Title Summary File
Guide to PeopleSoft Logging and Auditing - Revised Whitepaper

After discussions at Collaborate2017 with several PeopleSoft architects we have revised our Guide to PeopleSoft Auditing. The key...

Oracle Security Blog
Logging PeopleSoft, E-Business Suite and SAP End-Users in Oracle RDBMS Audit Logs

Logging and auditing database connections to application users for SAP, PeopleSoft and the E-Business Suite is possible with a standard feature...

Whitepapers and Presentations File
Capture Change Ticket Numbers In Oracle Database Audit Streams

Reconciling database events to ticket numbers is a time consuming manual task that can be easily automated. The solution is to populate the...

Whitepapers and Presentations File
Integrigy COLLABORATE 17 Sessions - Presentations on Oracle Database, Oracle E-Business Suite, and PeopleSoft Security

Integrigy is presenting nine papers this year at COLLABORATE 17 (...

Oracle Security Blog
Integrigy COLLABORATE 17 Sessions - OAUG, IOUG, and Quest

Integrigy is presenting nine papers this year at COLLABORATE 17 (...

Whitepapers and Presentations File
PeopleSoft Security

This is a quick summary of Integrigy’s latest research on PeopleSoft. Was sending this to a client and decided it was a good posting: 

...
Whitepapers and Presentations, Oracle Security Blog
Guide to PeopleSoft Logging and Auditing

Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy...

Whitepapers and Presentations File
How to Control and Secure Your DBAs and Developers in PeopleSoft

...

Security Resources File
How to Control and Secure PeopleSoft DBAs and Developers

A common compliance challenge for most PeopleSoft environments is how to control and secure direct database access by DBAs and developers,...

Whitepapers and Presentations File
PeopleSoft Data Mover Security

The Data Mover allows for total manipulation of data within PeopleSoft. You can use it to transfer data among PeopleSoft databases, regardless of...

Oracle Security Blog

Pages