System News
back5 6 7 8 9 10 11 12 13 14 15 next
Archived Security Articles
23 Jun 2014
open to premium members only
Java Cloud Service: Security [37093]
By Jani Rautiainen

Jani writes, "Java Cloud Service (JCS) provides a platform to develop and deploy business applications in the cloud. In Fusion Applications Cloud deployments customers do not have the option to deploy custom applications developed with JDeveloper to ensure the integrity and supportability of the hosted application service. Instead the custom applications can be deployed to the JCS and integrated to the Fusion Application Cloud instance.

This series of articles will go through the features of JCS, provide end-to-end examples on how to develop and deploy applications on JCS and how to integrate them with the Fusion Applications instance..."
(Get More Information . .)

16 Jun 2014
open to premium members only
It's Time for Businesses to get Serious about BYOD [36990]
Klaus Bergius, Director of Technology Marketing EMEA at Oracle

Greg Jensen writes, "Bring Your Own Device (BYOD) is a corporate reality that is already affecting virtually every business operating today. In some ways BYOD is inevitable, with businesses having little choice but to adapt to it. Consumer smartphones, tablets and laptops may eventually end the corporate mandating of employee devices. But currently, there is widespread concern and even denial in enterprises, while embracing BYOD could create new opportunities. This is what the Oracle European BYOD Index Report, based on research carried out in January and February 2014, reveals..."
(Get More Information . .)

04 Jun 2014
open to premium members only
The Top Ten Security Top Ten Lists [36754]
By Troy Kitch

Troy writes, "As a marketer, we're always putting together the top 3, or 5 best, or an assortment of top ten lists. So instead of going that route, I've put together my top ten security top ten lists. These are not only for security practitioners, but also for the average Joe/Jane; because who isn't concerned about security these days? Now, there might not be ten for each one of these lists, but the title works best that way. Top Ten Security Top Ten Lists

Starting with my number ten (in no particular order):..."
(Get More Information . .)

04 Jun 2014
open to premium members only
Unix: Why you should love nmap [36755]
By Sandra Henry-Stocker

Sandra writes, "You have to love nmap. No other tool is set up to give you as quick a view of your network and at so little cost. The name stands for "network mapper" and it can tell you a lot about the network you are managing, including what systems are on it, what's running on those systems, and quite a bit of services you might need to worry about. It's a very basic tool in some ways. You hand it a few command line parameters and it runs around your network making connections and reporting on what it is able to discover. Plus, it's surprisingly efficient (unless you inadvertently ask for too much information) and is easy to install and to use..."
(Get More Information . .)

28 May 2014
open to premium members only
Oracle Sun Solaris 11.1 Completes EAL4+ Common Criteria Evaluation [36635]
By Joshua Brickman

"Oracle is pleased to announce that the Oracle Solaris 11.1 operating system has achieved a Common Criteria certification at Evaluation Assurance Level (EAL) 4 augmented by Flaw Remediation under the Canadian Communications Security Establishment's (CSEC) Canadian Common Criteria Scheme (CCCS). EAL4 is the highest level achievable for commercial software, and is the highest level mutually recognized by 26 countries under the current Common Criteria Recognition Arrangement (CCRA).

Oracle Solaris 11.1 is conformant to the BSI Operating System Protection Profile v2.0 with the following four extended packages. (1) Advanced Management, (2) Extended Identification and Authentication, (3) Labeled Security, and (4) Virtualization..."
(Get More Information . .)

26 May 2014
open to premium members only
Security Access Control With Solaris Virtualization [36634]
By Thierry Manfe

Numerous Solaris customers consolidate multiple applications or servers on a single platform. The resulting configuration consists of many environments hosted on a single infrastructure and security constraints sometimes exist between these environments. Recently, a customer consolidated many virtual machines belonging to both their Intranet and Extranet on a pair of SPARC Solaris servers interconnected through Infiniband. Virtual Machines were mapped to Solaris Zones and one security constraint was to prevent SSH connections between the Intranet and the Extranet. This case study gives us the opportunity to understand how the Oracle Solaris Network Virtualization Technology - a.k.a. Project Crossbow - can be used to control outbound traffic from Solaris Zones.
(Get More Information . .)

 
back5 6 7 8 9 10 11 12 13 14 15 next









News and Solutions for Users of Solaris, Java and Oracle's Sun hardware products
30,000+ Members – 30,000+ Articles Published since 1998