5 MINUTE BRIEFING INFORMATION MANAGEMENT

Subscribe to the 5 Minute Briefing Information Management email newsletter




Five Minute Briefing - Information Management
May 31, 2011

Five Minute Briefing - Information Management: May 31, 2011. A concise weekly report with key product news, market research and insight for data management professionals and IT executives.


News Flashes

BeyondTrust, a provider of authorization management solutions, announced the release of PowerBroker Database Monitor & Audit, designed to provide IT security departments monitoring and visibility of privilege user database administration, activities and security. The new release incorporates technology as a result of BeyondTrust's recent acquisition of Lumigent Technologies, which specialized in database activity monitoring. The new toolset is intended to extend visibility beyond the scope of basic database security, providing analysis on how database changes directly impact business operations, Jim Zierick, executive vice president of product operations at BeyondTrust, tells 5 Minute Briefing.

Composite Software has announced the certification of its flagship data virtualization product, the Composite Information Server, with MicroStrategy 9. MicroStrategy's business intelligence software enables companies to analyze the volumes of data stored across their enterprise to make better business decisions. In addition to the certification, Composite Software has also signed a global marketing alliance agreement with MicroStrategy, which includes a range of joint marketing programs. "In a time of extreme business change, business users need agile approaches to information," says Robert Eve, executive vice president of marketing of Composite Software.

Industry Leader Q&A with Oracle's Tim Shetler - The Oracle Exadata Database Machine Explained

Vormetric, Inc., a provider of enterprise systems encryption and key management for physical, virtual and cloud environments, has joined the Cloud Security Alliance (CSA). The non-profit organization promotes the use of best practices for security within cloud computing, and offers education on the uses of cloud computing to help secure all other forms of computing.


Think About It

The Importance of Database Design Reviews

Sponsors