Sort
Stop with vendor that do not publish history, errors in description or any change in their Alerts! We handle all modifications in our database and let you acces it on a useful way, to really understand what's going on! For the last 6+ years, we have built an Accurate Vulnerability Database with multiple Sources, Vendors & Open Standards and Exploits, all based on private algorithm and US...
Rank
1
Vote
Sponsor
0.0
Unified Database Security Providing greater security and compliance by utilizing a patented reverse proxy technology for securing... Providing greater security and compliance by utilizing a patented reverse proxy technology for securing databases across multiple platforms including: Database as a Service (DBaaS), private, public or hybrid cloud environments and on-premises. Offering...
Rank
2
Vote
Sponsor
0.0
All Oracle E-Business Suite implementations that "store, process, or transmit cardholder data" must comply with Payment Card Industry (PCI) Data Security Standard 3.0 regardless of size or transaction volume. The PCI Data Security Standard (DSS) 3.0... A quick reference guide for securing the...
Rank
3
Vote
Sponsor
0.0
As Featured on "Manufacturing Marvels" on FOX Business Network Data Security, Inc. is the world’s leading manufacturer of electronic information disposal equipment. Based in Lincoln, Nebraska, we design, manufacture and retail specialized equipment that keeps private information, private. Our...
Rank
4
Vote
Sponsor
0.0
Securase is fast and easy. No technical or skills are required to Remove Local Security from local NSF database. Use Securase software to perform Local Security Setting Removal, or if you are trying to open NSF Database showing "You are not authorized to access that database." error. It is easy...
Rank
5
Vote
Sponsor
0.0
CIS is a forward-thinking, nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threat. The Multi-State Information Sharing and Analysis Center (MS-ISAC) is the focal point for cyber threat prevention, protection response and recovery for U.S. State, Local, Tribal and Territorial government entities. CIS is home to the...
Rank
6
Vote
Sponsor
0.0
Data Protection Platform is the only comprehensive solution for cloud backup, archive, disaster recovery, and file sharing. Data Security for SharePoint's File, Web and Database Resources Microsoft SharePoint provides easy access to business-critical data through intranet, extranet, and public-facing applications. So when that information is sensitive or regulated, security is a major concern....
Rank
7
Vote
Sponsor
0.0
Several DB2 Security Services (Consulting, Audit,...) and Solutions provided by Blue-Database-Security. Blue-Database-Security is specialized in DB2 security only. This specialization helps to develop a deep knowledge and to provide better services and solutions for our customers. All our employees are working since several years with various DB2 technologies as developer and DBA. DB2 training...
Rank
8
Vote
Sponsor
0.0
Several Oracle Security Services (Consulting, Audit,...) and Solutions provided by Red-Database-Security GmbH. Repscan for Oracle - Repscan helps to find and identify modification in the repository (e.g. caused by database rootkits). Repscan is one of the leading and most accurate vulnerability scanners for Oracle databases. With Repscan it is possible to scan hundreds of databases without...
Rank
9
Vote
Sponsor
0.0
Pete Finnigan - Oracle security Services, Training and software products. Data targeted for theft is often the sort of data that will be used by your business and be stored in your Oracle databases. Recent surveys have also shown that the number of internal breaches of security in those companies and organisations polled has increased so that internal breaches now exceed external breaches by a...
Rank
10
Vote
Sponsor
0.0
Discover Database Journal for all of your database professional needs. Offers daily database news, articles, and tutorials for major databases including Oracle, SQL Server, DB2, and MS Access. Deploying IaaS solutions in Microsoft Azure offers benefits that leverage agility, resiliency, and scalability built into the underlying platform. However, when dealing with business-critical workloads,...
Rank
11
Vote
Sponsor
0.0
My name is Chip Andrews and I've got a confession to make. I need to finally admit that I've left Windows behind which means that SQL Server is no longer my primary research target from a security perspective. I've been running Linux for a few years and Windows only virtually and rarely. Lately, rarely has become "not at all". Because of that, my SQL Server security research activities have...
Rank
12
Vote
Sponsor
0.0
Online security services and security database products providing clients with maximum protection, we revolutionise internet security. ZenithSecure provides the full array of consulting and services for small, medium and large organizations to ensure their business continuity. We will perform comprehensive and systematic analysis of your company processes, server infrastructure, code and...
Rank
13
Vote
Sponsor
0.0