System News
back2 3 4 5 6 7 8 9 10 11 12 next
Archived Security Articles
01 Mar 2015
open to premium members only
Establishing a Mobile Security Architecture [41196]
Beyond Brute Force: 3 User-Friendly Strategies for BYOD Security

Organizations of today are at a point of transition from using personal or company-issued devices with restrictive controls to using these devices to meet the personal needs of the end user. One thing most security experts agree on is the high-risk posture that comes with the adoption of mobility. This risk is present because of the practice of extending the corporate perimeter onto the mobile device. To expect that a consumer-grade $300 smartphone can replace the security layers of the enterprise (firewalls, intrusion prevention, anti-malware, access control frameworks, multifactor authentication, and more) is just not a reasonable expectation without a focused look at how enterprises should extend their enterprise security framework to the mobile platform...

The Oracle mobile strategy is all about providing a secure and available mobile experience from any device, from anywhere, and at any time. From mobile clients to back-end enterprise systems, Oracle's mobile platform offers the reliability, scalability, availability, and portability that enterprises expect in a modern, enterprise-grade platform. With the unique capabilities of this platform, mobile devices, services, and applications can be rapidly and securely developed, creating an ever-expanding list of possibilities...
(Get More Information . .)

27 Feb 2015
open to premium members only
Establishing a Mobile Security Architecture [41058]
New eBook

Greg Jensen writes, "Today, just as organizations are starting to understand the first wave of the mobile revolution, there are now numerous demands being placed on IT to support the second wave of mobility as a new generation of devices and applications are coming online to take advantage of these new capabilities in today's corporate environments.

'Establishing a Mobile Security Architecture' provides a deeper understanding of not only the fundamentals, but also the complex issues related to mobile security in today's corporate mobility environment..."
(Get More Information . .)

24 Feb 2015
open to premium members only
Standards Corner: A 'Robust' Schema Approach for SCIM [41057]
System for Cross-domain Identity Management

Phil Hunt writes, "Last week, I had a question about SCIM's (System for Cross-domain Identity Management) and its approach to schema. How does the working group recommend handling message validation? Doesn't SCIM have a formal schema?

To be able to answer that question, I realized that the question was about a different style of schema than SCIM supports. The question was assuming that 'schema' is defined how XML defines schema as a way to validate documents..."
(Get More Information . .)

23 Feb 2015
open to premium members only
Enabling Mobile Application Management with Secure Enterprise Single Sign On [41056]
Oracle Mobile Security Suite (OMSS) addresses BYOD challenges

Carlos Chang writes, "Oracle Mobile Security Suite (OMSS) addresses BYOD challenges by isolating corporate from personal data on consumers' personal mobile devices without needing to lockdown the entire device. Using a technique called containerization; the Oracle Mobile Security Suite creates a Secure Workspace (SWS) in which corporate applications,email and data are stored. Only authenticated users can access the secure workspace to run applications and access data and only applications provisioned or approved by corporate IT can be installed and executed from within this secure workspace. If the device is lost or stolen, corporate IT can remotely wipe the secure workspace without affecting any personal data..."
(Get More Information . .)

16 Feb 2015
open to premium members only
Security Configuration in LDAP Adapter [40937]
Oracle Adapter for LDAP is a JCA resource adapte

Anuj Kaushal writes, "In this post we'll discuss the various security options that are available as part of the LDAP Adapter configuration. Oracle Adapter for LDAP is a JCA resource adapter that provides bi-directional connectivity with LDAP v3 compliant directory servers*.

To be able to perform LDAP Operations, the adapter needs to establish a connection to communicate with a target LDAP directory server. For this, it is required to configure the resource adapter connection properties which will be used by the adapter to connect to the directory server..."
(Get More Information . .)

03 Feb 2015
open to premium members only
Data Encryption ... Software vs Hardware [40706]
What's Better and Why

John Szlendak asks, "Software vs Hardware Encryption, What's Better and Why..

People often ask me, when it comes to storage (or data-at-rest) encryption, what's better, File System Encryption (FSE) which is done in software by the storage controller, or Full Disk Encryption (FDE) which is done in hardware via specialized Self Encrypting Drives (SEDs).

Both methods are very effective in providing security protection against data breaches and theft, but differ in their granularity, flexibility and cost. A good example of this is to compare Oracle ZFS Storage Appliance that uses very granular File System Encryption versus NetApp storage that uses Self Encrypting Drives (SEDs)..."
(Get More Information . .)

 
back2 3 4 5 6 7 8 9 10 11 12 next