Database activity monitoring

Results: 149



#Item
141Security / Information technology management / Database activity monitoring / Operating system / File system / Security information and event management / Telecommunications data retention / Computer file / Information technology audit / Computing / Computer security / Data security

Whitepaper Auditing Unstructured Data Identity-Aware Storage, File Activity Monitoring, and Compliance Reporting Across Platforms • ...

Add to Reading List

Source URL: www.criticism.com

Language: English - Date: 2012-03-30 15:07:14
142Data security / Data management / Database activity monitoring / File system / Relational database management systems / Security information and event management / Database / Vormetric / Linoma Software / Software / Computing / Database management systems

Monitoring Unstructured Data

Add to Reading List

Source URL: www.criticism.com

Language: English - Date: 2012-03-30 15:07:12
143Software / Database management systems / Cross-platform software / Brands / IBM InfoSphere / Database audit / IBM DB2 / Infosphere / Database activity monitoring / Relational database management systems / Data management / Computing

IBM Software InfoSphere Guardium Healthcare Industry Case Study Data Security and

Add to Reading List

Source URL: www.touchworld.com

Language: English - Date: 2011-07-27 16:04:11
144IBM DB2 / Raz-Lee / Database activity monitoring / Computing / McAfee / Companies listed on the New York Stock Exchange / Software

FOR IMMEDIATE RELEASE Raz-Lee Security Completes Integration with McAfee Database Activity Monitoring and McAfee Enterprise Security Manager Integration driven by joint customers’ needs for increased interoperability

Add to Reading List

Source URL: razlee.com

Language: English - Date: 2013-12-24 10:30:14
145Videotelephony / Infrastructure optimization / Computing / Technology / Electronic engineering / Database activity monitoring / IBM cloud computing / Information technology management / Cisco Systems / Deep packet inspection

ac White Paper Accelerating Transformation with an Application-centric Approach

Add to Reading List

Source URL: www.cisco.com

Language: English
146Information security / Ring / Public safety / Computing / Privileged Identity Management / Database activity monitoring / Computer security / Security / Privilege

Microsoft Word - Raytheon Privileged User Abuse FINAL1.docx..docx

Add to Reading List

Source URL: www.trustedcs.com

Language: English - Date: 2014-05-19 11:50:43
147Computing / Information technology management / System administration / Security information and event management / Security event manager / Sensage / LogLogic / ArcSight / Database activity monitoring / Computer security / Data security / Security

Magic Quadrant for Security Information and Event Management Gartner RAS Core Research Note G00167782, Mark Nicolett, Kelly M. Kavanagh, 29 May 2009, R3085[removed]

Add to Reading List

Source URL: www.emc.com

Language: English
148Database management systems / Cyberwarfare / SQL / SQL injection / Stored procedure / Vulnerability / Web application security / Microsoft SQL Server / Database activity monitoring / Computing / Relational database management systems / Data management

PDF Document

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2009-06-22 10:34:04
149Secure communication / Computer security / Computing / Backup software / Database activity monitoring / Backup / Password / Database / Data breach / Security / Data security / Computer network security

PDF Document

Add to Reading List

Source URL: www.nyoug.org

Language: English - Date: 2010-02-07 09:53:59
UPDATE