SAP Security Reports

How To Build A Micro-segmentation Strategy
sponsored by Illumio
WHITE PAPER: Download this white paper to learn how to build an effective micro-segmentation strategy including identifying high-value assets, mapping your application dependencies and enrich with vulnerability data, understanding the types of segmentation for security, and more.
Posted: 28 Dec 2021 | Published: 04 Mar 2021

Illumio

Expert tips and considerations for database appliances
sponsored by Delphix
EGUIDE: This e-guide from SearchCIO.com takes a look at one organization's quest to find the right database appliance that suited their needs. Read now for an in-depth analysis of current database appliance offerings, as well as relevant considerations for database security.
Posted: 14 Dec 2012 | Published: 14 Dec 2012

Delphix

Presentation Transcript: Disaster Recovery Planning and Security for the IT Industry
sponsored by IBM
PRESENTATION TRANSCRIPT: The biggest security issues are the ones that you don’t know about – and the reality is many businesses don’t truly know where they stand. Check out this presentation transcript from a SearchDisasterRecovery.com webcast to learn about today’s biggest security concerns and best practices for protecting your IT center.
Posted: 17 May 2011 | Published: 17 May 2011

IBM

Employing IBM Database Encryption Expert to meet encryption and access control requirements for the Payment Card Industry Data Security Standards (PCI DSS)
sponsored by IBM
WHITE PAPER: This white paper explores the challenges of compliance with PCI and how organizations must take a holistic approach to protecting and securing their business-critical information.
Posted: 27 Jul 2011 | Published: 27 Jul 2011

IBM

Is your data as well protected as it should be?
sponsored by Informatica
WHITE PAPER: Read this exclusive white paper now to discover the big data security tool capable of significantly reducing the risk of a data breach, while helping organizations comply with data regulations and policies.
Posted: 07 May 2014 | Published: 30 Nov 2012

Informatica

IBM InfoSphere Guardium Data Sheet: Managing the Entire Database Security and Compliance Lifecycle
sponsored by IBM
WHITE PAPER: As hacker attacks become more and more frequent, a comprehensive security plan has become of critical importance.  Inside this white paper, learn which security strategies are right for your company. Uncover information about an approach that offers real-time alerts, audit and reporting tools and much more.
Posted: 02 Aug 2011 | Published: 02 Aug 2011

IBM

MicroScope – December 2022: Dealing with rising prices
sponsored by MicroScope
EZINE: With prices rising, many are looking at what costs to cut – yet in the channel, the opposite might prove for better business. In this issue, read about how to navigate the cost issue, learn about the growing area of security, and learn about how to create a more appealing employment experience to attract talent
Posted: 01 Dec 2022 | Published: 02 Dec 2022

MicroScope

The Enterprise Guide to SAP HANA's Cloud Models and Migration Checklist
sponsored by UXC Oxygen and Amazon Web Services
EGUIDE: If you're considering HANA but are unsure about SAP's models of cloud computing, you'll want to fully outline your deployment options before migration. Discover three options for cloud-based HANA, as well as 6-point checklist for crafting a successful cloud migration strategy.
Posted: 07 Nov 2016 | Published: 28 Oct 2016

UXC Oxygen and Amazon Web Services

Navigating VMware and Cloud Backups
sponsored by Clumio
EGUIDE: VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.
Posted: 31 Jan 2020 | Published: 29 Jan 2020

Clumio

SearchSecurity.com E-Guide: Database Security Best Practices: Tuning database audit tools
sponsored by IBM
EGUIDE: Auditing is a key component to security and compliance, and a widely accepted practice by IT operations. In this expert tip, you’ll find an in-depth overview of the tools required to create and collect successful database audits, as well as a set of best practices for tuning audit tools.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM