Integrigy is a thought leader in ERP application and datatabase SOX compliance. Our consultants are frequent speakers and contributors on the technical aspects of securing, auditing, and general controls required for SOX compliance. AppSentry has predefined policies, audits, and reports to help corporations identify general and application controls weaknesses and deficiencies within ERP application and database implementations. For more information, see our following whitepapers and presentations related to SOX -
Related Content
Title | Summary | File | |
---|---|---|---|
Security Resources | Implementing Two-Factor Authentication (2FA/MFA) for Oracle E-Business Suite | Two-factor authentication (2FA) or multi-factor authentication (MFA) is an extra layer of security to ensure that users accessing an application are who they say they are. Using 2FA with Oracle E-Business Suite (EBS) can provide security as well as... | File |
Security Resources | Turbocharge Your Database Auditing with Oracle Unified Auditing | Unified Auditing was introduced with the release of Oracle 12c and changes how Oracle database auditing and logging is accomplished. In previous releases of Oracle, there were separate audit trails for each individual component. Unified... | File |
Whitepapers and Presentations | Oracle E-Business Suite Security for Auditors | Auditors are trained to understand the financial aspects and the end user functionality of Oracle E-Business Suite. However, most auditors have not been trained in the security features and technical aspects of Oracle E-Business Suite. This... | File |
Oracle Security Blog | Upcoming Webinar: Oracle E-Business Suite Security for Auditors | Oracle E-Business Suite Security for Auditors Thursday, December 17, 2020 - 2:00 pm to 3:00 pm EST Auditors are trained to understand the financial aspects and the end user functionality of Oracle E-Business Suite. However, most auditors have... | |
Security Resources | Eight Key Components of a Database Security Risk Assessment | To truly secure database environments, periodic security risk assessments should be performed for database environments to review and assess the processes, operations, resources, and technology to identify security risks, issues, and weaknesses.... | File |
Whitepapers and Presentations | Effective Oracle E Business Suite Change Management from DBA to Auditor | For the Oracle E-Business Suite, change management is challenging as the application and technology stack are open and flexible. Changes may be made at many different layers and to a large of number of types of objects and components. ... | File |
Security Resources | Effective Auditing and Logging in Oracle E-Business Suite | The auditing and logging capabilities within the Oracle E-Business Suite and Oracle Database are sophisticated and able to satisfy most organizations' security and compliance requirements. However, the auditing and logging setup and usage of... | File |
Security Resources | Integrigy Guide to Auditing and Logging in Oracle E-Business Suite | Most Oracle E-Business Suite implementations do not fully take advantage of the auditing and logging features. These features are sophisticated and are able to satisfy most organization’s compliance and security requirements. This guide presents... | File |
Whitepapers and Presentations | Guide to PeopleSoft Logging and Auditing | Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy most organization’s compliance and security requirements. The default PeopleSoft installation,... | File |
Oracle Security Blog | Oracle Discoverer Security Alert - High impact to SOX Compliance and Financial Reporting | For those clients using Oracle Discoverer, especially those using Discoverer with the Oracle E-Business Suite for financial reporting, the October 2016 Oracle Critical Patch Update (CPU) include a high-risk vulnerability reported by Integrigy... |