IBM lets users test drive SOA-tuned DB2
IBM is offering users the chance to test drive Viper, the next version of its DB2 database server. The software can be downloaded from the IBM website.
IBM is offering users the chance to test drive Viper, the next version of its DB2 database server. The software can be downloaded from the IBM website.



From forensic cyber to encryption: InfoSec17
Security technologist Bruce Schneier’s insights and warnings around the regulation of IoT security and forensic cyber psychologist Mary Aiken’s comments around the tensions between encryption and state security were the top highlights of the keynote presentations at Infosecurity Europe 2017 in London.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
The database has been tuned to support service oriented architectures, IBM said.
Among the SOA-tuned security features introduced in Viper will be DB2 Label Based Access Control, a new approach to defining structures within the database. In addition to row-level access control, the column-level labelling capability provides an alternative way to control access to sensitive data stored within the database.
Viper also offers a data row compression feature that could save users disc space - useful in large datawarehousing environments - and supports XQuery, an emerging industry standard language designed for processing XML data.
XML eliminates the need to install and maintain separate database environments for relational data and XML data, and maintain digital signatures for them, IBM said.
DB2 Viper is scheduled for release in mid-2006.
Read more on IT risk management
-
Why businesses must think like criminals to protect their data
-
Security Think Tank: Use awareness, education and controls to halt cryptojacking
-
Security Think Tank: Awareness is a good starting point to counter fileless malware
-
Security Think Tank: Human, procedural and technical response to fileless malware
Start the conversation
0 comments