System News
back6 7 8 9 10 11 12 13 14 15 16 next
Archived Security Articles
18 Aug 2014
open to premium members only
Securing a Cloud-Based Data Center [37915]
How to protect and secure your cloud infrastructure using Oracle Solaris technologies such as Oracle Solaris Zones, ZFS, and network virtualization

by Orgad Kimchi, Ron Larson, and Richard Friedman

Table of Contents

  • Security in the Cloud
  • Oracle Solaris 11 Security Features
  • How Oracle Solaris Remote Lab Achieves Its Security Goals with Oracle Solaris 11
  • Conclusion
  • See Also
  • About the Authors

No doubt, with all the media reports about stolen databases and private information, a major concern when committing to a public or private cloud must be preventing unauthorized access of data and applications. In this article, we discuss the security features of Oracle Solaris 11 that provide a bullet-proof cloud environment. As an example, we show how the Oracle Solaris Remote Lab implementation utilizes these features to provide a high level of security for its users.
(Get More Information . .)

17 Aug 2014
open to premium members only
Oracle Introduces Key Vault Software Appliance to Manage and Safeguard Encryption Keys [37796]
From Database Trends and Applications Magazine

"While encryption is widely recognized as the gold standard for protecting data privacy, the technology is only as strong as its key management, according to Oracle, and critical credential files such as Oracle wallet files, Java KeyStores, Secure Shell (SSH) key files, and Secure Sockets Layer (SSL) certificate files are often widely distributed across servers and server clusters that use error-prone synchronization and backup mechanisms.

Just months after the massive data breaches of the 2013 holiday season, a newly discovered data breach is again shining a spotlight on the need for better enterprise data security and the fact that not enough is being done to secure critical customer data. This time, the reported data breach involves a Russian crime ring and 1.2 billion user names and passwords as well as at least 500 million email addresses..."
(Get More Information . .)

08 Aug 2014
open to premium members only
Focus on Database Security at Oracle OpenWorld, 2014 [37697]
By Troy Kitch

Troy writes, "Data security threats and regulatory compliance are the new "death" and "taxes" that we can all be certain of. Security is a hot topic across all organizations, whether you have 100 or 100,000 employees. Organizations are scrambling to mitigate threats and comply with regulatory requirements. Oracle OpenWorld is the place for customers to hear about the latest advances in data security, meet with security experts, and learn the next steps to help secure the sensitive data they hold.

With Oracle OpenWorld, 2014 about 2 months away, we've compiled the database security sessions, hands on labs, and more, that are critical for database administrators, security experts and executives to attend. As an example of just some of the talks this year:..."
(Get More Information . .)

01 Aug 2014
open to premium members only
Solaris 11.2 released with security and other enhancements [37586]
By Gerry Haskins

Gerry writes, "There's a huge amount of new and improved features in Solaris 11.2 as well as thousands of bug fixes. In short, it's our best Solaris ever!

For security conscious customers, Solaris 11.2 delivers significant compliance enhancements (see the docs) and provides the new 'solaris-minimal-server' Install group, which is an excellent basis for installing secure, minimized (hardened) systems.

Hardening (minimizing) a system in Solaris 10 and earlier was as much an art form as a science. It was hard to be sure that the system was as minimized as possible..."
(Get More Information . .)

31 Jul 2014
open to premium members only
Oracle Identity Management Achieves Significant Customer and Partner Adoption [37588]
Complete and integrated, next-generation identity management suite helps customers and partners efficiently secure the extended enterpris

"As organizations build a strategy for digital transformation, they are seeking a unified approach to enterprisewide identity management that provides consistent access controls and an optimized user experience across the extended enterprise. To help organizations offer more digital services, Oracle Identity Management provides the foundation to connect to the internet value chain and economies of scale to manage users across all channels of interaction including cloud, mobile, and social.

The Oracle stack allows companies to homogenize and defragment identity information and services, which can result in faster deployment times, faster upgrades, and lower cost of ownership. Today, many companies are already reaping economic benefits with the simplified user experience and greater end user participation..."
(Get More Information . .)

28 Jul 2014
open to premium members only
Oracle on cyber security aspects of BYOD [37587]
By Steve Walker

Steve writes, "Bring your own device (BYOD) has been an unstoppable force on the crest of the consumerisation wave, and one that companies have simply had to roll with.

But it is increasingly being rebranded as 'bring your own disaster' with IT departments desperately grappling for solutions that will allow them to take back some degree of control over the mobile environment, hastily assembling a raft of MDM (mobile device management) tools.

It has become obvious that the utopian ideal of BYOD is more myth than a practical reality for most firms. So has the BYOD wave broken?..."
(Get More Information . .)

back6 7 8 9 10 11 12 13 14 15 16 next