System News
back5 6 7 8 9 10 11 12 13 14 15 next
Archived Security Articles
17 Nov 2014
open to premium members only
Mobile Security - A Fine Balance Between Usability & Security [39390]
Oracle Mobile Security Suite

Carlos Chang writes, "Mobile is a new channel that any IT team needs to consider carefully. Enterprise IT teams are familiar with securing access from the Web browser from desktops and laptops within the firewall, and remotely via VPN. But access from mobile devices is relatively new. Especially when its from mobile apps, not just a web browser. An app that in theory is a trusted app. And the smartphones are no longer an IT provisioned mobile device (e.g. the standard Blackberry). Like it or not, it's a bring your own device (BYOD) world.

You could try to install something that locks down the entire device. And if the device is ever lost or stolen, remotely wipe the device and everything in it. A bit heavy handed perhaps?..."
(Get More Information . .)

11 Nov 2014
open to premium members only
Oracle-Sponsored Study Highlights the Need for More Vigilant Enterprise Database Security [39283]
81 percent see privilege abuse and human error as the greatest risks to enterprise data

Data breaches cost organizations millions, damage their reputation, and result in lost customers and business opportunities. A new survey of 353 Independent Oracle Users Group (IOUG) database and IT professionals examines the state of enterprise database security, where the biggest risks lie, and how organizations can improve upon their security strategies.

The Independent Oracle Users Group (IOUG) has released a global survey titled DBA - Security Superhero: 2014 IOUG Enterprise Data Security Survey.

The survey, conducted by Unisphere Research and sponsored by Oracle, polled 353 IOUG database security managers, database administrators, and directors or managers of IT in companies spanning various industries including IT services, government, education, utilities, transportation, and financial services...
(Get More Information . .)

10 Nov 2014
open to premium members only
Oracle at Gartner Identity and Access Management Summit [39284]
Dec 2nd - 4th, 2014 in Las Vegas

As organizations consume an increasing number of mobile and cloud apps, identity management becomes fragmented. Organizations have inconsistent access policies and lose visibility into who has access to what. To avoid these risks and costs, they are increasingly adopting a strategy of extending enterprise identity services to the cloud. This presentation explores how organizations are using Identity Management to give users access to all their data from any device while providing an intelligent centralized view into user access rights across mobile, cloud and enterprise environments. See how Oracle Identity Management can securely accelerate your adoption of mobile and cloud applications.
(Get More Information . .)

05 Nov 2014
open to premium members only
Enterprise Role Definition: [39244]
Best Practices and Approach

Eric Renaud writes, "Infosys Limited (NYSE:INFY) is a global leader in technology, consulting and services and an Oracle (Diamond) Partner that has graciously agreed to present on best practices garnered from experience working on Large Enterprise IDM deployments in a four part series hosted here in the Identity Management Blog.

Role Engineering

Today a number of organizations are considering or are in the process of moving to a Role Based Access Control (RBAC) model. Role Engineering is the process by which an organization develops, defines, enforces, and maintains role-based access control. RBAC is often seen as a way to improve security controls for access and authorization, as well as to enforce access policies such as segregation of duties (SoD) to meet regulatory compliance. It establishes effective controls and insight into 'Who has access to What'.

RBAC Basic

The concept of roles is defined in the ANSI RBAC standard that was first proposed by the National Institute for Standards and Technology (NIST). The model for RBAC illustrates the mapping between users, roles, and privileges (permissions) in base RBAC. Privileges are collections of system-specific operations on objects that can be mapped to roles..."
(Get More Information . .)

27 Oct 2014
open to premium members only
Mobile Devices - The Weakest Link of Enterprise Security? [39047]
Suhas Uliyar, VP Mobile Strategy, Product Management, Oracle

Suhas Uliyar, VP Mobile Strategy, Product Management, Oracle, writes, "Today's truly mobile enterprises place mobility at their core, transforming their operations, engaging better with customers and partners and creating innovative business models that boost revenue. As gateways into the mobile enterprise, the security of devices is critical: if devices are not protected in the right way, they represent a weak link in enterprise systems and data security.

A recent Oracle survey showed that mobile devices are being lost and stolen to a fairly alarming degree - especially by the young. 73 per cent of workers aged between 16 and 24 admitted to having lost their mobile device at least once, while 52 per cent owned up to having had their mobile device stolen on at least one occasion. The research uncovered a generational trend: among 45-54-year-olds, device theft was reported at just 20 per cent and losses at 36 per cent..."
(Get More Information . .)

15 Oct 2014
open to premium members only
Implementing Oracle Identity Management for large enterprises [38809]
Design Considerations

Eric Renaud writes, "Infosys Limited (NYSE:INFY) is a global leader in technology, consulting and services and an Oracle Diamond Partner that has graciously agreed to present on best practices garnered from experience working on Large Enterprise Identity Management deployments in a four part series hosted here in the Oracle Identity Management Blog.

Large Enterprises: Large Challenges

During the course of deploying Oracle Identity Management suite for various large enterprises, the Infosys Enterprise Security & Risk Management (ESRM) technology team has identified a few typical organizational scenarios:..."
(Get More Information . .)

 
back5 6 7 8 9 10 11 12 13 14 15 next