System News
back1 2 3 4 5 6 7 8 9 10 11 next
Archived Security Articles
04 Mar 2015
open to premium members only
Securing Information in the New Digital Economy [41197]
Joint Oracle and Verizon Report

To learn more about Securing Information in the New Digital Economy, read the joint Oracle and Verizon Report.

We are in the midst of a data breach epidemic, fueled by a lucrative information black market. The perimeter security most IT organizations rely on has become largely ineffective. Nearly 70% of security resources are focused on perimeter controls, but most exploited vulnerabilities are internal.

Effective modern security requires an inside-out approach with a focus on data and internal controls...
(Get More Information . .)

01 Mar 2015
open to premium members only
Establishing a Mobile Security Architecture [41196]
Beyond Brute Force: 3 User-Friendly Strategies for BYOD Security

Organizations of today are at a point of transition from using personal or company-issued devices with restrictive controls to using these devices to meet the personal needs of the end user. One thing most security experts agree on is the high-risk posture that comes with the adoption of mobility. This risk is present because of the practice of extending the corporate perimeter onto the mobile device. To expect that a consumer-grade $300 smartphone can replace the security layers of the enterprise (firewalls, intrusion prevention, anti-malware, access control frameworks, multifactor authentication, and more) is just not a reasonable expectation without a focused look at how enterprises should extend their enterprise security framework to the mobile platform...

The Oracle mobile strategy is all about providing a secure and available mobile experience from any device, from anywhere, and at any time. From mobile clients to back-end enterprise systems, Oracle's mobile platform offers the reliability, scalability, availability, and portability that enterprises expect in a modern, enterprise-grade platform. With the unique capabilities of this platform, mobile devices, services, and applications can be rapidly and securely developed, creating an ever-expanding list of possibilities...
(Get More Information . .)

27 Feb 2015
open to premium members only
Establishing a Mobile Security Architecture [41058]
New eBook

Greg Jensen writes, "Today, just as organizations are starting to understand the first wave of the mobile revolution, there are now numerous demands being placed on IT to support the second wave of mobility as a new generation of devices and applications are coming online to take advantage of these new capabilities in today's corporate environments.

'Establishing a Mobile Security Architecture' provides a deeper understanding of not only the fundamentals, but also the complex issues related to mobile security in today's corporate mobility environment..."
(Get More Information . .)

24 Feb 2015
open to premium members only
Standards Corner: A 'Robust' Schema Approach for SCIM [41057]
System for Cross-domain Identity Management

Phil Hunt writes, "Last week, I had a question about SCIM's (System for Cross-domain Identity Management) and its approach to schema. How does the working group recommend handling message validation? Doesn't SCIM have a formal schema?

To be able to answer that question, I realized that the question was about a different style of schema than SCIM supports. The question was assuming that 'schema' is defined how XML defines schema as a way to validate documents..."
(Get More Information . .)

23 Feb 2015
open to premium members only
Enabling Mobile Application Management with Secure Enterprise Single Sign On [41056]
Oracle Mobile Security Suite (OMSS) addresses BYOD challenges

Carlos Chang writes, "Oracle Mobile Security Suite (OMSS) addresses BYOD challenges by isolating corporate from personal data on consumers' personal mobile devices without needing to lockdown the entire device. Using a technique called containerization; the Oracle Mobile Security Suite creates a Secure Workspace (SWS) in which corporate applications,email and data are stored. Only authenticated users can access the secure workspace to run applications and access data and only applications provisioned or approved by corporate IT can be installed and executed from within this secure workspace. If the device is lost or stolen, corporate IT can remotely wipe the secure workspace without affecting any personal data..."
(Get More Information . .)

16 Feb 2015
open to premium members only
Security Configuration in LDAP Adapter [40937]
Oracle Adapter for LDAP is a JCA resource adapte

Anuj Kaushal writes, "In this post we'll discuss the various security options that are available as part of the LDAP Adapter configuration. Oracle Adapter for LDAP is a JCA resource adapter that provides bi-directional connectivity with LDAP v3 compliant directory servers*.

To be able to perform LDAP Operations, the adapter needs to establish a connection to communicate with a target LDAP directory server. For this, it is required to configure the resource adapter connection properties which will be used by the adapter to connect to the directory server..."
(Get More Information . .)

 
back1 2 3 4 5 6 7 8 9 10 11 next









News and Solutions for Users of Solaris, Java and Oracle's Sun hardware products
30,000+ Members – 30,000+ Articles Published since 1998