November 2009 - (Free Research) Corporate databases are in constant danger. Outside criminals can exploit web applications and employees with malicious intent present an even greater threat. This webcast traces the steps involved in breaking into a database and presents a reference architecture and checklist for implementing iron-clad database security measures.
December 2008 - (Free Research) In most organizations, employee compensation and related expenses are the largest line items in the budget. Having control over these expenses is critical to meeting corporate performance objectives. Check out this data sheet to learn more.
August 2011 - (Free Research) Too many enterprise databases are leaking sensitive information. Yet the solution to these problems is simple: user education, coupled with a new breed of database activity monitoring tools. This e-guide provides guidelines for establishing a data protection framework and teaching the right way to handle data.
June 2008 - (Free Research) Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation.
April 2009 - (Free Research) Find out how Embarcadero's DB Optimizer can help you to quickly discover and fix problematic SQL statements that can cause performance bottlenecks in your database. DB Optimizer gives you the flexibility of using a single easy-to-use IDE to test, profile and tune SQL.
February 2009 - (Free Research) Many organizations that rely on desktop solutions to house data are frustrated with their lack of flexibility and scalability. This paper shows how online databases are an alternative to desktop products, combining speed and ease of use with the collaborative functions required to power organizations' unique business processes and performance.
March 2010 - (Free Research) In this white paper we will provide a general overview of Any Connection Reporting. We will then look at specific applications of this technology and see how organizations can use it to solve problems 3G, connectivity plans and so much more.
February 2012 - (Free Research) With proper business intelligence (BI) tools, human resources (HR) is empowered to gain insight into the company's workforce and thus improve overall business efficiency and financials. Read this e-guide for tips on making the most of your workforce data to make educated business decisions.
July 2008 - (Free Research) Lean manufacturing is a philosophy committed to the total elimination of waste. There are seven types of waste that plague manufacturing. Shop Floor Execution (SFX) can help minimize or eliminate all of them.
August 2008 - (Free Research) Read this whitepaper to learn 10 Key Steps to Effective Succession Planning. It also discusses best practices, replacement planning, talent pools, and the aging workforce.
June 2010 - (Free Research) Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
September 2008 - (Free Research) The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
January 2012 - (Free Research) In this week’s Computer Weekly, we mark the 10th anniversary of Microsoft’s Bill Gates announcing the Trustworthy Computing initiative, and ask if it has made IT more secure. We look at what Oracle’s latest developments mean for its software users running rivals’ servers, and conclude our Buyer’s Guide to IT consumerisation. Download the issue now.
February 2008 - (Free Research) Attend this live Webcast with Forrester Principal Analyst Noel Yuhanna to learn about best practices for protecting enterprise data from both external hackers and insiders such as privileged users and disgruntled employees.
May 2013 - (Free Research) Are you inviting cybercriminals to attack by neglecting needed patches or attempting to manage the patch effort in house? This white paper looks at how cybercriminals are utilizing weaknesses in trusted applications to distribute malware, as well as challenges in trying to track and patch such weaknesses, such as resources, cost, and accuracy.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.