Newsletters




Database Security

Information Security solutions protect enterprise and government data and help address the need for compliance with Government and Industry requirements in physical and virtual systems. Security technologies that help protect against misuse by external hackers and internal privileged users include Data Masking, Data Encryption, Identity Management, Degaussing, Firewalls, Auditing, and Mandatory Access Controls.



Database Security Articles

SAP SE has introduced a secure enterprise app store that allows companies to push their mobile apps into the hands of employees, business partners and consumers. The Mobile Place feature delivers apps, services and content to both managed and unmanaged mobile devices. The new Mobile Place feature is included at no additional cost with the purchase of SAP Mobile Secure portfolio.

Posted August 26, 2014

Improvements for mobile data management and mobile data virtualization have been added KidoZen's enterprise mobile application platform in order to simplify integration, management and security of enterprise data consumed by mobile applications.

Posted August 25, 2014

During its annual user conference in San Francisco, Couchbase launched the beta release of Couchbase Server 3.0. As part of the beta release, Couchbase is also announcing a contest - the Couchbase Server 3.0 Bug Bash.

Posted August 21, 2014

Managing business-critical databases is no easy task even for experienced DBAs, so for IT pros who might be new to the role—and likely already wear multiple other hats within their organization—it can be a challenging endeavor to say the least. Here are the 5 key areas that IT pros who have found themselves in the position of accidental DBAs should focus on.

Posted August 19, 2014

Just months after the massive data breaches of the 2013 holiday season, a newly discovered data breach is again shining a spotlight on the need for better enterprise data security and the fact that not enough is being done to secure critical customer data. The most recent headlines involve a Russian crime ring and 1.2 billion user names and passwords as well as at least 500 million email addresses. Against this backdrop, Oracle announced Oracle Key Vault, a software appliance designed to securely manage encryption keys and credential files in the enterprise data center.

Posted August 19, 2014

Oracle has released Oracle Linux 7, which provides support for emerging technologies, such as OpenStack, as well as new Linux innovations, tools, and features. "With Oracle Linux 7, users have more freedom to choose the technologies and solutions that best meet their business objectives," said Wim Coekaerts, senior vice president of Linux and Virtualization Engineering, Oracle.

Posted August 13, 2014

Caspio has released Caspio HIPAA Enterprise, a HIPAA-compliant edition of its rapid application development platform. With Caspio HIPAA Enterprise, the company aims to support the healthcare industry in leveraging cloud-based applications to improve efficiencies and streamline processes in practice management, patient engagement, and health information management within a secure and compliant environment.

Posted August 05, 2014

IBM has acquired CrossIdeas, a privately held provider of security software that governs user access to applications and data across on-premise and cloud environments. Based in Rome, Italy, CrossIdeas addresses the business requirements of auditors and risk and compliance managers withrole analytics, visualizations for better insight into user access, and alignment with compliance and access risk requirements. Financial terms were not disclosed.

Posted August 04, 2014

Data backup solutions provider STORServer has released a new guide to the backup appliance selection process. The guide offers insight on hardware and software considerations, key features, and manufacturer support criteria.

Posted August 04, 2014

Quest International Users Group (Quest) supports JD Edwards, PeopleSoft, Fusion, and many other Oracle edge application customers, and is comprised of 55,000 members in 95 countries. Throughout Oracle OpenWorld 2014, you'll find members of the Quest team speaking at various breakout sessions, hosting SIG meetings and networking with members, Oracle personnel, and other customers. We will be answering questions and sharing information on how our members use and work with their Oracle products.

Posted August 04, 2014

You're invited to connect with the Oracle Applications Users Group at Oracle OpenWorld 2014, September 28-October 2, 2014, and get the answers you need to get ahead. The OAUG is the world's largest education, networking, and advocacy forum for Oracle Applications Users. Find out how OAUG membership helps you find answers, network with real users and expert consultants, and influence Oracle. And discover why 96% of OAUG members recommend membership.

Posted August 04, 2014

Members of the Independent Oracle Users Group (IOUG), which represents the independent voice of Oracle technology and database professionals, will be out in force at OpenWorld 2014—presenting more than 40 sessions on the topics you want to learn about most.

Posted August 04, 2014

Why do tens of thousands of Oracle customers, partners, and consultants descend on Moscone Center in San Francisco for the annual Oracle OpenWorld conference? Despite the proliferation of conferences and online events competing for attention, OpenWorld remains the single, central place for all things Oracle. Here, DBTA presents the annual Who to See @ Oracle OpenWorld special section.

Posted August 04, 2014

With companies drowning in data, they are encountering storage problems that are impacting the performance of critical systems and applications. What's needed are smarter approaches. Today's storage solutions are coming to the rescue, enabling greater efficiency through data compression, information lifecycle management, and tiered storage strategies. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Data Storage Solution.

Posted August 04, 2014

Data governance is growing in importance along with the recognition of the game-changing potential posed by big data. As more data is amassed within organizations, effective data governance enables them to have confidence in the quality of that data for a variety of tasks as well adhere to security and privacy standards. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Data Governance Solution.

Posted August 04, 2014

Poor quality data can mean a host of problems for companies. Incorrect data can result in duplicate entries which can make it difficult for vendors to achieve a single version of the truth, increase data storage costs, impede CRM initiatives, and create data compliance and security headaches. Data quality solutions provide the necessary data integrity for critical systems including customer relationship management, master data management, and database management. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Data Quality Solution.

Posted August 04, 2014

Effective data modeling solutions help organizations construct high quality data models, modify existing structures as well as produce detailed documentation. And today, data modeling solutions also help companies visualize and manage business data across more platforms than ever before and extend that data to users with varying job roles and skill levels across geographies and time zones. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Data Modeling Solution.

Posted August 04, 2014

Database development solutions provide the necessary support to help database development teams achieve success by avoiding the risks posed by a range of potential problems—from software bugs, to geographically dispersed development teams, to varied code standards and skill sets. Here are the winners of the 2014 DBTA Readers' Choice Awards for Best Database Development Solution.

Posted August 04, 2014

The consumerization of IT, coupled with online services like social media, creates a need for flexibility and performance improvements within current data centers without the associated costs. And, as the cost of flash declines, data center managers are seeing flash as an attractive alternative to traditional hard-disk methods. By some estimates, flash memory prices have fallen at an average of 35% per year over the last few years.

Posted August 04, 2014

Novetta Identity Analytics has achieved Hortonworks Certification, and Novetta has joined the Hortonworks Technology Partner Program. Novetta Identity Analytics provides a central, multi-dimensional view of the entities across the data silos and uncovers the relationships within and among those entities to support customer intimacy, churn prediction, risk profiling, fraud analysis and detection, and other use cases.

Posted August 04, 2014

Data protection and recovery software provider Arcserve has begun operations as a standalone company following the completion of the sale of the business from CA to investment firm Marlin Equity Partners.

Posted August 04, 2014

Corvil, an IT data analytics company, has introduced Corvil Giga, a new streaming analytics platform for real-time operational intelligence and big data integration. The release is targeted at companies in the financial industry and others that need to operate their business in real time.

Posted July 29, 2014

Zettaset is giving customers the option of purchasing its complete Orchestrator big data security suite or adopting individual feature applications as needed - such as enterprise data encryption and multi-service high availability - to customize and secure their big data environments.

Posted July 29, 2014

Continuity Software, a provider of service availability risk management solutions, has created a new program for channel partners, enabling them to offer the AvailabilityGuard software suite that provides high availability (HA) and disaster recoverability (DR), across physical, virtual and cloud environments.

Posted July 29, 2014

Many database administrators now feel that the best way to preserve database reliability may be to take over the job of backing up their own databases. Just as end users are happier when they can do their own password resets or restore an accidentally deleted file, DBAs want greater control over their backups, restores and recoveries, and also the peace of mind of knowing that it is done to their standards. The key to making this work is integrating database applications with purpose built backup appliances (PBBAs).

Posted July 23, 2014

Expanding its array of backup appliances, Dell has added the Dell DL1000, an AppAssure-powered purpose-built backup appliance optimized for use by SMBs and MSPs; and the Dell DR2000v, a software-based virtual deduplication appliance optimized for use in remote office and branch office (ROBO) settings; and made enhancements to the the company's flagship AppAssure data protection software solution.

Posted July 22, 2014

IBM announced second-quarter 2014 net income of $4.1 billion, compared with $3.2 billion in the second quarter of 2013, an increase of 28%. Total revenues for the second quarter of 2014 of $24.4 billion were down 2% from the second quarter 2013.

Posted July 21, 2014

A new API from ManageEngine enables third-party tools to access log data generated by EventLog Analyzer, the company's security information and event management solution. The EventLog Analyzer API enables security administrators to feed normalized log data into any third-party application.

Posted July 21, 2014

Through a strategic partnership with BOS, Advanced will be providing its customers with tcVISION and tcACCESS from BOS, both of which are used by organizations to leverage the value of mainframe platforms and data. tcVISION is a mainframe data replication and synchronization system and tcACCESS enables the real-time bi-directional exchange of information between IBM mainframes and Linux, Microsoft Windows and UNIX based systems.

Posted July 21, 2014

Oracle today introduced Oracle Big Data SQL, which allows customers to run one SQL query across Hadoop, NoSQL, and Oracle Database, minimizing data movement while overcoming data silos. According to Oracle the new solution helps customers gain a competitive advantage by making it easier to uncover insights faster, and allows them to leverage existing SQL skills while protecting data security and enforcing governance. Oracle Big Data SQL runs on Oracle Big Data Appliance and can work in conjunction with Oracle Exadata Database Machine.

Posted July 15, 2014

To meet emerging challenges in the enterprise fueled by the expansion of cloud, mobile and IoT, Oracle has introduced SOA Suite 12c with simplified integration capabilities. "We are seeing a lot of demand for any-to-any integration," said Amit Zavery, group vice president, Fusion Middleware, Oracle. "We have more than 5,000 customers using SOA Suite today," he said, adding that this release moves the needle even further and allows Oracle to differentiate against the competition more starkly. "The cloud and mobile capabilities will be very useful for customers looking for one, out-of-the-box solution for any kind of integration."

Posted July 09, 2014

To place greater focus on its core capabilities, CA Technologies has agreed to divest its arcserve business. Arcserve is a backup and recovery software solution, helps companies ensure the availability of mission-critical systems, applications and data. Once the transaction has been completed, arcserve will become an independent company.

Posted July 08, 2014

More than half of IT leaders (55%) say that it is highly likely or certain that the original knowledge of their mainframe applications and supporting data structure is no longer in the organization. Similarly, nearly three quarters (73%) confirm that their organization's documentation is incomplete.

Posted July 07, 2014

IBM DB2 V10.1 introduced Row and Column Access Control (RCAC) as a new feature for securing data within a DB2 table. In Row and Column Access Control, permissions are defined on a table to restrict rows that are exposed. Rows being exposed means that they are available to be returned in the result set, or can be inserted, or can be updated or deleted, with the limitation of the authorities the user has on the table.

Posted July 03, 2014

Data security specialist Dataguise has introduced Dataguise for Data Governance suite, a solution suite for big data governance that will initially support Oracle, IBM DB2, SQL Server, Teradata, Cloudera, Hortonworks, MapR and Pivotal HD.

Posted June 20, 2014

Big data analytics hold great promise, but the present methods of mining and managing big data are still evolving and pose serious security and privacy challenges. Confronting these challenges is essential if the potential of big data is to be fully exploited.

Posted June 17, 2014

With Oracle's new ZS3 Series for backup, Oracle ZFS Storage ZS3-BA, the company is providing customers with a pre-configured, pre-racked solution co-engineered with Oracle Database to provide extreme backup and restore performance to help meet SLAs. According to Oracle, ZS3-BA helps ensure backup and recovery SLAs are met by scaling to 26 TB/hr for full backups and 17 TB/hr for full restores - a 30% increase for backups and 80% increase for restores over the previous generation.

Posted June 11, 2014

MySQL Fabric is now generally available, providing an integrated system that makes it simpler to manage groups of MySQL databases. It delivers both high availability - via failure detection and failover - and scalability through automated data sharding.

Posted June 11, 2014

Oracle has joined the OpenDaylight Project as a Silver Member, and is expanding its application-driven software defined networking (SDN) capabilities in Oracle Solaris 11.2 with plans to integrate OpenDaylight SDN. The aim with the new integration is to help customers improve service quality and take advantage of apps-to-disk SLAs through compatibility with a range of SDN devices, applications and services. It will also allow them to use a common and open SDN platform with OpenStack to manage Oracle Solaris-based clouds.

Posted June 11, 2014

Good data quality starts with metadata. Accurate data definitions are required in order to apply the controls for compliance to the correct data. Without proper metadata definitions, it is impossible to apply regulatory compliance to data.

Posted June 11, 2014

Dataguise, a provider of big data security and protective intelligence solutions, has introduced the Dataguise DgSecure data protection platform with the MapR Sandbox for Hadoop, and also announced the Dataguise DgSecure data protection platform with the Hortonworks HDP 2.1 Sandbox. "In order to realize the benefits of big data, enterprises are getting more proactive about addressing security, privacy and risk in Hadoop," said Patty Nghiem, vice president of marketing and business development at Dataguise.

Posted June 10, 2014

Cloudera has acquired Gazzang to add enterprise-grade data encryption and key management. The move is designed to address the challenges associated with securing and processing sensitive and legally protected data within the Hadoop ecosystem, and also fulfill a requirement posed by compliance regulations such as HIPAA-HITECH, PCI-DSS, FERPA and the EU Data Protection Directive.

Posted June 10, 2014

STORServer is offering CommVault-Dell appliance customers the opportunity to evaluate or upgrade their current systems risk-free and at a discount in the wake of Dell's announcement that it is ending sales of backup appliances powered by CommVault Simpana. The options for current CommVault-Dell appliance customers to evaluate their current backup environments include 50% off a Health Check as well as a free software upgrade from Simpana 8 or 9 to version 10.

Posted June 09, 2014

RainStor 5.5 has been certified to run on Cloudera Enterprise 5. This new certification enables Cloudera customers to run RainStor natively on HDFS, while offering enterprise-grade security features. "RainStor running on Cloudera Enterprise 5 is a significant step forward for customers taking a serious look at Hadoop," said Mark Cusack, chief architect, RainStor.

Posted May 22, 2014

Pages
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84

Sponsors