Top Ten Database Security Threats: How to Mitigate the Most Significant Database Vulnerabilities
sponsored by Imperva.
WHITE PAPER:
This document is intended to help organizations deal with the most critical of those threats by providing a list of the top ten database vulnerabilities as identified by Imperva's Application Defense Center.
Posted: 29 Nov 2013 | Published: 08 Oct 2008
|
|
|
Using Encrypting File System to Protect Microsoft Dynamics CRM Data on a V3c Client Running Windows XP Professional
sponsored by Microsoft
WHITE PAPER:
This white paper explains how to use Encrypting File System (EFS), a feature that is provided by default in the Windows® operating system, to protect data in Microsoft Dynamics CRM clients for Outlook Compatibility Update running on Windows XP Professional Service Pack 2 (SP2).
Posted: 25 Aug 2009 | Published: 28 Jun 2007
|
|
|
BMC Software Hybrid Copy Techniques
sponsored by BMC Software, Inc.
WHITE PAPER:
Because organizations are demanding 24x7 availability from their IMS, DB2®, and VSAM applications, it is imperative that those applications do not experience outages. Read this white paper to find out how BMC's Hybrid Copy techniques help for faster system recovery in the event of a local outage.
Posted: 17 Apr 2009 | Published: 17 Apr 2009
|
|
|
Faster Application Development via Improved Database Change Management
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER:
Embarcadero® Change Manager puts the power of change tracking, schema comparison, software-generated synchronization scripts, and flexible reporting into the hands of the development team.
Posted: 01 Apr 2009 | Published: 27 Mar 2009
|
|
|
Ensuring Personally Identifiable Information (PII) Security Within U.S. Government Agencies
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER:
Safeguarding personally identifiable information (PII) and remaining in compliance with government regulations is a difficult challenge made easier with database tools from Embarcadero Technologies.
Posted: 27 Mar 2009 | Published: 27 Mar 2009
|
|
|
Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER:
According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER:
Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009
|
|
|
Expert eBook: Encryption: Properly Securing Your Valuable Data
sponsored by Information Security Magazine
WHITE PAPER:
Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology.
Posted: 28 Oct 2008 | Published: 28 Oct 2008
|
|
|
Simplifying Citrix XenApp -- Get the Insight you Need to Optimize Your Citrix Investment
sponsored by XTS
WHITE PAPER:
This white paper provides an analytical perspective on how to best manage your Citrix environment.
Posted: 10 Apr 2008 | Published: 01 Apr 2008
|
|
|
Acquire a global view of your organization's security state: the importance of security assessments
sponsored by IBM Software Group
WHITE PAPER:
Security assessments from IBM can help find "point-in-time" or ongoing security gaps in data confidentiality, integrity and accessibility as well as prior breaches and budgetary justification for making necessary security investments.
Posted: 09 Jan 2008 | Published: 09 Jan 2008
|
|
|
The importance of security assessments
sponsored by IBM
WHITE PAPER:
This white paper helps you understand the variety of security assessment options that are available and provides the criteria for selecting a vendor that can help you meet your company?s security requirements.
Posted: 06 Dec 2007 | Published: 01 Apr 2007
|
|
|
An Objective Approach to Security
sponsored by Bytware, Inc.
WHITE PAPER:
i5/OS may be famous for security, but it doesn't go far enough in protecting your data. Supplementing with third-party Transaction security is popular, but cumbersome. Find out why Object-based security provides a better way in this...
Posted: 10 Sep 2007 | Published: 01 May 2007
|
|
|
Tripwire Enterprise Datasheet
sponsored by Tripwire, Inc.
WHITE PAPER:
Unauthorized change is the most significant threat to an IT organization's ability to improve availability, security and compliance. That's why thousands of organizations worldwide use Tripwire® Enterprise as their configuration audit and control sol
Posted: 01 Mar 2007 | Published: 01 Feb 2007
|
|