Oracle Audit Vault - Oracle Client Identifier and Last Login
Several standard features of the Oracle database should be kept in mind when considering what alerts and correlations are possible when combining Oracle database and application log and audit...
View ArticleSecurity Implications of Oracle Product Desupport
Oracle is aggressive in desupporting products - most product versions are desupported within 18 months of release except for terminal releases. Oracle Database 11.2.0.3 and Oracle E-Business Suite...
View ArticleDetecting and Stopping Cyber Attacks against Oracle Databases
Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though...
View ArticleOracle OpenWorld: Detecting and Stopping Cyber Attacks Against Oracle Databases
Oracle databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though...
View ArticleOracle 12c Unified Auditing - Mixed Mode
Next in our blog series on Oracle 12 Unified Auditing is a discussion of Mixed Mode. Mixed Mode is the default auditing mode for Oracle 12c. Oracle describes Mixed Mode auditing as a means of becoming...
View ArticleWhat Is Oracle 12 Unified Auditing? The View UNIFIED_AUDIT_TRAIL with 94 Columns
What is Oracle 12c Unified Auditing? The short answer is the view UNIFED_AUDIT_TRAIL. This view consolidates all logging and auditing information into a single source. Regardless of using either Mixed...
View ArticleMandatory Auditing - Oracle 12c Always-On-Auditing
Certainly from an auditing and logging perspective, one of the best new features delivered by Oracle 12c is mandatory auditing of the administrative users such as SYSDBA. This can be described as...
View ArticleIntegrigy Guide to Database Auditing and Logging
Most clients do not fully take advantage of their database's auditing and logging features. For databases such as Oracle these features are sophisticated and are able to satisfy most organization’s...
View ArticleWhat can the Oracle Audit Vault Protect?
For Oracle database customers the Oracle Audit Vault can protect the following:SQL statements logs – Data Manipulation Language (DML) statement auditing such as when users are attempting to query the...
View ArticleWhat Do Oracle Audit Vault Collection Agents Do?
The Oracle Audit Vault is installed on a server, and collector agents are installed on the hosts running the source databases. These collector agents communicate with the audit vault server. If the...
View ArticleOracle Audit Vault Oracle Database Plug-In
The Oracle Audit Vault uses Plug-Ins to define data sources. The following table summarizes several of the important facts about the Oracle Audit Vault database plug for Oracle databases –Oracle...
View ArticleLogging and Auditing Oracle Database Webinar
The auditing and logging capabilities within the Oracle Database are sophisticated and able to satisfy most organizations' security and compliance requirements. However, the auditing and logging setup...
View ArticleOracle Audit Vault - Oracle Client Identifier and Last Login
Several standard features of the Oracle database should be kept in mind when considering what alerts and correlations are possible when combining Oracle database and application log and audit...
View ArticleSecurity Implications of Oracle Product Desupport
Oracle is aggressive in desupporting products - most product versions are desupported within 18 months of release except for terminal releases. Oracle Database 11.2.0.3 and Oracle E-Business Suite...
View ArticleDetecting and Stopping Cyber Attacks against Oracle Databases
Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though...
View ArticleOracle OpenWorld: Detecting and Stopping Cyber Attacks Against Oracle Databases
Oracle databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though...
View ArticleOracle Database Critical Patch Update (CPU) Planning for 2016
With the start of the new year, it is now time to think about Oracle Critical Patch Updates for 2016. Oracle releases security patches in the form of Critical Patch Updates (CPU) each quarter...
View ArticleAll Things Oracle Database Encryption
Encrypting data is a useful tool to protect sensitive data be it at rest, in motion, or in use. For an Oracle Database, encryption may be done at the storage, application, network, and backup layers....
View ArticleOracle Database Security in the Cloud
From the perspective of a database security consultancy, what security requirements change when you move to the Cloud? Assuming an effective database security program is in place, arguably moving to...
View ArticleWhen You Can’t Apply Oracle EBS 11i and R12 CPU Security Patches
Oracle E-Business Suite (EBS) 11i and 12.0 security patches and other security improvements are no longer being provided by Oracle since these products are now under Sustaining Support. After January...
View Article