Title Summary File
Integrigy COLLABORATE 17 Sessions - Presentations on Oracle Database, Oracle E-Business Suite, and PeopleSoft Security

Integrigy is presenting nine papers this year at COLLABORATE 17 (...

Oracle Security Blog
Integrigy COLLABORATE 17 Sessions - OAUG, IOUG, and Quest

Integrigy is presenting nine papers this year at COLLABORATE 17 (...

Whitepapers and Presentations File
PeopleSoft Security

This is a quick summary of Integrigy’s latest research on PeopleSoft. Was sending this to a client and decided it was a good posting:

...

Whitepapers and Presentations, Oracle Security Blog
Guide to PeopleSoft Logging and Auditing

Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy...

Whitepapers and Presentations File
How to Control and Secure Your DBAs and Developers in PeopleSoft

...

Security Resources File
How to Control and Secure PeopleSoft DBAs and Developers

A common compliance challenge for most PeopleSoft environments is how to control and secure direct database access by DBAs and developers,...

Whitepapers and Presentations File
PeopleSoft Data Mover Security

The Data Mover allows for total manipulation of data within PeopleSoft. You can use it to transfer data among PeopleSoft databases, regardless of...

Oracle Security Blog
PeopleSoft Process Scheduler Security

When performing a PeopleSoft security audit Integrigy carefully reviews batch processing activity generated through the Process Scheduler. Of...

Oracle Security Blog
PeopleSoft User Security

When performing a PeopleSoft security audit, reconciling users should be one of the first tasks. This includes default accounts created through...

Oracle Security Blog
PeopleSoft Jolt Security

Jolt along with Tuxedo supports PeopleSoft web requests. Specifically, Jolt is the layer between the application server and the web server. It is...

Oracle Security Blog

Pages