enterprise database

Results 76 - 100 of 121Sort Results By: Published Date | Title | Company Name
Published By: Oracle Corp.     Published Date: Oct 15, 2012
Steve Moyle, CTO of Oracle Database Firewall, explains the best practices for efficient database activity monitoring, alerting and blocking that can help prevent SQL injection attacks and other threats from reaching your enterprise databases.
Tags : 
oracle, sql injection, database activity monitoring, database security, it security
    
Oracle Corp.
Published By: Oracle Corp.     Published Date: Oct 15, 2012
This survey, conducted by the Independent Oracle Users Group, examined more than 350 data managers and professionals regarding planned and unplanned downtime, database high availability, and disaster recovery solutions.
Tags : 
enterprise data, cloud computing, high availability, downtime, database infrastructure, database availability
    
Oracle Corp.
Published By: SRC,LLC     Published Date: Jun 01, 2009
To mine raw data and extract crucial insights, business decision‐makers need fast and comprehensive access to all the information stored across their enterprise, regardless of its format or location. Furthermore, that data must be organized, analyzed and visualized in ways that permit easy interpretation of market opportunities growth, shifts and trends and the business‐process changes required to address them. Gaining a true perspective on an organization’s customer base, market area or potential expansion can be a challenging task, because companies use so many relational databases, data warehouse technologies, mapping systems and ad hoc data repositories to gather and house information for a wide variety of specialized purposes.
Tags : 
src, enterprise, enterprise applications, convergence, compared, counted, combined, reorganized, analyzed, visualized, mapped, database, gis, geographic business intelligence, data independence, etl, csv, delimited text file, mdb (both for microsoft access, esri personal geodatabase
    
SRC,LLC
Published By: Oracle     Published Date: Apr 26, 2016
Information security attacks are on the rise. And enterprises are highly vulnerable when it comes to databases, where their most critical business information resides. It's time to turn the database, and the infrastructure it runs on, into an information fortress.
Tags : 
    
Oracle
Published By: IBM     Published Date: Aug 30, 2010
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
Tags : 
ibm, database security, enterprise, private data, privacy, intrusion, information security policies, auditing, monitoring, encryption
    
IBM
Published By: Microsoft Dynamics     Published Date: Jul 03, 2008
Microsoft Dynamics CRM 4.0 demonstrated its ability to scale to support the needs of an enterprise organization with a very large customer service database. In a test based on a customer database of over 1 billion records, Microsoft Dynamics CRM was able to achieve sub-second response times using a modest hardware configuration.
Tags : 
crm, enterprise crm, customer relationship management, enterprise software, microsoft, microsoft dynamics, microsoft crm
    
Microsoft Dynamics
Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management, sim technology, compliance, fraud, netforensics
    
netForensics
Published By: Melissa Data     Published Date: Nov 18, 2008
Tom Brennan and John Nydam explain the Melissa Data and Stalworth partnership, discuss the business problems caused by bad data, and describe how DQ*Plus provides a complete data quality solution for enterprise applications and commercial databases.
Tags : 
melissa data, data quality, contact data verification, address verification, validate address, address verification software, address verify, address validation software, data quality tools, data quality management, data quality objects, data quality api, address quality, data cleanse, data hygiene, data quality, data quality analysis, data quality api, data quality assurance, data quality control
    
Melissa Data
Published By: PC Mall     Published Date: Mar 27, 2012
This e-book examines the ways that your enterprise database can help or hinder the bottom line. It also shows you how IBM DB2 can help you uncover cost savings while delivering performance, automation, productivity, green IT benefits and more.
Tags : 
strategy, strategies, ibm db2, enterprise, enterprise database, database, bottom line, productivity, automation, performance, green it, green, ibm
    
PC Mall
Published By: Netezza IBM US     Published Date: Mar 27, 2012
Across all industries, Revolution R Enterprise advanced analytics platform leverages the capabilities of IBM Netezza Analytics on IBM Netezza's family of data warehouse appliances, merging high-performance, scalable data warehouse technology with advanced in-database analytics and massively parallel capabilities
Tags : 
ibm, technology, netezza, analytics, enterprise analytics
    
Netezza IBM US
Published By: VMTurbo     Published Date: Jul 08, 2015
This E-Book covers a brief history of the OpenStack cloud operating system, its releases and projects, significant enterprise adoptions, and the function and contributions VMTurbo.
Tags : 
cloud strategy, cloud operating systems, enterprise adoption, database management, business integration, web interface, application management, software licensing
    
VMTurbo
Published By: Microsoft Azure     Published Date: Apr 11, 2018
When you extend the global reach of your enterprise, youll find new markets for your products and services. That means reaching more potential customers, bigger growth potential, and higher ROI. But to tap into those emerging markets, you need to provide the best, most consistent user experience. Now, its possible for you to build, deploy, and manage modern apps at scale with a globally-distributed databasewithout the hassles associated with hosting in your data center. Read the e-book Build Modern Apps with Big Data at a Global Scale and learn how Azure Cosmos DB, a globally-distributed turnkey database service, is transforming the world of modern data management. Keep access to your data available, consistent, and safewith industry-leading, enterprise-grade security and compliance. Start developing the best app experience for your users based on five well-defined consistency models: Strong: Favors data consistency. Ideal for banks, e-commerce processing, and online booking. Boun
Tags : 
    
Microsoft Azure
Published By: Webroot     Published Date: Sep 18, 2013
This whitepaper explains how exploding mobile threats challenge mobile device management (MDM) vendors, carriers, service providers, and app stores to ensure the safety of apps. Consumers and customers will hold these companies responsible for providing adequate security, and employees will expect enterprise IT departments to protect them from malicious mobile apps like they have come to expect for PC malware. The report describes how a cloud-based app reputation service protects against the risks of mobile applications in the wild: Collects millions of applications from a variety of sources Stores mobile app data in the worlds largest cloud-based threat database Analyzes and scores apps on a range from malicious (e.g., known malware such as Trojans or root kits) to trustworth
Tags : 
mobile app, mobile threat, mobile device management, mobile application management, malicious mobile app, security
    
Webroot
Published By: Sybase PowerBuilder     Published Date: Jan 19, 2012
Sybase PowerBuilder has remained throughout the years a bastion of application development productivity for a wide class of enterprise applications that combine database access with a highly productive graphical user interface (GUI).
Tags : 
sybase, powerbuilder, data, development, applications, integrated development environments, ides, .net, windows 7, web services, visual user interface, datawindow, j2e, win32, .net frameworks, business application, wpf
    
Sybase PowerBuilder
Published By: McAfee     Published Date: Nov 14, 2012
Real-Time Database Monitoring, Auditing, and Intrusion Prevention Databases store an enterprise's most valuable information assets, but in most organizations they are poorly protected. It's common sense to secure databases, but it's not that simple.
Tags : 
database monitoring, auditing, intrusion prevention, database, mcafee
    
McAfee
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
IBM LinuxONE is an enterprise Linux server engineered to deliver cloud services that are secure, fast and instantly scalable. The newest member of the family, IBM LinuxONE Emperor II, is designed for businesses where the following may be required: protecting sensitive transactions and minimizing business risk accelerating the movement of data, even with the largest databases growing users and transactions instantly while maintaining operational excellence accessing an open platform that speeds innovation
Tags : 
    
Group M_IBM Q418
Published By: IBM     Published Date: Jun 07, 2016
In a multi-database world, startups and enterprises are embracing a wide variety of tools to build sophisticated and scalable applications. IBM Compose Enterprise delivers a fully managed cloud data platform so you can run MongoDB, Redis, Elasticsearch, PostgreSQL, RethinkDB, RabbitMQ and etcd in dedicated data clusters.
Tags : 
ibm, analytics, database, ibm compose enterprise
    
IBM
Published By: IBM     Published Date: Jun 21, 2017
Today, its unlikely that a single database will meet all your needs. For a variety of reasonsincluding the need to support cloud-scale solutions and increasingly dynamic app ecosystemsstartups and enterprises alike are embracing a wide variety of open source databases. These varied databasesincluding MongoDB, Redis and PostgreSQL open doors to building sophisticated and scalable applications on battle-hardened, non-proprietary databases.
Tags : 
ibm, data base, cloud, scalability, app ecosystem
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
IBM Security offers one of the most advanced and integrated portfolios of enterprise security products and services. The portfolio, supported by world-renowned X-Force research, provides security intelligence to help organizations holistically protect their infrastructures, data and applications, offering solutions for identity and access management, database security, application development, risk management, endpoint management, network security and more. These solutions enable organizations to effectively manage risk and implement integrated security for mobile, cloud, social media and other enterprise business architectures. IBM operates one of the worlds broadest security research, development and delivery organizations, monitors 15 billion security events per day in more than 130 countries, and holds more than 3,000 security patents.
Tags : 
it security, malware, malware protection, virus prevention, ibm, threat intelligence
    
IBM
Published By: Sybase     Published Date: May 10, 2012
This white paper, based on a survey of database professionals, examines the problems facing many large businesses that are attempting to remain agile while dealing with a mountain of data under management.
Tags : 
adaptive server enterprise, sybase database management system, database management, database management software, database management and software, database management system, database management system software, database management program, database management programs, relational database management system, relational database management systems, data base manag
    
Sybase
Published By: Sybase     Published Date: May 10, 2012
Sybase's Adaptive Server Enterprise (ASE) is a high performance relational database management system for mission-critical, data intensive environments that has been meeting these needs for nearly three decades.
Tags : 
adaptive server enterprise, sybase database management system, database management, database management software, database management and software, database management system, database management system software, database management program, database management programs, relational database management system, relational database management systems, data base manag
    
Sybase
Published By: Sybase     Published Date: May 10, 2012
This webcast discusses the technical benefits of Sybase ASE's compression technology. Watch the recording to learn more and to hear about use cases, strategies for data migration and a look at the performance implications.
Tags : 
adaptive server enterprise, sybase database management system, database management, database management software, database management and software, database management system, database management system software, database management program, database management programs, relational database management system, relational database management systems, data base manag
    
Sybase
Start   Previous    1 2 3 4 5    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.