System News
back5 6 7 8 9 10 11 12 13 14 15 next
Archived Security Articles
05 Nov 2014
open to premium members only
Enterprise Role Definition: [39244]
Best Practices and Approach

Eric Renaud writes, "Infosys Limited (NYSE:INFY) is a global leader in technology, consulting and services and an Oracle (Diamond) Partner that has graciously agreed to present on best practices garnered from experience working on Large Enterprise IDM deployments in a four part series hosted here in the Identity Management Blog.

Role Engineering

Today a number of organizations are considering or are in the process of moving to a Role Based Access Control (RBAC) model. Role Engineering is the process by which an organization develops, defines, enforces, and maintains role-based access control. RBAC is often seen as a way to improve security controls for access and authorization, as well as to enforce access policies such as segregation of duties (SoD) to meet regulatory compliance. It establishes effective controls and insight into 'Who has access to What'.

RBAC Basic

The concept of roles is defined in the ANSI RBAC standard that was first proposed by the National Institute for Standards and Technology (NIST). The model for RBAC illustrates the mapping between users, roles, and privileges (permissions) in base RBAC. Privileges are collections of system-specific operations on objects that can be mapped to roles..."
(Get More Information . .)

27 Oct 2014
open to premium members only
Mobile Devices - The Weakest Link of Enterprise Security? [39047]
Suhas Uliyar, VP Mobile Strategy, Product Management, Oracle

Suhas Uliyar, VP Mobile Strategy, Product Management, Oracle, writes, "Today's truly mobile enterprises place mobility at their core, transforming their operations, engaging better with customers and partners and creating innovative business models that boost revenue. As gateways into the mobile enterprise, the security of devices is critical: if devices are not protected in the right way, they represent a weak link in enterprise systems and data security.

A recent Oracle survey showed that mobile devices are being lost and stolen to a fairly alarming degree - especially by the young. 73 per cent of workers aged between 16 and 24 admitted to having lost their mobile device at least once, while 52 per cent owned up to having had their mobile device stolen on at least one occasion. The research uncovered a generational trend: among 45-54-year-olds, device theft was reported at just 20 per cent and losses at 36 per cent..."
(Get More Information . .)

15 Oct 2014
open to premium members only
Implementing Oracle Identity Management for large enterprises [38809]
Design Considerations

Eric Renaud writes, "Infosys Limited (NYSE:INFY) is a global leader in technology, consulting and services and an Oracle Diamond Partner that has graciously agreed to present on best practices garnered from experience working on Large Enterprise Identity Management deployments in a four part series hosted here in the Oracle Identity Management Blog.

Large Enterprises: Large Challenges

During the course of deploying Oracle Identity Management suite for various large enterprises, the Infosys Enterprise Security & Risk Management (ESRM) technology team has identified a few typical organizational scenarios:..."
(Get More Information . .)

13 Oct 2014
open to premium members only
SPARC and Solaris Leadership in Security [38810]
By Kelvin Gee

Kevin Gee writes, "Oracle's SPARC systems and Oracle Solaris OS are co-engineered to provide efficient secure technology. SPARC security uses hardware accelerators to deliver leading performance.

Oracle leads in providing encryption and policy-based key management that ensure data protection for cloud and virtual environments. Oracle has proved its dramatic security performance advantages through rigorous testing. In the cloud a huge amount data needs to be encrypted. For data at rest, AES block-level encryption is FIPS 140-2 certified to support U.S. government agencies. The end-to-end performance of all system components that make up a virtualized environment..."
(Get More Information . .)

08 Oct 2014
open to premium members only
Seamlessly & Securely Managing 360k+ User Identities While Reducing IT Complexity [38715]
By Eric Renaud

Eric writes, "Following the 2013 decision to choose Oracle's PeopleSoft applications running on Oracle Exadata database machines as its new enterprise resource planning (ERP) and campus-solutions platform in 2013, Seneca College of Applied Arts and Technology was also faced with another critical decision prompted by the impending end-of-life scenario of its legacy identity management solution.

Spurred with the overarching goal to provide secure and role-based access to all of the school's applications and online services for a growing and increasingly remote student body, Seneca chose Oracle Identity and Access Management Suite as its new platform for managing identity and access rights..."
(Get More Information . .)

18 Aug 2014
open to premium members only
Securing a Cloud-Based Data Center [37915]
How to protect and secure your cloud infrastructure using Oracle Solaris technologies such as Oracle Solaris Zones, ZFS, and network virtualization

by Orgad Kimchi, Ron Larson, and Richard Friedman

Table of Contents

  • Security in the Cloud
  • Oracle Solaris 11 Security Features
  • How Oracle Solaris Remote Lab Achieves Its Security Goals with Oracle Solaris 11
  • Conclusion
  • See Also
  • About the Authors

No doubt, with all the media reports about stolen databases and private information, a major concern when committing to a public or private cloud must be preventing unauthorized access of data and applications. In this article, we discuss the security features of Oracle Solaris 11 that provide a bullet-proof cloud environment. As an example, we show how the Oracle Solaris Remote Lab implementation utilizes these features to provide a high level of security for its users.
(Get More Information . .)

 
back5 6 7 8 9 10 11 12 13 14 15 next