SQL Server Security Reports

Webroot  Endpoint Security eBook
sponsored by OpenText Security Solutions
EBOOK: This resource outlines how a new approach to security may be what your business needs. If constant downloads, installations and updates are slowing down the efficiency of your company; it may be time to make some changes. Read this eBook to find out more about how Webroot can improve your endpoint security.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

OpenText Security Solutions

Stopping application layer DDoS attacks: What you need to know
sponsored by TechTarget Security
EGUIDE: While a DDoS attack can be damaging to any organization, DDoS attacks specifically at the application-layer can be more ominous. Understanding these attacks are the first step to keeping your organization protected. In this e-guide, explore how DDoS is being used, what you can do to stop them, the future of the web threat landscape and more.
Posted: 27 Mar 2012 | Published: 27 Mar 2012

TechTarget Security

Data protection tool that's easy to install & configure
sponsored by Informatica
DATA SHEET: Read this exclusive resource to uncover all the ins-and-outs of one industry-leading data protection tool.
Posted: 07 May 2014 | Published: 31 Dec 2013

Informatica

E-Guide: Improving Oracle Database Performance
sponsored by SAVVIS
EGUIDE: Read this E-guide to learn how to move mission-critical Oracle application to virtualized environments with little disruption or pain.
Posted: 05 Aug 2011 | Published: 05 Aug 2011

SAVVIS

Information Security ASEAN March 2015
sponsored by TechTarget Security
EZINE: Organizations are faced with the double challenge of having to secure a growing volume of endpoints, and dealing with an increasing number of security threats.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance
sponsored by Rapid7
WHITE PAPER: Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy.
Posted: 18 Jul 2012 | Published: 18 Jul 2012

Rapid7

SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools
sponsored by IBM
EGUIDE: Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM

Introducing the Next Generation of SPARC Servers E-Book
sponsored by Oracle Corporation
EBOOK: Discover the benefits of Oracle's new SPARC T4 servers and how they deliver world record performance for a wide range of enterprise applications, and offer enhanced reliability and security, improved virtualization tools, and reduced costs. View this e-book packed with valuable information, customer success stories, and a 3D demo.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

Oracle Corporation

Mastering the Art of Database Backup and Recovery
sponsored by Oracle Corporation UK Ltd
EGUIDE: DBAs are usually concerned with backing up their databases, but they should spend more time focusing on database recovery as part of the backup process. Read this expert guide to learn how to cover all your DB recovery bases and how to back up data more efficiently.
Posted: 31 Oct 2017 | Published: 26 Oct 2017

Oracle Corporation UK Ltd

Tips to Secure your Virtualized Data Center
sponsored by TechData - Kaspersky
EGUIDE: This e-guide will help you better protect your virtualized data center by showing you security tools and policies to implement in your network.
Posted: 04 Mar 2016 | Published: 29 Feb 2016

TechData - Kaspersky