Title | Summary | File | |
---|---|---|---|
PeopleSoft Security |
This is a quick summary of Integrigy’s latest research on PeopleSoft. Was sending this to a client and decided it was a good posting: ... |
Whitepapers and Presentations, Oracle Security Blog | |
Guide to PeopleSoft Logging and Auditing |
Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy... |
Whitepapers and Presentations | File |
How to Control and Secure PeopleSoft DBAs and Developers |
A common compliance challenge for most PeopleSoft environments is how to control and secure direct database access by DBAs and developers,... |
Whitepapers and Presentations | File |
How to Control and Secure Oracle E-Business Suite DBAs and Developers |
A common compliance challenge for most Oracle E-Business Suite environments is how to control and secure direct database access by DBAs and... |
Whitepapers and Presentations | File |
Integrigy Guide to Oracle Audit Vault |
The Integrigy Guide to Oracle Audit Vault provides an introduction to Oracle Audit Vault and Integrigy's recommendations for deployment and... |
Whitepapers and Presentations | File |
Oracle 12c Unified Auditing |
In Oracle 12c, a new database auditing foundation has been introduced. Oracle Unified Auditing changes the fundamental auditing... |
Security Resources | File |
OBIEE Security Examined |
Oracle Business Intelligence Enterprise Edition (OBIEE) 11g is a powerful tool for accessing data, however, this power means OBIEE security is... |
Security Resources | File |
Oracle E-Business Suite: Credit Cards and PCI Compliance |
All Oracle E-Business Suite implementations that "store, process, or transmit cardholder data" must comply with Payment Card Industry (... |
Security Resources | File |
Spoofing Oracle Session Information |
Oracle Database session information includes database user name, operating system user name, host, terminal, IP address, module, program,... |
Security Resources | File |
Building an Audit Trail in an Oracle Applications Environment |
Sarbanes-Oxley’s section 404 requires a company’s key systems be audited. However, many companies have 'unauditable' systems and don’t even know... |
Security Resources | File |