database monitoring

Results 1 - 25 of 53Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 08, 2013
Learn about McAfee Database Security solutions, compliance and security requirements, and principles for protecting your database.
Tags : 
database security, native dbms auditing, sarbanes-oxley, pci dss, hipaa, sas 70, ssae 16, database compliance
    
McAfee
Published By: McAfee     Published Date: Apr 25, 2014
Sophisticated advanced targeted malware requires a sophisticated approach. This solution brief explains how to defend your organization with a comprehensive, layered approach that identifies, contains, and remediates these insidious threats.
Tags : 
"advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
McAfee
Published By: Riverbed     Published Date: Feb 26, 2015
The goal of understanding and managing service behavior remains elusive. Failure to adopt operational practices such as service portfolio management, process refinement, consolidation of tools, and consolidation of the organizational entities themselves explain most of the trouble.
Tags : 
service management, application visibility, operational practices, infrastructure, application monitoring, database monitoring, cloud performance management, network management
    
Riverbed
Published By: Datastax     Published Date: Apr 04, 2017
An an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet the company's business goals. Read this comprehensive guide to learn how all the key areas of database design, creation, security, object management, backup/recovery, monitoring and tuning, data migrations, and more - are carried out in a NoSQL database.
Tags : 
architect, guide, nosql, datastax
    
Datastax
Published By: VMTurbo     Published Date: Mar 25, 2015
An Intelligent Roadmap for Capacity Planning Many organizations apply overly simplistic principles to determine requirements for compute capacity in their virtualized data centers. These principles are based on a resource allocation model which takes the total amount of memory and CPU allocated to all virtual machines in a compute cluster, and assumes a defined level of over provisioning (e.g. 2:1, 4:1, 8:1, 12:1) in order to calculate the requirement for physical resources. Often managed in spreadsheets or simple databases, and augmented by simple alert-based monitoring tools, the resource allocation model does not account for actual resource consumption driven by each application workload running in the operational environment, and inherently corrodes the level of efficiency that can be driven from the underlying infrastructure.
Tags : 
capacity planning, vmturbo, resource allocation model, cpu, cloud era, it management, knowledge management, enterprise applications
    
VMTurbo
Published By: Microsoft Azure     Published Date: Apr 25, 2018
As you develop any app, database performance optimization is a critical consideration. Azure SQL Database, the intelligent cloud database from Microsoft, is designed to simplify your work as a developer and adapt to your workload so youre not left scrambling in pivotal moments. Read Intelligent Performance Optimization with Azure SQL Database for actionable ways to maximize the performance and optimization of your database at minimal cost. In this e-book, youll explore three perspectives on database performance: Dynamic resource scaling Database performance features Intelligent performance monitoring and tuning Get this free e-book today to ensure that your database has the resources it needs, makes the most of those resources, and constantly optimizes in the background for the best possible SQL performance.
Tags : 
    
Microsoft Azure
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
When a company creates a custom web application, it also creates a custom challenge. Traditional monitoring does not cover everything, but alerts if something goes wrong with the application are more important than ever. Learn the benefits of custom application monitoring and how NeoSpire can help. . Dramatically reduces the time to troubleshoot a failed web application . Provides complete overview of web transaction and web application performance, to proactively locate and fix bottlenecks in your web system . Improves customer experience and increase customer satisfaction with excellent performance of your web applications and e-business transactions . Eliminates the risk of loss of revenue and credibility . Increases the efficiency of mission-critical e-business operations and web applications
Tags : 
application monitoring, load balancing system, neospire, benefits of testing, hardware monitoring, disk utilization, memory utilization, cpu load
    
NeoSpire Managed Hosting
Published By: Oracle Corp.     Published Date: Oct 15, 2012
Steve Moyle, CTO of Oracle Database Firewall, explains the best practices for efficient database activity monitoring, alerting and blocking that can help prevent SQL injection attacks and other threats from reaching your enterprise databases.
Tags : 
oracle, sql injection, database activity monitoring, database security, it security, compliance, security management, infrastructure
    
Oracle Corp.
Published By: Dell Software     Published Date: Feb 20, 2014
Short: Discover how new cloud-based integration platforms dramatically speed results and lower costs in this informative white paper.
Tags : 
database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices, data management
    
Dell Software
Published By: Blue Medora     Published Date: Oct 24, 2016
Download this report to learn more about Blue Medora's new SELECTStar platform which provides new levels of visibility into the data tier that multiple tools can utilize.
Tags : 
blue medora, selectstar, data tier, database virtualization, data tier management, vmware, virtual monitoring consoles, data layer platform
    
Blue Medora
Published By: Intel Security     Published Date: Apr 06, 2016
This solution brief outlines how security operations must evolve to a continuous operation focused on assessing readiness, acquiring and integrating threat intelligence, and increasing the speed of threat response capability
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Explore and Understand the Seven Common Misconceptions Regarding Advanced Malware
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: Intel Security     Published Date: Apr 06, 2016
This guide examines seven common advanced malware misconceptions and distinguishes between myth and reality.
Tags : 
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection
    
Intel Security
Published By: McAfee     Published Date: Mar 07, 2013
Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organizations most sensitive data.
Tags : 
database security, database security compliance, database activity monitoring, access control, anti spyware, anti virus, application security, business continuity
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
HIPAA and HITECH require individually identifiable protected health information (PHI) be secured. The unfortunate reality for IT professionals is that these acts of Congress aren't prescriptive regarding what needs to be done about computer systems.
Tags : 
best database security solution, database activity monitoring, hipaa compliance, hitech compliance, phi, ephi, vulnerability manager for databases, anti spam
    
McAfee
Published By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : 
pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases, anti spam, anti spyware
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware
    
McAfee
Published By: Microsoft Carat APAC     Published Date: Dec 12, 2017
Web apps once thought impossible due to scale, complexity, or because they simply couldnt be imagined, are now a reality with the cloud. In this guide, weve explored the Azure App Service and highlighted Azures support for platform as a service (PaaS). Weve shown you how you can take an existing website backed by a SQL Server database and move it to the cloud. Youve seen how you can easily add features such as identity management and caching to your web app. Youve also learned that you can enable rich application monitoring with a few clicks.
Tags : 
code, business, optimization, scale, support, cloud, paas
    
Microsoft Carat APAC
Published By: McAfee     Published Date: Mar 08, 2013
Databases store companies most valuable information assets, but in most cases theyre poorly protected. Its important to secure databases as well as or better than other systems in the enterprise. But its not that simple.
Tags : 
real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security, anti spam
    
McAfee
Published By: NetIQ     Published Date: Jan 13, 2011
This white paper describes how to close this "compliance gap," emphasizing the complementary relationship between SIEM and database activity monitoring technologies, which, taken together, provide a comprehensive view for organizations and auditors to keep data more secure while continuing to address compliance requirements.
Tags : 
netiq, database activity monitoring, siem, compliance, audit, operating system, enterprise software, security
    
NetIQ
Published By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : 
ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring
    
IBM Corporation
Published By: Datastax     Published Date: Apr 04, 2017
For the new or veteran Database Administrator (DBA): As a DBA, perhaps youve seen database engines such as object-oriented and OLAP databases come and go, and youre wondering why NoSQL should be any different. You may ask questions like: What kinds of administration and management work does NoSQL entail? How are security, backup and recovery, database monitoring and tuning handled? How do I create databases, objects, and read/write data without SQL? Learn what NoSQL is, why its needed, and when its not.
Tags : 
dba, nosql, olap, datastax
    
Datastax
Published By: McAfee     Published Date: Feb 06, 2013
Protecting the valuable and confidential information stored within databases is vital for maintaining the integrity and reputation of organizations everywhere, and for ensuring regulatory compliance.
Tags : 
vulnerability management, database security, dbms security, database activity monitoring, virtual patching, virtual patching for databases, anti spam, anti spyware
    
McAfee
Start   Previous   1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.