Title Summary File
PeopleSoft Security

This is a quick summary of Integrigy’s latest research on PeopleSoft. Was sending this to a client and decided it was a good posting:

...

Whitepapers and Presentations, Oracle Security Blog
Guide to PeopleSoft Logging and Auditing

Most clients do not fully take advantage of PeopleSoft’s auditing and logging features. These features are sophisticated and are able to satisfy...

Whitepapers and Presentations File
How to Control and Secure PeopleSoft DBAs and Developers

A common compliance challenge for most PeopleSoft environments is how to control and secure direct database access by DBAs and developers,...

Whitepapers and Presentations File
How to Control and Secure Oracle E-Business Suite DBAs and Developers

A common compliance challenge for most Oracle E-Business Suite environments is how to control and secure direct database access by DBAs and...

Whitepapers and Presentations File
Integrigy Guide to Oracle Audit Vault

The Integrigy Guide to Oracle Audit Vault provides an introduction to Oracle Audit Vault and Integrigy's recommendations for deployment and...

Whitepapers and Presentations File
Oracle 12c Unified Auditing

In Oracle 12c, a new database auditing foundation has been introduced.  Oracle Unified Auditing changes the fundamental auditing...

Security Resources File
OBIEE Security Examined

Oracle Business Intelligence Enterprise Edition (OBIEE) 11g is a powerful tool for accessing data, however, this power means OBIEE security is...

Security Resources File
Oracle E-Business Suite: Credit Cards and PCI Compliance

All Oracle E-Business Suite implementations that "store, process, or transmit cardholder data" must comply with Payment Card Industry (...

Security Resources File
Spoofing Oracle Session Information

Oracle Database session information includes database user name, operating system user name, host, terminal, IP address, module, program,...

Security Resources File
Building an Audit Trail in an Oracle Applications Environment

Sarbanes-Oxley’s section 404 requires a company’s key systems be audited. However, many companies have 'unauditable' systems and don’t even know...

Security Resources File

Pages