Tag: Security

From the 2013 Exadata Virtual Conference Lawrence To, Oracle Corporation Exadata MAA for Maximum Availability and Stability Essential Exadata Operational Practices This file has an audio issue at 50:45 that is being corrected

Security configuration and features are available at many levels in Oracle Exadata Database Machine. Attend this session and learn security fundamentals directly from Oracle Development. This session will focus on the storage and OS layers with an overview of the database-layer security options and best practices. We will outline necessary requirements for system maintenance so…

Oracle has redefined data protection by making backup & recovery an integral part of and an extension to the Oracle database engine. In this session you will learn how you can implement comprehensive data protection for Oracle databases using an integrated tiered approach that meets your business requirements. Topics will include Oracle Database, RMAN, Data…

Security configuration and features are available at many levels in Oracle Exadata Database Machine. This session will focus on the storage and OS layers with an overview of the database-layer security options and best practices. We'll outline necessary requirements for system maintenance so the system will remain stable while offering suggestions on how security can…

With more and more malware attacks each minute, well-publicized and costly data breaches, device proliferation, and individuals profiting from the misuse of valuable data, protecting your Oracle Database data end-to-end has never been more critical. Join experts from the Oracle Managed Cloud Services team and Oracle’s ZFS Storage team to learn about key considerations and…

To understand the security architecture of the Oracle Database Cloud, you need to understand several different types of users and how they interact in the provisioning and management of a Database Cloud Service, including encryption, user permissions and security policies. Join Oracle Corporation security experts Saikat Saha and George Csaba, and security guru and IOUG…

What does it take to make the database secure, to comply with regulations and mandates like SOX and PCI? You may be amazed to know that by taking some simple steps you can perform in a single day, you can attain 60% of the requirements and make your database a secure place, as you will…

Join us as we demonstrate how Appsian’s Real-Time Security Analytics and User Activity Logging for PeopleSoft has been providing Administrators with the visibility and insight necessary to detect threats that were once impossible to quickly identify and remediate.

Join us as we demonstrate how Appsian’s Real-Time Security Analytics and User Activity Logging for PeopleSoft has been providing Administrators with the visibility and insight necessary to detect threats that were once impossible to quickly identify and remediate.