For IT security, Integrigy provides the necessary database and ERP application security expertise both in our products and through our consulting services. AppSentry allows IT Security to perform in-depth security reviews often not performed due to a lack of skills or focus. Integrigy Consulting performs on-site or remote security assessments to ensure databases and ERP applications are secure.
Related Content
Title | Summary | File | |
---|---|---|---|
Security Resources | WebLogic Vulnerabilities - PeopleSoft Impact (CVE-2020-14882 and CVE-2020-14750) | [[{"fid":"330","view_mode":"default","fields":{"format":"default","alignment":""},"link_text":null,"type":"media","field_deltas":{"1":{"format":"default","alignment":""}},"attributes":{"class":"media-element file-default","data-delta":"1"}}]]As part... | File |
Security Resources | WebLogic Vulnerabilities - Oracle E-Business Suite Impact (CVE-2020-14882 and CVE-2020-14750) | As part of the Oracle October 2020 Critical Patch Update (CPU), two critical vulnerabilities were fixed in the Oracle WebLogic web application server (CVE-2020-14882/CVE-2020-14883) that allow an unauthenticated attacker to compromise the server.... | File |
Security Resources | Eight Key Components of a Database Security Risk Assessment | To truly secure database environments, periodic security risk assessments should be performed for database environments to review and assess the processes, operations, resources, and technology to identify security risks, issues, and weaknesses.... | File |
Security Resources | Integrigy Guide to Auditing and Logging in Oracle E-Business Suite | Most Oracle E-Business Suite implementations do not fully take advantage of the auditing and logging features. These features are sophisticated and are able to satisfy most organization’s compliance and security requirements. This guide presents... | File |
Security Resources | Oracle E-Business Suite: Credit Cards and PCI Compliance | All Oracle E-Business Suite implementations that "store, process, or transmit cardholder data" must comply with Payment Card Industry (PCI) Data Security Standard 3.0 regardless of size or transaction volume. The PCI Data Security Standard (DSS) 3.0... | File |
Oracle Security Blog | OBIEE Security: Catalogs, Access Control Lists and Permission Reports | The presentation catalog (Web Catalog) stores the content that users create within OBIEE. While the Catalog uses the presentation layer objects, do not confuse the presentation layer within the RPD with the presentation catalog. The presentation... | |
Oracle Security Blog | Oracle E-Business Suite Security, Java 7 and Auto-Update | Maintaining a secure Oracle E-Business Suite implementation requires constant vigilance. For the desktop clients accessing Oracle E-Business Suite, Integrigy recommends running the latest version of Java 7 SE. Java 7 is fully supported by... | |
Oracle Security Blog | Kerberos Authentication for Oracle - Benefits and Recommendations | Kerberos authentication support in the Oracle Database is now included with all editions of the Oracle Database. Previously, Kerberos authentication required an Oracle Advanced Security Option license. Since this licensing change, we... | |
Oracle Security Blog | Oracle E-Business Suite Security - Signed JAR Files - What Should You Do | Until recently the Oracle E-Business Suite allowed self-designed certificates to assure the validity of Java code run within end-users’ browsers. This meant that the Java JAR files downloaded from the middle tier server were tested by the end-user’s... | |
Oracle Security Blog | OBIEE Security: Usage Tracking, Logging and Auditing for SYSLOG or Splunk | Enabling OBIEE Usage Tracking and Logging is a key part of most any security strategy. More information on these topics can be found in the whitepaper references below. It is very easy to setup logging such that a centralized logging solution such... |