Title | Summary | File | |
---|---|---|---|
Oracle E-Business Suite Security for Auditors |
Auditors are trained to understand the financial aspects and the end user functionality of Oracle E-Business Suite. However, most auditors have... |
Whitepapers and Presentations | File |
Upcoming Webinar: Oracle E-Business Suite Security for Auditors | Oracle Security Blog | ||
Eight Key Components of a Database Security Risk Assessment |
To truly secure database environments, periodic security risk assessments should be performed for database environments to review and assess the... |
Security Resources | File |
Effective Oracle E Business Suite Change Management from DBA to Auditor |
For the Oracle E-Business Suite, change management is challenging as the application and technology stack are open and flexible. Changes may... |
Whitepapers and Presentations | File |
Effective Auditing and Logging in Oracle E-Business Suite |
The auditing and logging capabilities within the Oracle E-Business Suite and Oracle Database are sophisticated and able to satisfy most... |
Security Resources | File |
Top 10 Oracle E-Business Suite Security Risks |
The Oracle E-Business Suite is a complex application with multiple tiers and technologies, which makes properly securing an Oracle EBS environment... |
Whitepapers and Presentations | File |
Guide to PeopleSoft Logging and Auditing |
Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy... |
Whitepapers and Presentations | File |
PeopleSoft Logging and Auditing |
Logging and auditing are one of the pillars of PeopleSoft Security. Both application and database auditing is required. Logging and auditing... |
Oracle Security Blog | |
PeopleSoft Database Secure Baseline Configuration |
PeopleSoft, similar to other major ERP applications, while depending on a database to store information, arguably does not secure the supporting... |
Oracle Security Blog | |
Trusting Privileged Users, DBMS_SQLHASH, and Three Misconceptions about Encryption |
Clients often contact Integrigy requesting assistance to protect their sensitive data. Frequently these are requests for assistance to locate and... |
Oracle Security Blog |