Title | Summary | File | |
---|---|---|---|
Turbocharge Your Database Auditing with Oracle Unified Auditing |
Unified Auditing was introduced with the release of Oracle 12c and changes how Oracle database auditing and logging is accomplished. In... |
Security Resources | File |
Is Your Sensitive Data Playing Hide and Seek with You? |
Your Oracle databases and ERP applications may contain sensitive personal data like Social Security numbers, credit card numbers, addresses, date... |
Whitepapers and Presentations | File |
Guide to PeopleSoft Logging and Auditing |
Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy... |
Whitepapers and Presentations | File |
Fine Grained Auditing (FGA) and Protecting Oracle E-Business PII Data for Executives |
With the recent news about yet another database breach of Personally Identifiable Information (PII), Integrigy had a discussion with a client... |
Oracle Security Blog | |
Oracle Audit Vault and Compliance Reporting |
The Oracle Audit Vault has seeded reports for the following compliance and legislative requirements – no additional license is required. ... |
Oracle Security Blog | |
Oracle E-Business Logging and Auditing: PCI, SOX, HIPAA, 27001 and FISMA |
Continuing this blog series on Oracle E-Business logging and auditing, Integrigy’s log and audit framework is based on our consulting experience.... |
Oracle Security Blog | |
Guide to Auditing and Logging in the Oracle E-Business Suite |
Webinar: The auditing and logging capabilities within the Oracle E-Business Suite and Oracle Database are sophisticated and able to satisfy most... |
Security Resources | File |
Protecting Sensitive Data in Oracle E-Business Suite |
To protect sensitive data, like Social Security numbers, in Oracle E-Business Suite environments, numerous Oracle technologies and third-party... |
Security Resources | File |
Integrigy Guide to Auditing and Logging in Oracle E-Business Suite |
Most Oracle E-Business Suite implementations do not fully take advantage of the auditing and logging features. These features are sophisticated... |
Security Resources | File |