Security en Cloning Security Objects Between Servers <div class="node-body article-body">Looking to avoid issues with SID mis-match, password synchronization, orphaned logins, and missing server role membership with working with test, UAT, dev, or training instances of your SQL Servers? Read on for how to make this process much easier between instances of SQL Server.</div> <p><a href="" target="_blank">read more</a></p> Security cloning login password script server roles sp_help_hexadecimal sp_help_revlogin SQL Server user Mon, 10 Jul 2017 11:22:00 +0000 35471 at SQL Server Backup: Challenges, Best Practices and Instant Data Recovery <div class="field-deck"> Sponsored by: IDERA </div> <div class="node-body article-body">Available Now On Demand</div> <p><a href="" target="_blank">read more</a></p> Backup and Recovery Business Resources Tue, 20 Jun 2017 23:18:00 +0000 35481 at Identifying SQL Server Logins without Default Database Users <div class="node-body article-body">Have you run into a connection issue in SQL Server where you have a valid login and password yet still can't connect to the database? It may be because your login doesn't have a user assignment in its default database (whether that this the database you're querying or not.) Read on to see how this happens and how to identify and correct it.</div> <p><a href="" target="_blank">read more</a></p> Security connection default database login Microsoft SQL Server missing problem user Mon, 16 Jan 2017 19:20:00 +0000 34641 at Querying Secure Information from a Restored Master Database Backup <div class="node-body article-body">I was recently asked if it was possible to get security information from a restored copy of the SQL Server master database. This article touches on just how easy it is to get information about that and other things from a restored copy of master and without rights in the original master database.</div> <p><a href="" target="_blank">read more</a></p> Security Microsoft SQL Server copy database login master restore security SQL Server Thu, 29 Dec 2016 17:08:00 +0000 34601 at Seven Essential Questions Board Members Need to Be Asking About Data Security <div class="node-body article-body">This eBook helps board members get a handle on their organization’s risk profile.</div> <p><a href="" target="_blank">read more</a></p> Security Business Resources Sun, 01 May 2016 17:49:00 +0000 32171 at Data-Centric Security: The Only Solution to Keep Sensitive Data Safe <div class="node-body article-body">This eBook explains why detecting and protecting sensitive data at the data (or element) level is the only way to keep it safe as organizations consume and expand access to more data across the enterprise. </div> <p><a href="" target="_blank">read more</a></p> Security Business Resources Sun, 01 May 2016 17:49:00 +0000 32181 at Why Traditional Security Tools Can't Keep Pace with Big Data <div class="node-body article-body">This easy-to-read eBook explains why traditional security tools can’t keep big data safe, leaving enterprises at risk.</div> <p><a href="" target="_blank">read more</a></p> Security Business Resources Sun, 01 May 2016 17:49:00 +0000 32191 at What's Different About Big Data? <div class="node-body article-body">This eBook examines four critical ways that data in Hadoop is different from data in traditional storage and management models, and why companies can no longer be certain that their data will be clean, structured, regulated, or trustworthy.</div> <p><a href="" target="_blank">read more</a></p> Security Business Resources Sun, 01 May 2016 17:49:00 +0000 32201 at Data Breaches and Insider Threats <div class="node-body blog-body"><p>I&rsquo;ll sound a bit like Captain Obvious for bringing this up, but it&rsquo;s important to remember that security encompasses a lot more than protecting sensitive data from the specter of outsider threats like hackers. Properly implemented security policies also account for threat-models that include insiders &ndash; or people within your organization.</p></div> <p><a href="" target="_blank">read more</a></p> Security Microsoft SQL Server data breaches data breaches security security Threat Modeling Threat Modeling Practical SQL Server Tue, 29 Sep 2015 19:02:00 +0000 26121 at VMware Encryption - 9 Critical Components of a Defensible Encryption Strategy <div class="node-body article-body">VMware may be a top-tier cloud computing and virtualization provider, but the security of sensitive data stored and processes on VMware virtual machines and in vCloud is still a concern for many VMware customers. Read this whitepaper to learn the nine critical components of a defensible encryption strategy that will allow you to achieve comprehensive data security.</div> <p><a href="" target="_blank">read more</a></p> Security Business Resources Sat, 28 Mar 2015 17:56:00 +0000 24051 at