Quantcast
Channel: Oracle Database
Browsing all 105 articles
Browse latest View live

Oracle Audit Vault - Oracle Client Identifier and Last Login

Several standard features of the Oracle database should be kept in mind when considering what alerts and correlations are possible when combining Oracle database and application log and audit...

View Article


Image may be NSFW.
Clik here to view.

Security Implications of Oracle Product Desupport

Oracle is aggressive in desupporting products - most product versions are desupported within 18 months of release except for terminal releases. Oracle Database 11.2.0.3 and Oracle E-Business Suite...

View Article


Image may be NSFW.
Clik here to view.

Detecting and Stopping Cyber Attacks against Oracle Databases

Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though...

View Article

Image may be NSFW.
Clik here to view.

Oracle OpenWorld: Detecting and Stopping Cyber Attacks Against Oracle Databases

Oracle databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though...

View Article

Oracle 12c Unified Auditing - Mixed Mode

Next in our blog series on Oracle 12 Unified Auditing is a discussion of Mixed Mode. Mixed Mode is the default auditing mode for Oracle 12c.  Oracle describes Mixed Mode auditing as a means of becoming...

View Article


What Is Oracle 12 Unified Auditing? The View UNIFIED_AUDIT_TRAIL with 94 Columns

What is Oracle 12c Unified Auditing? The short answer is the view UNIFED_AUDIT_TRAIL. This view consolidates all logging and auditing information into a single source. Regardless of using either Mixed...

View Article

Mandatory Auditing - Oracle 12c Always-On-Auditing

Certainly from an auditing and logging perspective, one of the best new features delivered by Oracle 12c is mandatory auditing of the administrative users such as SYSDBA.  This can be described as...

View Article

Image may be NSFW.
Clik here to view.

Integrigy Guide to Database Auditing and Logging

Most clients do not fully take advantage of their database's auditing and logging features. For databases such as Oracle these features are sophisticated and are able to satisfy most organization’s...

View Article


What can the Oracle Audit Vault Protect?

For Oracle database customers the Oracle Audit Vault can protect the following:SQL statements logs – Data Manipulation Language (DML) statement auditing such as when users are attempting to query the...

View Article


Image may be NSFW.
Clik here to view.

What Do Oracle Audit Vault Collection Agents Do?

The Oracle Audit Vault is installed on a server, and collector agents are installed on the hosts running the source databases.  These collector agents communicate with the audit vault server. If the...

View Article

Oracle Audit Vault Oracle Database Plug-In

The Oracle Audit Vault uses Plug-Ins to define data sources.  The following table summarizes several of the important facts about the Oracle Audit Vault database plug for Oracle databases –Oracle...

View Article

Image may be NSFW.
Clik here to view.

Logging and Auditing Oracle Database Webinar

The auditing and logging capabilities within the Oracle Database are sophisticated and able to satisfy most organizations' security and compliance requirements. However, the auditing and logging setup...

View Article

Oracle Audit Vault - Oracle Client Identifier and Last Login

Several standard features of the Oracle database should be kept in mind when considering what alerts and correlations are possible when combining Oracle database and application log and audit...

View Article


Image may be NSFW.
Clik here to view.

Security Implications of Oracle Product Desupport

Oracle is aggressive in desupporting products - most product versions are desupported within 18 months of release except for terminal releases. Oracle Database 11.2.0.3 and Oracle E-Business Suite...

View Article

Image may be NSFW.
Clik here to view.

Detecting and Stopping Cyber Attacks against Oracle Databases

Oracle Databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though...

View Article


Image may be NSFW.
Clik here to view.

Oracle OpenWorld: Detecting and Stopping Cyber Attacks Against Oracle Databases

Oracle databases are a target of cyber attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though...

View Article

Oracle Database Critical Patch Update (CPU) Planning for 2016

With the start of the new year, it is now time to think about Oracle Critical Patch Updates for 2016.  Oracle releases security patches in the form of Critical Patch Updates (CPU) each quarter...

View Article


Image may be NSFW.
Clik here to view.

All Things Oracle Database Encryption

Encrypting data is a useful tool to protect sensitive data be it at rest, in motion, or in use. For an Oracle Database, encryption may be done at the storage, application, network, and backup layers....

View Article

Image may be NSFW.
Clik here to view.

Oracle Database Security in the Cloud

From the perspective of a database security consultancy, what security requirements change when you move to the Cloud? Assuming an effective database security program is in place, arguably moving to...

View Article

Image may be NSFW.
Clik here to view.

When You Can’t Apply Oracle EBS 11i and R12 CPU Security Patches

Oracle E-Business Suite (EBS) 11i and 12.0 security patches and other security improvements are no longer being provided by Oracle since these products are now under Sustaining Support. After January...

View Article
Browsing all 105 articles
Browse latest View live


Latest Images