Oracle Security Reports

Introducing the Next Generation of SPARC Servers E-Book
sponsored by Oracle Corporation
EBOOK: Discover the benefits of Oracle's new SPARC T4 servers and how they deliver world record performance for a wide range of enterprise applications, and offer enhanced reliability and security, improved virtualization tools, and reduced costs. View this e-book packed with valuable information, customer success stories, and a 3D demo.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

Oracle Corporation

Data Masking Best Practices for Copying Sensitive Data Into Non-Production Environments
sponsored by Oracle Corporation
WHITE PAPER: Download this paper to learn data masking best practices and enable your organization to safely use production data for development, testing, and sharing with out-source or off-shore partners, without risking a sensitive data breach.
Posted: 05 Dec 2011 | Published: 05 Dec 2011

Oracle Corporation

Navigating VMware and Cloud Backups
sponsored by Clumio
EGUIDE: VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.
Posted: 31 Jan 2020 | Published: 29 Jan 2020

Clumio

GDPR: The Race is on for Compliance
sponsored by Dell SecureWorks
EGUIDE: Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.
Posted: 19 Jun 2017 | Published: 14 Jun 2017

Dell SecureWorks

Information Security Magazine – July/August 2014
sponsored by TechTarget Security
EZINE: Big data and security with non-relational data management platforms are too often an afterthought. Here's what you need to get started with NoSQL security.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

TechTarget Security

Implementing Database Security and Auditing - Authentication and Password Security
sponsored by IBM
EBOOK: In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.
Posted: 17 May 2011 | Published: 17 May 2011

IBM

Controlling Risk Through Software Code Governance
sponsored by Coverity by Synopsys
WHITE PAPER: Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain.
Posted: 27 Jul 2011 | Published: 26 Jul 2011

Coverity by Synopsys

Presentation Transcript: Content Monitoring in the Enterprise
sponsored by Lumension
PRESENTATION TRANSCRIPT: This presentation transcript will help readers learn key strategies to meet both business security needs and user demands. Discover more about topics such as setting content monitoring goals, data loss prevention technologies, database activity monitoring, and more.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

Lumension

Secure File Transfer Tech Guide
sponsored by TechTarget Security
EGUIDE: Read this white paper and learn how to ensure that unsecured file transfers aren't putting your organization at risk.
Posted: 06 Feb 2013 | Published: 06 Feb 2013

TechTarget Security

SearchSecurity.com E-Guide: 5 Simple Steps to Secure Database Development
sponsored by IBM
EGUIDE: Databases and the information they hold are always an attractive target for hackers looking to exploit weaknesses in database applications. This expert e-guide explains the 5 most common database-related vulnerabilities and offers technical advice on how to avoid them.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM