database compliance

Results 1 - 25 of 41Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracle’s database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
    
Oracle
Published By: Workday Nordics     Published Date: Apr 09, 2018
As May 25th, 2018 approaches, many of the organisations that I speak to are choosing to modernise their HR systems to help with their compliance efforts. In particular, where organisations have a complicated mix of different HR systems and spreadsheets, with employee data spread across different databases managed by multiple security models, GDPR compliance will be more difficult. Contrast such a complicated mix of HR systems with Workday’s unified, single system approach to HR, with a single source of HR data and a single security model, and you can see why organisations are choosing to move to Workday as they work to both modernise their HR systems and move towards GDPR compliance. We hope you find this research an i
Tags : 
    
Workday Nordics
Published By: mindSHIFT     Published Date: Nov 29, 2007
Have you adjusted your data retention policies and electronic discovery procedures to comply with the new Federal Rules of Civil Procedure (FRCP)? Learn how email archiving can help you with these electronic discovery requirements.
Tags : 
frcp, secure content, secure data, data protection, database security, compliance, frcp compliance, data governance, e-discovery, legal, law firm, mindshift, data management, secure content management
    
mindSHIFT
Published By: NAVEX Global     Published Date: May 06, 2016
This report outlines Data & Analysis to Help You Benchmark Your Programme Against the World’s Largest Ethics & Compliance Hotline Database—and Enhance Your Ethics & Compliance Programme Effectiveness.
Tags : 
data analysis, benchmarking
    
NAVEX Global
Published By: Mimecast     Published Date: Mar 13, 2017
The European Union’s General Data Protection Regulation (GDPR) is triggering a change in how organizations need to protect personal data, including data contained in email and contact databases. Regardless of your organization’s physical location, you must be in GDPR compliance for EU resident personal data by May 2018—or face dire consequences. Download the White Paper, to learn: • Why compliance requires unprecedented levels of effort if you control or process personal data • What specific security, privacy, and protection measures you need to take to comply with GDPR • How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and its associated penalties
Tags : 
    
Mimecast
Published By: BMC Software     Published Date: Aug 26, 2014
Is your IT Automation strategy saving you money or just becoming more complex and costly? With the right unified strategy, IT Automation can pay for itself and deliver far more business value. Watch this on-demand webinar, “New Strategies to Manage IT Automation Complexity” and learn how to: • Reduce costs by integrating automatio n for servers, middleware, networks and databases • Eliminate manual and tedious IT Operations tasks with both new and existing technology • Save time and money by consolidating configuration management processes across your IT infrastructure • Transform compliance, audit that and remediation from a stressful event to a standard practice Become part of the Automation revival is serving as a catalyst for IT Operations. Watch this on-demand webinar and learn how to integrate your IT automation strategy.
Tags : 
it automation, strategy, operations, it infrastructure, automation, it management
    
BMC Software
Published By: Oracle     Published Date: Oct 20, 2017
Traditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance
Tags : 
    
Oracle
Published By: Mimecast     Published Date: Apr 18, 2017
"Your Email & The EU GDPR GDPR changes how organizations need to protect personal data, including data contained in email and contact databases. Regardless of physical location, you must be in GDPR compliance for EU resident personal data by May 2018. Download the white paper to learn: - The unprecedented level of effort required for collecting and processing personal data - The specific security, privacy and protection requirements to comply with GDPR - How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and associated penalties"
Tags : 
gdpr, email, personal data, security, data protection
    
Mimecast
Published By: Workday UK     Published Date: Mar 15, 2018
As May 25th, 2018 approaches, many of the organisations that I speak to are choosing to modernise their HR systems to help with their compliance efforts. In particular, where organisations have a complicated mix of different HR systems and spreadsheets, with employee data spread across different databases managed by multiple security models, GDPR compliance will be more difficult. Contrast such a complicated mix of HR systems with Workday’s unified, single system approach to HR, with a single source of HR data and a single security model, and you can see why organisations are choosing to move to Workday as they work to both modernise their HR systems and move towards GDPR compliance. We hope you find this research an i
Tags : 
    
Workday UK
Published By: Solidcore     Published Date: Jan 07, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment.
Tags : 
pci, pci dss, pci compliance, compliance, payment card, credit card, data protection, data security, database security, cost of non-compliance, customer data, solidcore, fortrex, security, network security, intrusion prevention
    
Solidcore
Published By: Pentaho     Published Date: Mar 08, 2016
If you’re evaluating big data integration platforms, you know that with the increasing number of tools and technologies out there, it can be difficult to separate meaningful information from the hype, and identify the right technology to solve your unique big data problem. This analyst research provides a concise overview of big data integration technologies, and reviews key things to consider when creating an integrated big data environment that blends new technologies with existing BI systems to meet your business goals. Read the Buyer’s Guide to Big Data Integration by CITO Research to learn: • What tools are most useful for working with Big Data, Hadoop, and existing transactional databases • How to create an effective “data supply chain” • How to succeed with complex data on-boarding using automation for more reliable data ingestion • The best ways to connect, transport, and transform data for data exploration, analytics and compliance
Tags : 
data, buyer guide, integration, technology, platform, research, enterprise applications
    
Pentaho
Published By: McAfee     Published Date: Feb 06, 2013
Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, and for ensuring regulatory compliance.
Tags : 
vulnerability management, database security, dbms security, database activity monitoring, virtual patching, virtual patching for databases, anti spam, anti spyware, anti virus, application security, compliance, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance, patch management, security management
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organization’s most sensitive data.
Tags : 
database security, database security compliance, database activity monitoring, access control, anti spyware, anti virus, application security, business continuity, compliance, email security, hacker detection, internet security, intrusion detection, intrusion prevention, security management, vulnerability management
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.
Tags : 
best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi, ephi, vulnerability manager for databases, anti spam, anti spyware, anti virus, application security, auditing, business continuity, compliance, email security, encryption, internet security, intrusion detection, intrusion prevention, network security appliance
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : 
database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance, database activity monitoring, database vulnerability management, pci audit, anti spam, anti spyware, anti virus, compliance, disaster recovery, encryption, firewalls, hacker detection, internet security
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware, anti virus, application security, business continuity, compliance, disaster recovery, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, vulnerability management
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code, anti spam, anti spyware, anti virus, application security, auditing, business continuity, compliance, disaster recovery, encryption, hacker detection, high availability, internet security
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Compliance does not automatically equate to security. A company may be compliant with a host of regulatory requirements, while its databases remain exposed and vulnerable. Learn how McAfee Database Security can help prevent such vulnerabilities.
Tags : 
database security, database compliance, native dbms auditing, database protection, database password audit, database activity monitoring, pci dss, sarbanes-oxley, hipaa, hitech, ssae, access control, anti spam, anti spyware, anti virus, auditing, business continuity, compliance, disaster recovery, encryption
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Data Center Security Suite for Database delivers all the capabilities needed to secure your databases for reliable SOX compliance, with minimal impact on system performance or the productivity of your IT organization.
Tags : 
database security, database compliance, sox compliance, sox audit, database activity monitoring, database vulnerability management, database compliance reporting, anti spyware, anti virus, auditing, ddos, internet security, intrusion detection, intrusion prevention, web service security, vulnerability management, virtualization, cloud computing
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
Databases don’t take the day off. Neither do we. McAfee security experts remain focused on keeping your sensitive information safe and available while helping your company ensure compliance with internal policies and industry regulations.
Tags : 
database security, database compliance, database virtual patching, database breach, application control, legacy databases, anti spyware, anti virus, internet security, intrusion detection, intrusion prevention, vulnerability management, virtualization, cloud computing
    
McAfee
Published By: McAfee     Published Date: Mar 11, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities, sql injection, buffer overflow, insecure sql code, access control, anti spam, anti spyware, anti virus, application security, auditing, business continuity, disaster recovery, email security
    
McAfee
Previous   1 2    Next    
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.