System News
back5 6 7 8 9 10 11 12 13 14 15 next
Archived Security Articles
11 Jan 2013
open to premium members only
Telenet Improves Internal Services with Oracle Identity Management [29273]
Company Automates User Account Administration, Streamlines User Access Control, Optimizes License Management

Telenet, a Belgian provider of residential high-speed internet, telephony, and digital television services, has implemented Oracle Identity Management to centralize identity management and security operations. Leveraging Oracle Identity Manager and Oracle Identity Analytics, Telenet managed to automate user account administration, streamline user access control, optimize license management and see who had access to what business applications. In a brief video Mark Vantiggel, Telenet domain architect ERP responsible for identity management, provides an overview of how the company uses Oracle solutions to serve internal customers. An accompanying case study illustrates the benefits enjoyed by Telenet as a result of deploying Oracle solutions.
(Get More Information . .)

06 Dec 2012
open to premium members only
Oracle, LexisNexis Combine to Provide Powerful Defense Against Fraud and Identity Abuse [28791]
Oracle Identity Management and LexisNexis Instant Authenticate Create a Bulwark

LexisNexis Risk Solutions has announced the Oracle Validated Integration of its Instant Authenticate product with Oracle Identity Management, Mark Karlstrand reports. Oracle provides the most complete Identity and Access Management platform, Karlstrand writes, emphasizing that it is the only provider to offer advanced capabilities including device fingerprinting, location intelligence, real-time risk analysis, context-aware authentication and authorization. LexisNexis Risk Solutions' Instant Authenticate dynamic knowledge-based authentication (KBA) service offers customers a secure and cost effective means to authenticate new users or prove authentication for password resets, lockouts and such scenarios. Together, they now offer an integrated solution that can stop identity fraud in its tracks.
(Get More Information . .)

29 Nov 2012
open to premium members only
Would You Leave the Keys in Your Parked Car's Ignition? [28671]
Why Offer the Same Opportunity to Hackers Interested in Your Database?

According to the recent Verizon Data Breach Investigations Report, 98% of breached data originates from database servers and nearly half are compromised in less than a minute, notes Troy Kitch, Senior Manager, Database Security Product Marketing, Oracle, in a post announcing the webcast on November 28, 2012, "Gone in 60 Seconds: An Insecure Database Is an Easy Target" that has been recorded for on-demand access. The webcast, for which registration and log-in are required, details the evolving threats to databases that have resulted in over 1 billion stolen records and explains how organizations can mitigate risks by adopting a defense-in-depth strategy.
(Get More Information . .)

16 Nov 2012
open to premium members only
Security Inside Out Newsletter: November Edition now Available [28486]
Features Highlights from Oracle OpenWorld

The November edition of the Security Inside Out Newsletter is now available, Tanu Sood posts, featuring highlights from Oracle OpenWorld, noting the record-breaking registration for this year's conference. Also included in the current issue is an interview with Amit Jasuja, Senior Vice President, Security and Identity Management at Oracle, who discusses the key trends in the industry and how these have helped shape innovation in the latest release of Oracle Identity Management solution set. Readers will also find links to webcasts on identity management and database security and links to resource libraries as well.
(Get More Information . .)

16 Nov 2012
open to premium members only
How to Know Whether T4 Crypto Accelerators Are in Use [28489]
Some Advice on Choosing the Optimal Crypto Instructions

Dan Anderson posts a means for determining whether the non-privileged crypto instructions included in the T4 processor are in use. He shares a DTrace script written by Chi-Chang Lin that can show whether T4 crypto instructions are being executed, and he includes instructions for learning whether t4 engine optimization is in use, providing a chart that shows optimization availability. He also provides suggestions regarding the best use of hash algorithms. Anderson reminds users that, using the latest update, Solaris 11.1, provides the best set of optimized algorithms, but alternatives are often available, sometimes slightly slower, for releases back to Solaris 10 08/11 (U10).
(Get More Information . .)

12 Nov 2012
open to premium members only
Darren Moffat Explains the new ZFS Encryption Features in Solaris 11.1 [28404]
Labels them 'Small but Significant'

Darren Moffat introduces the new ZFS encryption features in Oracle Solaris 11.1. He begins by explaining the function of the new readonly keychangedate and continues with comments on the new restrictions placed on the size of the wrapping key needed to match the size of the data encryption key, noting the exception to this operation when the keysource property sets the format to be 'passphrase' in which case the wrapping key size and data encryption key size will always match. He adds the comment that the pam_zfs_key module has been updated so that it allows you to specify encryption=off.
(Get More Information . .)

 
back5 6 7 8 9 10 11 12 13 14 15 next









News and Solutions for Users of Solaris, Java and Oracle's Sun hardware products
Just the news you need, none of what you don't – 42,000+ Members – 24,000+ Articles Published since 1998