database auditing

Results 1 - 8 of 8Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance
     McAfee
By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley
     McAfee
By: Oracle Corp.     Published Date: Oct 15, 2012
Hear from Tammy Bednar, Senior Principal Product Manager at Oracle as she discusses best practices for database auditing, alerting and reporting across Oracle and non-Oracle databases using Oracle Audit Vault.
Tags : database auditing, audits, compliance, database, oracle, database security
     Oracle Corp.
By: IBM     Published Date: Aug 30, 2010
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
Tags : ibm, database security, enterprise, private data, privacy, intrusion, information security policies, auditing
     IBM
By: McAfee     Published Date: Nov 14, 2012
Real-Time Database Monitoring, Auditing, and Intrusion Prevention Databases store an enterprise's most valuable information assets, but in most organizations they are poorly protected. It's common sense to secure databases, but it's not that simple.
Tags : database monitoring, auditing, intrusion prevention, database, mcafee
     McAfee
By: Qualys     Published Date: Jan 07, 2009
Choosing a solution for Vulnerability Management (VM) is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security.
Tags : qualys, vm solution, vulnerability management, saas, database security, network patching, vulnerability patching, networking
     Qualys
By: IBM Corporation     Published Date: Jun 09, 2011
This study provides real-world findings from in-depth interviews with 15 enterprises that have implemented database auditing and real-time protection solutions.
Tags : ibm, guardium, database auditing, security, real-time protection, activity monitoring, enterprise application
     IBM Corporation
By: IBM Corporation     Published Date: Jun 09, 2011
This study provides real-world findings from in-depth interviews with 15 enterprises that have implemented database auditing and real-time protection solutions.
Tags : ibm, guardium, database auditing, security, real-time protection, activity monitoring, enterprise application, webcast
     IBM Corporation
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com