Title Summary File
Turbocharge Your Database Auditing with Oracle Unified Auditing

Unified Auditing was introduced with the release of Oracle 12c and changes how Oracle database auditing and logging is accomplished.  In...

Security Resources File
Oracle E-Business Suite Security for Auditors

Auditors are trained to understand the financial aspects and the end user functionality of Oracle E-Business Suite. However, most auditors have...

Whitepapers and Presentations File
Upcoming Webinar: Oracle E-Business Suite Security for Auditors

Oracle E-Business Suite Security for Auditors

...

Oracle Security Blog
Implementing Two-Factor Authentication (2FA/MFA) for Oracle E-Business Suite

Two-factor authentication (2FA) or multi-factor authentication (MFA) is an extra layer of security to ensure that users accessing an application...

Security Resources File
Eight Key Components of a Database Security Risk Assessment

To truly secure database environments, periodic security risk assessments should be performed for database environments to review and assess the...

Security Resources File
Effective Oracle E Business Suite Change Management from DBA to Auditor

For the Oracle E-Business Suite, change management is challenging as the application and technology stack are open and flexible.  Changes may...

Whitepapers and Presentations File
Effective Auditing and Logging in Oracle E-Business Suite

The auditing and logging capabilities within the Oracle E-Business Suite and Oracle Database are sophisticated and able to satisfy most...

Security Resources File
Guide to PeopleSoft Logging and Auditing

Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy...

Whitepapers and Presentations File
Oracle Discoverer Security Alert - High impact to SOX Compliance and Financial Reporting

For those clients using Oracle Discoverer, especially those using Discoverer with the Oracle E-Business Suite for financial reporting, the October...

Oracle Security Blog
Obtaining Value from your Database Activity Monitoring (DAM) Solution

Database activity monitoring (DAM) solutions can help organizations to satisfy complex database security and compliance challenges.  However...

Security Resources File

Pages