REGISTER

Data Management

IDERAtn pdf Download (3.61 MB)

Clear guidance on best practices for managing tempdb to provide the optimum balance between performance, reliability, and manageability.

HPE default Download

Hadoop is a unique architecture designed to enable organizations to gain new analytic insights and operational efficiencies through the use of multiple standard, low-cost, high-speed, parallel processing nodes operating on very large sets of data. The resulting flexibility, performance, and scalability are unprecedented. But data security was not the primary design goal.

HPE pdf Download (932 KB)

HPE SecureData includes next generation technologies, Hyper Format-Preserving Encryption (FPE), Hyper Secure Stateless Tokenization (SST), HPE Stateless Key Management, and data masking. HPE SecureData “de-identifies” data, rendering it useless to attackers, while maintaining its usability, usefulness, and referential integrity for data processes, applications and services. HPE SecureData neutralizes data breaches by making your protected data absolutely worthless to an attacker, whether it is in production, analytic systems, or test/development systems, such as training and quality assurance.

HPENeutralize data breaches: a new breed of cyber attacks—advanced malware, exploitation networks, and motivated insiders—are stealing sensitive data from vulnerable ecosystems. But companies can neutralize data breaches by rendering the data valueless, de-identifying data through encryption, tokenization, and data masking.

HPE pdf Download (1010 KB)

This document introduces a unique approach from HPE SecureData that combines data encryption and masking technology in one, which can vastly simplify data privacy, while mitigating data leakage at a fraction of the cost of prior approaches. One fundamental technology is HPE Format-Preserving Encryption (FPE), which for the first time, allows encryption ‘in place’ in databases and applications, without significant IT impact. Another technology is tokenization, which replaces data with random tokens, and which can also preserve data formats. These technologies are integrated with masking techniques on the HPE SecureData Platform, allowing projects that once lasted months or years to complete in days to weeks.

HPE default Download

With information in the Cloud, suddenly a new team of people has access to your data. At every turn, they are working hard to protect, tackle, and block access to sensitive data in ‘your’ infrastructure. In fact, to protect your data in the Cloud, several of the fundamental building blocks of a secure enterprise IT infrastructure have to be re-envisioned.

Top_10_WAF

Web application firewalls protect data and applications against online threats. Because Web application firewalls are strategic, every organization must carefully evaluate their security, management, and deployment capabilities. This paper explains in detail the 10 features that every Web application firewall must provide.

HPE pdf Download (6.32 MB)

Complying with new and multifaceted regulations can be a challenge for your business. At HPE, we break down all aspects of GDPR into modules. Read through and pick and choose the solutions you need to cover your business, all provided with our quality and expertise as standard.

HPE default Download

Key management for encryption applications creates manageability risks when security controls and operational concerns are not fully realized. Various approaches to managing keys are discussed with the impact toward supporting enterprise policy.

CyberEdge

What are the emerging cyberthreats that companies should be most concerned about? How do you overcome the organizational barriers that inhibit IT security? Read the "2015 Cyberthreat Defense Report" to learn what matters most to the over 800 North American and European IT security decision makers surveyed.

HPE pdf Download (6.32 MB)

GDPR is the biggest shake-up in European data protection legislation for 30 years. Organizations have less than two years to ensure that their data protection processes are compliant. Most organizations will struggle to meet the May 25, 2018 deadline.

HPE default Download

HPE Enterprise Secure Key Manager (ESKM) and HPE SecureData along with HPE Helion enable enterprises to extend data to the cloud computing solutions with a high level of security assurance.

Imperva

Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. Worse, widespread lack of Big Data security expertise spells disaster. These threats are real. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.

Log in Register

Please Login to download this file

Username *
Password *
Remember Me
Go to top