FIND WHITEPAPERS

YOU FILTERED BY:

  • Company is Oracle  undo
  • Topic is Security  undo

FILTER BY:

RATING

  • At least 4 stars
  • At least 3 stars
SUBMIT WHITEPAPER >>
Thank you for your submission. You will be contacted by an Oracle Whitepapers account representative.
Name:
 
Email:
 
Title:
 
Company:
 
Phone:
 
Comments:
 
Showing Results 1-9 of 9
Sort by: Rating Title
Action Plan for Securing Enterprise Data
Presented by Oracle
Published: 2009-02-17
According to a survey of Independent Oracle Users Group (IOUG) members, one out of five believed their organization was likely to... (more)
According to a survey of Independent Oracle Users Group (IOUG) members, one out of five believed their organization was likely to experience a data breach. Learn more about the findings of the 2008 IOUG Data Security Report as well as the measures needed to protect your data and your business. (less)
 100 views
Oracle Label Security for Privacy and Compliance
Presented by Oracle
Published: 2008-04-10
Oracle Label Security can be used to address numerous operational issues related to security, compliance and privacy. Learn how label authorizations... (more)
Oracle Label Security can be used to address numerous operational issues related to security, compliance and privacy. Learn how label authorizations provide tremendous flexibility in making access control decisions and enforcing separation of duty. (less)
 308 views
IDC Report: Preventing Data Leaks at the Source
Presented by Oracle
Published: 2008-04-09
The growing number of high-profile data breach incidents and numerous information-intensive government and industry regulations requiring protection of personal information and... (more)
The growing number of high-profile data breach incidents and numerous information-intensive government and industry regulations requiring protection of personal information and corporate digital assets are forcing organizations to adopt proactive and cost-effective information protection and control (IPC) solutions. This new IDC report discusses the growing internal threats to business information, the impact of regulations on data protection, and how enterprises must adopt database security best practices to prevent theft of sensitive personal and corporate information. Learn how IDC believes that Oracle offer customers a comprehensive, integrated set of security products that address both insider threat mitigation and regulatory requirements (less)
 349 views
Oracle Database 11g Transparent Solutions for Security and Compliance
Presented by Oracle
Published: 2008-04-09
Enterprises face many challenges safeguarding data against internal and external threats and complying with data privacy regulations. This whitepaper outlines how... (more)
Enterprises face many challenges safeguarding data against internal and external threats and complying with data privacy regulations. This whitepaper outlines how Oracle Database 11g a comprehensive portfolio of security solutions to address these challenges. (less)
 360 views
Oracle Advanced Security Technical White Paper
Presented by Oracle
Published: 2008-04-09
Oracle Advanced Security provides transparent, standards-based security that protects data on the network, on disk and on backup media. Learn how... (more)
Oracle Advanced Security provides transparent, standards-based security that protects data on the network, on disk and on backup media. Learn how to use the Oracle Advanced Security as a key component of your defense-in-depth strategy for protecting data in transit and at rest. (less)
 1020 views
Oracle Database Vault
Presented by Oracle
Published: 2008-04-09
Strengthening internal controls for regulations, enforcing industry best practices, and guarding against insider threats are just a few of the challenges... (more)
Strengthening internal controls for regulations, enforcing industry best practices, and guarding against insider threats are just a few of the challenges facing organizations in today's global economy. Controlling access to databases, applications and data requires sophisticated access controls that are enforced from within the database. Learn how Oracle Database Vault is the industry's leading solution for safeguarding data from unauthorized activity by any user, including privileged application or DBA users. (less)
 369 views
Oracle Audit Vault
Presented by Oracle
Published: 2008-04-09
Auditing is playing an increasingly important role in the areas of compliance, privacy, and security. Learn how Oracle Audit Vault automates... (more)
Auditing is playing an increasingly important role in the areas of compliance, privacy, and security. Learn how Oracle Audit Vault automates the audit collection and analysis process, turning audit data into a key security resource to help address today's security and compliance challenges. (less)
 344 views
Oracle Label Security: Best Practices for Government and Defense Applications
Presented by Oracle
Published: 2008-04-09
Oracle Label Security is a powerful, yet simple to use tool for classifying data. By applying labels to data, government agencies... (more)
Oracle Label Security is a powerful, yet simple to use tool for classifying data. By applying labels to data, government agencies can enforce “need to know” and other data compartmentalization policies. Read this white paper to learn best practices to successfully use Oracle Label Security to restrict access to sensitive information in government and defense applications. (less)
 345 views
How Midsize Businesses Can Reduce Costs, Secure Data and Ensure Compliance with an Identity Management Program
Presented by Oracle
Published: 2008-03-14
This white paper highlights the unique needs of midsize businesses and explores the factors driving them toward stronger identity management platforms,... (more)
This white paper highlights the unique needs of midsize businesses and explores the factors driving them toward stronger identity management platforms, such as Oracle Identity Management. (less)
 113 views