Title | Summary | File | |
---|---|---|---|
Turbocharge Your Database Auditing with Oracle Unified Auditing |
Unified Auditing was introduced with the release of Oracle 12c and changes how Oracle database auditing and logging is accomplished. In... |
Security Resources | File |
Oracle E-Business Suite Security for Auditors |
Auditors are trained to understand the financial aspects and the end user functionality of Oracle E-Business Suite. However, most auditors have... |
Whitepapers and Presentations | File |
Upcoming Webinar: Oracle E-Business Suite Security for Auditors | Oracle Security Blog | ||
Implementing Two-Factor Authentication (2FA/MFA) for Oracle E-Business Suite |
Two-factor authentication (2FA) or multi-factor authentication (MFA) is an extra layer of security to ensure that users accessing an application... |
Security Resources | File |
Eight Key Components of a Database Security Risk Assessment |
To truly secure database environments, periodic security risk assessments should be performed for database environments to review and assess the... |
Security Resources | File |
Effective Oracle E Business Suite Change Management from DBA to Auditor |
For the Oracle E-Business Suite, change management is challenging as the application and technology stack are open and flexible. Changes may... |
Whitepapers and Presentations | File |
Effective Auditing and Logging in Oracle E-Business Suite |
The auditing and logging capabilities within the Oracle E-Business Suite and Oracle Database are sophisticated and able to satisfy most... |
Security Resources | File |
Guide to PeopleSoft Logging and Auditing |
Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy... |
Whitepapers and Presentations | File |
Oracle Discoverer Security Alert - High impact to SOX Compliance and Financial Reporting |
For those clients using Oracle Discoverer, especially those using Discoverer with the Oracle E-Business Suite for financial reporting, the October... |
Oracle Security Blog | |
Obtaining Value from your Database Activity Monitoring (DAM) Solution |
Database activity monitoring (DAM) solutions can help organizations to satisfy complex database security and compliance challenges. However... |
Security Resources | File |