334 Results for:DB2
- Sort by:
HP Security Voltage's SecureData Enterprise: Product overview
27 Oct 2015Expert Ed Tittel examines SecureData Enterprise, which is a part of the HP Security Voltage platform, a scalable database security product that encrypts both structured and unstructured data, tokenizing data to ... Read More
Use Amazon EMR with Apache Airflow to simplify processes
01 Feb 2021Explore Amazon EMR, looking at use cases such as MapReduce and integration with Hadoop. Then, see how it works with Apache Airflow and learn how to get started. Read More
Druva expands on AWS backup, moves S3 snaps across regions
04 Dec 2019In response to customers' expanding AWS footprint, Druva added new backup features to CloudRanger, which it acquired in 2018 for protection of data stored in AWS. Read More
Three types of mainframe monitoring tools to track performance
14 Jul 2016Mainframe users face a variety of options when it comes to system monitoring tools. Determine if a real-time, near-time or post-processor tool is the best fit for your IT needs. Read More
Imperva SecureSphere: Database security tool overview
25 Oct 2015Expert Ed Tittel examines Imperva SecureSphere Database Activity Monitoring and Database Assessment, products that are deployed as an inline bridge or as a lightweight agent to assess and monitor local database ... Read More
In-memory databases - what they do and the storage they need
28 May 2014In-memory databases offer high performance data processing, but how do you protect data in volatile DRAM and what kind of storage is needed for longer term retention? Read More
VMware Boxer’s new FastSync tech could usher in a better third-party email experience
09 Jul 2019Jon Towles explains how VMware Boxer uses key escrow to solve this long-time problem in a thoughtful and secure way. Read More
Exploring the features of Oracle Enterprise Manager 13c
08 Jul 2016Cloud Control, a feature of Oracle Enterprise Manager 13c, can be used to monitor and manage databases, middleware, infrastructure and hardware running on-premises or in the cloud. Read More
Top static malware analysis techniques for beginners
30 Aug 2021Malware will eventually get onto an endpoint, server or network. Using static analysis can help find known malware variants before they cause damage. Read More