System News
back5 6 7 8 9 10 11 12 13 14 15 next
Archived Security Articles
27 Oct 2014
open to premium members only
Mobile Devices - The Weakest Link of Enterprise Security? [39047]
Suhas Uliyar, VP Mobile Strategy, Product Management, Oracle

Suhas Uliyar, VP Mobile Strategy, Product Management, Oracle, writes, "Today's truly mobile enterprises place mobility at their core, transforming their operations, engaging better with customers and partners and creating innovative business models that boost revenue. As gateways into the mobile enterprise, the security of devices is critical: if devices are not protected in the right way, they represent a weak link in enterprise systems and data security.

A recent Oracle survey showed that mobile devices are being lost and stolen to a fairly alarming degree - especially by the young. 73 per cent of workers aged between 16 and 24 admitted to having lost their mobile device at least once, while 52 per cent owned up to having had their mobile device stolen on at least one occasion. The research uncovered a generational trend: among 45-54-year-olds, device theft was reported at just 20 per cent and losses at 36 per cent..."
(Get More Information . .)

15 Oct 2014
open to premium members only
Implementing Oracle Identity Management for large enterprises [38809]
Design Considerations

Eric Renaud writes, "Infosys Limited (NYSE:INFY) is a global leader in technology, consulting and services and an Oracle Diamond Partner that has graciously agreed to present on best practices garnered from experience working on Large Enterprise Identity Management deployments in a four part series hosted here in the Oracle Identity Management Blog.

Large Enterprises: Large Challenges

During the course of deploying Oracle Identity Management suite for various large enterprises, the Infosys Enterprise Security & Risk Management (ESRM) technology team has identified a few typical organizational scenarios:..."
(Get More Information . .)

13 Oct 2014
open to premium members only
SPARC and Solaris Leadership in Security [38810]
By Kelvin Gee

Kevin Gee writes, "Oracle's SPARC systems and Oracle Solaris OS are co-engineered to provide efficient secure technology. SPARC security uses hardware accelerators to deliver leading performance.

Oracle leads in providing encryption and policy-based key management that ensure data protection for cloud and virtual environments. Oracle has proved its dramatic security performance advantages through rigorous testing. In the cloud a huge amount data needs to be encrypted. For data at rest, AES block-level encryption is FIPS 140-2 certified to support U.S. government agencies. The end-to-end performance of all system components that make up a virtualized environment..."
(Get More Information . .)

08 Oct 2014
open to premium members only
Seamlessly & Securely Managing 360k+ User Identities While Reducing IT Complexity [38715]
By Eric Renaud

Eric writes, "Following the 2013 decision to choose Oracle's PeopleSoft applications running on Oracle Exadata database machines as its new enterprise resource planning (ERP) and campus-solutions platform in 2013, Seneca College of Applied Arts and Technology was also faced with another critical decision prompted by the impending end-of-life scenario of its legacy identity management solution.

Spurred with the overarching goal to provide secure and role-based access to all of the school's applications and online services for a growing and increasingly remote student body, Seneca chose Oracle Identity and Access Management Suite as its new platform for managing identity and access rights..."
(Get More Information . .)

18 Aug 2014
open to premium members only
Securing a Cloud-Based Data Center [37915]
How to protect and secure your cloud infrastructure using Oracle Solaris technologies such as Oracle Solaris Zones, ZFS, and network virtualization

by Orgad Kimchi, Ron Larson, and Richard Friedman

Table of Contents

  • Security in the Cloud
  • Oracle Solaris 11 Security Features
  • How Oracle Solaris Remote Lab Achieves Its Security Goals with Oracle Solaris 11
  • Conclusion
  • See Also
  • About the Authors

No doubt, with all the media reports about stolen databases and private information, a major concern when committing to a public or private cloud must be preventing unauthorized access of data and applications. In this article, we discuss the security features of Oracle Solaris 11 that provide a bullet-proof cloud environment. As an example, we show how the Oracle Solaris Remote Lab implementation utilizes these features to provide a high level of security for its users.
(Get More Information . .)

17 Aug 2014
open to premium members only
Oracle Introduces Key Vault Software Appliance to Manage and Safeguard Encryption Keys [37796]
From Database Trends and Applications Magazine

"While encryption is widely recognized as the gold standard for protecting data privacy, the technology is only as strong as its key management, according to Oracle, and critical credential files such as Oracle wallet files, Java KeyStores, Secure Shell (SSH) key files, and Secure Sockets Layer (SSL) certificate files are often widely distributed across servers and server clusters that use error-prone synchronization and backup mechanisms.

Just months after the massive data breaches of the 2013 holiday season, a newly discovered data breach is again shining a spotlight on the need for better enterprise data security and the fact that not enough is being done to secure critical customer data. This time, the reported data breach involves a Russian crime ring and 1.2 billion user names and passwords as well as at least 500 million email addresses..."
(Get More Information . .)

back5 6 7 8 9 10 11 12 13 14 15 next