Database Security Articles
If you are a working DBA, the actual work you do these days is probably significantly different than it was when you first began work as a DBA. So is the term DBA really accurate any longer? Or has the job grown into something more?
Posted January 07, 2016
Plan your days at COLLABORATE 16 by previewing the educational sessions that cover themes and product lines that matter most to you with the newly-launched COLLABORATE 16 Session Scheduler. Or follow one of four daily dedicated customer journeys: Big Data, Cloud, Mobility and Security.
Posted January 06, 2016
In 2015, big data, mobility, IoT, expanding requirements for security and real-time analytics and the introduction of the Cognitive Era continued to place greater pressure on IT organizations. Linux and open source technologies are at the center of many of the most innovative software and hardware solutions that are addressing emerging enterprise requirements. Here's a look back at some of the most significant announcements in Linux and open source technology of 2015.
Posted December 16, 2015
Looking ahead to 2016 David Jonker, senior director of big data at SAP, offered six key business and technology trends that will take the market by storm, including a continued interest in in-memory processing, enablement of real-time data and analytics, and an increased focus on advanced analytics and machine learning.
Posted December 16, 2015
What's ahead for 2016 in terms of cloud, IoT, big data, analytics, and open source technologies? IT executives gaze into their crystal balls, and weigh in on the upcoming challenges and opportunities ahead in the next year - and beyond.
Posted December 16, 2015
Dataguise, provider of data-centric security solutions for detecting and protecting confidential information, is now securing relational databases such as Oracle and SQL Server, as well as Teradata data warehouses, deployed on the Microsoft Azure cloud infrastructure. Now Azure users can utilize big data and cloud technologies for improved business intelligence and performance.
Posted December 16, 2015
Bomgar, a provider of secure access solutions, has acquired password management technology from Pitbull Software, expanding Bomgar's portfolio of Privileged Access Management solutions. The acquired Pitbull KeyHolder solution is used to secure, manage, and administer passwords for privileged users. Bomgar's solutions allow organizations to provide administrators, vendors, and business users with the access capabilities they need to be more productive, while protecting high value infrastructure, assets, and applications from cyberattacks
Posted December 10, 2015
Tableau Software is releasing a comprehensive update to its flagship platform and introducing a new iPhone app. "Working with data on a small device presents really unique challenges so we thought very deeply about the experience of what you might want to do there and we're very excited with the iPhone app that's coming out," said Ellie Fields, vice president of product marketing at Tableau. Customers in the past could use their iPhones with their Tableau dashboards and visualizations, but the new Tableau Mobile app now makes it easier for people to interact with and access data on the go.
Posted December 08, 2015
In addition to StretchDB and AlwaysEncrypted, there are two more exciting features in the works for SQL Server 2016: dynamic data masking and row-level security. In the case of these two features, they'll be released first to the cloud platform (Azure SQL Database) and, later, to the on-premises version of SQL Server.
Posted December 08, 2015
Vanguard Integrity Professionals announced the launch and availability of Version 2 Release 2 security and compliance software for the IBM z/OS Security Server. This version of Vanguard's Security and Compliance software improves on nearly every aspect of its predecessor for Enterprise, z/OS Security Server and cloud deployments with new features and functionality.
Posted December 07, 2015
As a DBA, establishing a reasonable backup schedule for your databases can be a challenging project. It requires you to balance two competing demands: the need to take image copy backups frequently enough to assure reasonable recovery time, and the need to not interrupt daily business. The DBA must be capable of balancing these two objectives based on usage criteria and the capabilities of the DBMS.
Posted December 02, 2015
Vormetric is joining the Hortonworks Technology partner program, promising users a comprehensive enterprise solution that is made for big data environments and optimizes performance. The advantage for the customers is that they will be able to use the Vormetric solution across their entire infrastructure, said Ashvin Kamaraju, vice president of product development and partner management at Vormetric. "What our customers like is for us to be the provider of all the data security solutions across their entire enterprise."
Posted December 01, 2015
CA Technologies announced new product releases in its identity-centric security portfolio that protect and enable the hybrid enterprise, spanning cloud, distributed, mobile, and mainframe. A new release of CA Privileged Access Manager helps control privileged user access to dynamic VMware NSX environments. Updates to CA Identity Suite help simplify identity governance for all users, and a new product, CA Data Content Discovery, helps address compliance demands by discovering and classifying mainframe data.
Posted November 24, 2015
With heightened SEC, FINRA, IIROC and FCA regulatory scrutiny within financial services firms, Actiance is releasing expanded supervisory capabilities for Alcatraz, its cloud-based archive platform. "Our company is really focused around regulatory compliance and helping organizations to get control of various channels that are being used for communications," said Robert Cruz, senior director of information governance at Actiance.
Posted November 23, 2015
Cirba Inc., a provider of software-defined infrastructure control solutions, released integration to EMC ViPR SRM, enabling organizations to optimize use of storage resources through smarter workload placements and visibility into storage health. The new integration adds to Cirba's existing support for placing workloads and optimizing infrastructure considering datastore requirements and physical storage resources managed by NetApp OnCommand Insight (OCI), announced in August 2015.
Posted November 23, 2015
Hadoop distribution provider Cloudera has introduced Cloudera Enterprise 5.5, including Cloudera Navigator Optimizer, a new product targeted at helping organizations improve big data workload performance and efficiency. Cloudera Navigator Optimizer, now in beta, is expected to be generally available in 2016. The new release of Cloudera Enterprise has three main areas of focus, according to Anupam Singh, head of data management at Cloudera.
Posted November 19, 2015
SAP SE is offering the option to run the SAP Business One Cloud solution powered by the SAP HANA platform at data centers run by SAP, providing an end-to-end SAP-branded experience. Partners will now have three deployment options for the subscription-based offering of SAP Business One Cloud, including running in a partner's private hosted cloud, in a cloud infrastructure hosted by a third party, or in data centers run by SAP. Taking advantage of this offer, says SAP, will allow partners to help SME (small and midsize enterprise) customers gain the benefit of streamlined operations. The offering will be available first in North America, with expansion planned to Europe and Asia in 2016.
Posted November 18, 2015
SAP SE is now enabling customers to deploy and consume SAP Fiori apps across both on premise and cloud architectures to deliver superior mobile app performance. By introducing these new options, customers will have the ability to choose the deployment model which best suits their business environment and ensures a secure and rapid deployment option for SAP Fiori apps.
Posted November 18, 2015
CloudBerry Lab, a provider of backup and management solutions for cloud storage services, has introduced CloudBerry Backup for Oracle Database, which enables backups to be easily stored in the Oracle Database Backup Cloud with a data restore capability. "We've heard a lot from customers about the need for a purpose-built solution to back up Oracle databases directly to an Oracle Database Backup Cloud," said CloudBerry Lab CTO Alexey Serkov.
Posted November 18, 2015
EMC has unveiled an assortment of products and solutions designed to connect primary storage and data protection systems to private and public clouds. "Cloud has become a strategic imperative for our customers," said Christopher Ratcliffe, SVP, EMC Core Technologies. And, one of the things that EMC often hears from customers, he said, is that even if they don't want to use it today, they want to know that they have the option to do so in the future if they choose.
Posted November 17, 2015
Not too long ago, large volumes of information were available only to the select few organizations able to afford the expensive IT infrastructure to collect, store, manage, and analyze it—the big-budget companies with seemingly bottomless pockets, or the professional research services that built empires on collecting and interpreting data. But now, through the realized effects of Moore's law, along with the consumerization of BI tools, this data is increasingly available to everyone—and without having to dig deep into budgets or employ robust IT departments.
Posted November 13, 2015
A typical organization loses about 5% of its revenues to fraud each year. The total cost of non-health insurance fraud in the U.S. is estimated to be more than $40 billion per year. These numbers stress the importance and need of finding sophisticated tools to both detect and prevent fraud. Big data and analytics offer a new valuable toolkit in the fight against fraud.
Posted November 13, 2015
At Oracle OpenWorld each year, there are significant announcements about Oracle products and insight provided on key areas of focus for the future. Melissa English, president of the Oracle Applications Users Group (OAUG), recently reflected on some of the key developments at the 2015 OpenWorld conference and their relevance for OAUG members. In particular, said English, "Oracle's announcements about continuing to support on-premises apps for the next 10 years and beyond are significant."
Posted November 12, 2015
Credit card fraud is on the increase and identity theft is growing. In a new white paper about fraud in the modern world, Mike Ferguson of Intelligent Business Strategies writes about the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can help reduce risk exposure and loss from fraud.
Posted November 11, 2015
Dell expanded its PowerEdge 13th generation servers with the introduction of four new entry-level servers that provide greater performance, flexibility and efficiency for small and midsize businesses (SMBs). The latest Dell PowerEdge servers are designed to address the top IT pain points of SMBs which Dell says are performance, hardware capacity, and IT complexity. The new Dell PowerEdge servers include the PowerEdge R330 and R230 rack servers and the PowerEdge T330 and T130 tower servers.
Posted November 11, 2015
Informatica has announced a new big data management solution called Informatica Big Data Management that brings together big data Integration, big data quality and governance, and big data security in a single integrated solution. According to the vendor, while more than 67% of enterprises see the big opportunity in big data, the majority of big data projects fail. The new Informatica solution aims to help organizations more effectively overcome the data management challenges that are often at the root of big data project failures. In addition, Informatica Big Data Management is also designed to reduce the need for hand-coding and big data skill sets that are expensive and hard to come by.
Posted November 10, 2015
Splunk, which provides operational intelligence, is making major changes to its key platforms, delivering out-of-the-box capabilities driven by machine learning and advanced analytics to help detect cyberattacks and insider threats. "We've significantly improved the ability for our customers to both detect and respond to breaches," said Robert Ma, Splunk senior director of security markets.
Posted November 10, 2015
The DBA's role is becoming increasingly complex and now often involves managing data both on premise and in the cloud, and in a variety of database management systems including not only traditional relational systems such as Oracle, SQL Server, MySQL and others, but also new open source and NoSQL technologies, according to Gerardo Dada, vice president of product marketing, at SolarWinds.
Posted November 09, 2015
Progress announced the latest release of its application development platform, with new features targeted at enterprise mobile capabilities. The Telerik Platform for OpenEdge applications enables users to extend OpenEdge applications with advanced mobile app development capabilities, test and deployment features, as well as JavaScript Data Objects (JSDO) for integration of mobile apps with existing Progress OpenEdge business logic.
Posted November 09, 2015
Oracle has announced that the new Oracle Exadata Database Machine X5-8, the latest in the X5 family of engineered systems which integrate hardware and software, is now available. The new Exadata X5-8 offers up to 576 CPU cores, more than 1.3 petabytes of disk storage or 180 terabytes of PCIe flash, and up to 24 terabytes of memory. The Oracle Exadata X5-8 is the new companion model to Oracle Exadata X5-2 and incorporates the same storage and networking capabilities of Oracle Exadata X5-2, which was announced in January 2015.
Posted November 04, 2015
Until the safe harbor agreement between U.S. and Europe was ruled invalid recently in a European court, it was understood that for any European company the U.S. was safe, and the data security in the U.S. was acceptable. But the recent ruling by the European Court of Justice says that is "actually not true," said Andreas Gauger, chief marketing officer and cofounder of Profitbricks, a cloud computing IaaS company. Now, a new agreement will have to be forged between the different entities. "Now that band-aid has been ripped off and the wound is open. Now they have to sit down and finally agree on something."
Posted October 28, 2015
SearchYourCloud (SYC), a provider of a patented federated search and security application, is entering an OEM agreement with SAP, allowing SYC to integrate and offer the capabilities of SAP HANA Cloud Platform with the SearchYourCloud Server.
Posted October 28, 2015
Enterprise data security provider Protegrity has announced that it has earned Oracle Exadata Optimized status through the Oracle PartnerNetwork (OPN), demonstrating that Protegrity Database Protector for Oracle Exadata is recognized as having been tested and tuned on Oracle Exadata Database Machine to deliver speed, scalability and reliability to customers.
Posted October 21, 2015
Thales, a French multi-national company, has signed a definitive agreement to acquire Vormetric, a provider of data protection solutions in physical, virtual and cloud infrastructures, for $400 million. The transaction is expected to close in the first quarter of 2016.
Posted October 20, 2015
As more and more applications, websites, and basic smart home devices ask users permissions for their data, people are starting to wonder where their information is going. The question of privacy, the Internet of Things, and what companies do with an individual's personal information was the subject of two different sessions at Strata + Hadoop World in NYC.
Posted October 13, 2015
In what is being hailed as the biggest tech merger ever, Dell Inc. and EMC Corp. today formally announced they have signed a definitive agreement under which Dell will acquire EMC. The total transaction is valued at $67 billion. The deal is expected to close in the second or third quarter of Dell's fiscal year which ends February 3, 2017 (within the months of May to October 2016). The industry is going through a "tremendous transformation," with the old style of IT being "pretty quickly disrupted" yet this rapid change is also presenting "incredibly rich" opportunities, said Joe Tucci, chairman and chief executive officer of EMC, during a conference call with media and industry analysts.
Posted October 12, 2015
IBM has entered into a definitive agreement to acquire Cleversafe, Inc., a developer and manufacturer of object-based storage software and appliances. The acquisition will enhance IBM's positions in storage and hybrid cloud.
Posted October 12, 2015
Prior to SQL Server 2016, currently in CTP, your main method for encrypting a SQL Server application was to use a feature called Transparent Data Encryption. TDE provides strong encryption, but with some shortcomings. First, you have to encrypt an entire database. No granularity is offered at a lower level, such as encrypting specific tables or certain data within a table. Second, TDE encrypts only data at rest, in files. Data in memory or in-flight between the application and server are unencrypted. Enter Always Encrypted.
Posted October 07, 2015
DataTorrent is teaming up with two big companies that will allow it to provide access to better security and make adoption of Hadoop easier. DataTorrent is partnering with Cisco to allow integration between its DataTorrent RTS platform and Cisco's Application Centric Infrastructure (ACI) through the Application Policy Infrastructure Controller (APIC), offering a unified management architecture for enterprises to manage their big data applications along with network and security. DataTorrent is also integrating its platform with Microsoft Azure HDInsight via the Microsoft Azure Marketplace.
Posted September 29, 2015
IBM introduced a new cloud security technology that helps safeguard the increasing use of "bring-your-own" cloud-based apps at work. Cloud Security Enforcer combines cloud identity management (Identity-as-a-Service) with the ability for companies to discover outside apps being accessed by employees, including those they are using on their mobile devices. These combined capabilities enable companies to equip their workforce with a secure way to access and use the apps that they want.
Posted September 28, 2015