management solutions has added CloudLink SecureVM support for Microsoft Azure Key Vault, a cloud-hosted HSM-backed service for managing cryptographic keys and other secrets used in your cloud applications. According to the companies, with this solution, the cloud provider is responsible for key generation and storage. The customer, as the data owner, controls the security policy that regulates encryption key access and use.

Posted January 20, 2015

The manageability track at COLLABORATE 15 - IOUG Forum is designed to provide DBAs of every experience level and industry with the knowledge set to streamline IT management processes at their organization and accelerate their transformation to cloud.

Posted January 14, 2015

Oracle has introduced its latest-generation NAS storage system, the Oracle ZFS Storage ZS4-4. A plug-in for Oracle Enterprise Manager enables monitoring and provisioning at the share, LUN or project level for all Oracle ZFS Storage Appliance models for end-to-end management visibility across the enterprise. "We have plugged in our analytics into Oracle Enterprise Manager to allow you to have that comprehensive view," said Oracle executive vice president John Fowler during a recent webcast.

Posted January 14, 2015

For the 22nd consecutive year, IBM topped the annual list of U.S. patent recipients. The company just announced that it received a record 7,534 patents in 2014, and that on average, IBM inventors earned more than 20 patents a day. After IBM, the next top patent earner in 2014 was Samsung with 4,952. During IBM's 22 years at the top of the patent list, IBM inventors have received more than 81,500 U.S. patents.

Posted January 12, 2015

HP, a member of the Oracle Partner Network (OPN), has introduced HP Digital Customer Experience services for Oracle to help companies plan, build and manage customer experience business solutions for more personalized, consistent interaction with their customers across store, web, mobile and social channels. "Consumers increasingly associate their digital experience with a company's overall brand and reputation, making it even more important to exceed their service expectations and rise above the competition," observed Robert Hildenbrand, vice president, worldwide Oracle Applications Services, HP Enterprise Services.

Posted January 07, 2015

As analytics continues to play a larger role in the enterprise, the need to leverage and protect the data looms larger. According to the IDC, the big data and analytics market will reach $125 billion worldwide in 2015. Here are 10 predictions from industry experts about the data and analytics in 2015.

Posted December 19, 2014

Big data continues to have an impact on business, government, and society at large. Here's a look back at 10 noteworthy blog posts from 2014. These blog posts explore the benefits and downsides of advancements in big data technologies.

Posted December 15, 2014

Luminex Software, Inc. has introduced a new line of mainframe virtual tape products, which it calls virtual tape vaults. Luminex's new MVT Vault is designed to store second or third copies of virtual tape data out-of-region for data protection.

Posted December 08, 2014

Delayed durability offers something that many SQL Server professionals have wanted for years—the ability to disable transaction logging. Why turn off the transaction log? You can accelerate performance in a lot of situations where you do NOT need transactional consistency.

Posted December 03, 2014

Lock contention issues can be frustrating problems to investigate and debug. Before blaming the database system (as is the usual response), there are a few questions to consider that can help identify the cause of the locking problems.

Posted December 03, 2014

Cloud solutions are rapidly expanding, and consumers and businesses are being offered these solutions at almost every turn. This reality is bringing to light one of the major concerns about cloud: IT security/privacy. It seems we are hearing about breaches into server systems, leaks in social media networks, industrial espionage, and other security incidents almost on a daily basis. So the cloud can't be secure, right?

Posted December 03, 2014

A set of consulting and managed security service solutions from Big Iron Solutions is intended to enable organizations to rapidly identify, secure and monitor credit card data in order to meet PCI-DSS requirements. To date, many mainframe computer systems have not been meeting these requirements, according the company which states that this failure is due mainly to the fact that adequate technology, processes and effective standardized security practices have not existed on the mainframe.

Posted November 24, 2014

Bradmark Technologies, a provider of database management solutions and a reseller of SAP database and solutions, has expanded its North American reseller agreement with SAP. Bradmark has now also become an SAP channel partner authorized to resell SAP database products in the United Kingdom. Under this agreement, Bradmark will offer SAP Adaptive Server Enterprise (SAP ASE), SAP IQ database software, SAP Replication Server, and the SAP HANA platform to its existing customers and prospects through its direct sales force and marketing campaigns in the North America and the UK.

Posted November 20, 2014

SAP partner Wharfedale Technologies Inc. (WFT), a professional IT services consulting firm specializing in cloud system infrastructure integration and operational management services for enterprise customers, has announced new implementation services for high-availability and disaster-recovery capabilities for SAP HANA tailored data center integration.

Posted November 20, 2014

The increasing pressure of compliance regulations and security policies makes the deployment of high-level database protection a must-have for any organization. For those looking for ways to advance database security, here are 5 SQL Server best practices to maintain database security and streamline compliance.

Posted November 12, 2014

IBM has built an "intelligent security portfolio" intended to protect data and applications in the cloud. Designed to be used with different users, whether it be a developer or line-of-business executive, the portfolio also includes analytics and security intelligence for public cloud services such as IBM's SoftLayer. In addition, the offering features IBM's Managed Security Services platform, which can help secure the cloud for IBM clients as well as clients of companies like Amazon Web Services and Salesforce.com.

Posted November 11, 2014

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90

Sponsors