More in Database Security

  • scary ghoul
    Oct 31, 2013

    SQL Injection: Something Really Scary 1

    As far as I'm concerned we'll likely always have SQL Injection around to haunt us. Even though this attack vector has been well-publicized and well-documented for well over a decade (and then some), failure to account for it continues to pop all the time—even in catastrophic places....More
  • Sep 30, 2013

    SQL Server Authentication on Internet Facing Servers

    If you’ve got a SQL Server that's publicly facing, make sure you've done everything you can to make it as secure as possible....More
  • Dec 18, 2012

    SQL Server and Anti-Virus

    Every once in a while, one of my SQL Server Consulting clients asks me for my opinions about running Anti-Virus on production SQL Servers. And, amazingly enough, I actually (personally feel and) argue that anti-virus really shouldn’t be run in production data centers....More
  • computer keyboard with red backup key
    Jan 2, 2012

    Off-Box Backups and Luke-Warm Standby Servers, Part III

    Just having copies of your SQL Server backups in secondary/remote locations is not a disaster recovery plan....More
  • standby button
    Dec 23, 2011

    Off-Box Backups and Luke-Warm Standby Servers – Part II 1

    Following up on my previous post, when it comes to the need to create off-box backups, there are really only two (well, three) main reasons you’d want to do Off-Box Backups: Three Primary Reasons for Off-Box Backups First: Redundancy. As I pointed out in my last post: If you’re only keeping backups and data on the same server or hardware, then you’re DOING IT WRONG....More
  • screenshot of Back Up Database - SSV3
    Dec 13, 2011

    Off-Box Backups and Luke-Warm Standby Servers – Part I

    SQL Server’s RESTORE statement is insanely powerful. Not only because of the obvious fact that it can be handy in a disaster (when you have regular backups in place), but because it’s also so incredibly versatile....More
  • Sep 30, 2011

    Staying Safe from the Coming Storm

    Hackers have been taking advantage of Graphical Processing Units (GPUs or Video Cards) for some time now to leverage their ‘massively parallel’ processing power as a way to much more efficiently attempt password cracking. To that end, it’s no surprise that hackers can use modern GPUs to generate literally billions of password ‘guesses’ per second....More
  • Boxer with red boxing gloves
    Feb 20, 2011

    Dynamic SQL vs. OPTION (RECOMPILE)

    Is it better to use OPTION (RECOMPILE) rather than dynamic SQL? Both options are likely to recompile each time, and forcing recompilation with OPTION (RECOMPILE) doesn’t have the security implications of dynamic string execution....More

From the Blogs
Sep 15, 2016

Power BI Desktop “Publish to Pyramid Server” Button

Many organizations today cannot use public cloud solutions because of security concerns, administrative challenges and functional limitations. However, they still need a centralized platform where end users can conduct self-service analytics in an IT-enabled environment....More
Jul 6, 2016

Using BI Office Together with Microsoft Power BI Desktop to Unlock Business Insights

It is crucial to move away from data and analytics stored on individual desktop computers. Today’s solutions must promote holistic, collective intelligence. The strong, continued alliance between Microsoft and Pyramid Analytics helps make all this possible....More
Jul 6, 2016

Why It’s Important to Unlock Business Insights Trapped on Individual Desktops

To become a truly data-driven enterprise, many business leaders recognize that they must extend the capabilities of self-service business intelligence (BI) and analytics to more of their business users. Many BI tools tackle part of this need, but they don’t offer a complete enterprise solution....More

Sponsored Introduction Continue on to (or wait seconds) ×