Title Summary File
Oracle E-Business Suite Security for Auditors

Auditors are trained to understand the financial aspects and the end user functionality of Oracle E-Business Suite. However, most auditors have...

Whitepapers and Presentations File
Upcoming Webinar: Oracle E-Business Suite Security for Auditors

Oracle E-Business Suite Security for Auditors

...

Oracle Security Blog
Eight Key Components of a Database Security Risk Assessment

To truly secure database environments, periodic security risk assessments should be performed for database environments to review and assess the...

Security Resources File
Effective Oracle E Business Suite Change Management from DBA to Auditor

For the Oracle E-Business Suite, change management is challenging as the application and technology stack are open and flexible.  Changes may...

Whitepapers and Presentations File
Effective Auditing and Logging in Oracle E-Business Suite

The auditing and logging capabilities within the Oracle E-Business Suite and Oracle Database are sophisticated and able to satisfy most...

Security Resources File
Top 10 Oracle E-Business Suite Security Risks

The Oracle E-Business Suite is a complex application with multiple tiers and technologies, which makes properly securing an Oracle EBS environment...

Whitepapers and Presentations File
Guide to PeopleSoft Logging and Auditing

Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy...

Whitepapers and Presentations File
PeopleSoft Logging and Auditing

Logging and auditing are one of the pillars of PeopleSoft Security.  Both application and database auditing is required. Logging and auditing...

Oracle Security Blog
PeopleSoft Database Secure Baseline Configuration

PeopleSoft, similar to other major ERP applications, while depending on a database to store information, arguably does not secure the supporting...

Oracle Security Blog
Trusting Privileged Users, DBMS_SQLHASH, and Three Misconceptions about Encryption

Clients often contact Integrigy requesting assistance to protect their sensitive data. Frequently these are requests for assistance to locate and...

Oracle Security Blog

Pages