Database Protection Reports

How To Build A Micro-segmentation Strategy
sponsored by Illumio
WHITE PAPER: Download this white paper to learn how to build an effective micro-segmentation strategy including identifying high-value assets, mapping your application dependencies and enrich with vulnerability data, understanding the types of segmentation for security, and more.
Posted: 28 Dec 2021 | Published: 04 Mar 2021

Illumio

IBM DB2 Webcast Series for Oracle Professionals
sponsored by IBM
WEBCAST: Due to PL/SQL and a range of other compatibilty features, Oracle applications are much more easily enabled for DB2.  Use this short webcast to get level-set on terms.  Part of a series, this short webcast replay is an overview of DB2 terms and terminology for those most familiar with the Oracle environment.
Posted: 30 Aug 2011 | Premiered: Aug 30, 2011

IBM

Analyst Whitepaper: Bloor Research: Sybase ASE Total Cost of Ownership - A Comparison to Oracle
sponsored by SAP America, Inc.
WHITE PAPER: Given that Sybase ASE can now be deployed as the foundation for SAP Business Suite and BW implementations (in addition to Oracle, Microsoft SQL Server and IBM DB2), the information is relevant to SAP customers installing a new instance of SAP or looking to migrate their existing SAP installation to a different database.
Posted: 22 Apr 2012 | Published: 30 Sep 2011

SAP America, Inc.

Webroot Secure Anywhere Business - Mobile Protection
sponsored by OpenText Security Solutions
WHITE PAPER: Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

OpenText Security Solutions

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Is your data as well protected as it should be?
sponsored by Informatica
WHITE PAPER: Read this exclusive white paper now to discover the big data security tool capable of significantly reducing the risk of a data breach, while helping organizations comply with data regulations and policies.
Posted: 07 May 2014 | Published: 30 Nov 2012

Informatica

Customers Discuss Oracle Database Security
sponsored by Oracle Corporation
WEBCAST: Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.
Posted: 24 May 2012 | Premiered: May 24, 2012

Oracle Corporation

The Enterprise Guide to SAP HANA's Cloud Models and Migration Checklist
sponsored by UXC Oxygen and Amazon Web Services
EGUIDE: If you're considering HANA but are unsure about SAP's models of cloud computing, you'll want to fully outline your deployment options before migration. Discover three options for cloud-based HANA, as well as 6-point checklist for crafting a successful cloud migration strategy.
Posted: 07 Nov 2016 | Published: 28 Oct 2016

UXC Oxygen and Amazon Web Services

Controlling Risk Through Software Code Governance
sponsored by Coverity by Synopsys
WHITE PAPER: Software code governance is a large part of mitigating risks. Discover how this strategy can proactively establish policies or thresholds around code quality and security, test against these policies early in the project lifecycle, and control risk through better visibility into areas of risk in the project or in the supply chain.
Posted: 27 Jul 2011 | Published: 26 Jul 2011

Coverity by Synopsys

GDPR: The Race is on for Compliance
sponsored by Dell SecureWorks
EGUIDE: Learn if your organization is ready to ensure its compliance to the GDPR and what you need to know to take it seriously.
Posted: 19 Jun 2017 | Published: 14 Jun 2017

Dell SecureWorks