FIND WHITEPAPERS

YOU FILTERED BY:

  • Topic is Governance, Risk & Compliance Management  undo

FILTER BY:

COMPANY

  • Alert Enterprises
  • Cyber-Ark
  • Guardium
  • Oracle
  • Princeton Softech
  • QSoftware
  • Quantix
  • The Wercs, Ltd.

RATING

  • At least 4 stars
  • At least 3 stars
  • At least 2 stars
SUBMIT WHITEPAPER >>
Thank you for your submission. You will be contacted by an Oracle Whitepapers account representative.
Name:
 
Email:
 
Title:
 
Company:
 
Phone:
 
Comments:
 
Showing Results 1-27 of 27
Sort by: Publish Date Rating Anatomy of a JD Edwards Archiving Project
Presented by Princeton Softech
Certified Partner
Published: 2008-02-13
Download this white paper and learn how JD Edwards sites are realizing the benefits of a full-lifecycle enterprise data management strategy... (more)
Download this white paper and learn how JD Edwards sites are realizing the benefits of a full-lifecycle enterprise data management strategy that includes database archiving to deliver enhanced application performance and lower costs. (less)
 162 views
Anatomy of a PeopleSoft Archiving Project
Presented by Princeton Softech
Certified Partner
Published: 2008-02-13
Download this white paper and learn how PeopleSoft sites are realizing the benefits of a full-lifecycle enterprise data management strategy that... (more)
Download this white paper and learn how PeopleSoft sites are realizing the benefits of a full-lifecycle enterprise data management strategy that includes database archiving to deliver enhanced application performance and lower costs. (less)
 221 views
Anatomy of a Siebel Archiving Project
Presented by Princeton Softech
Certified Partner
Published: 2008-02-13
Download this white paper and learn how Siebel sites are realizing the benefits of a full-lifecycle enterprise data management strategy that... (more)
Download this white paper and learn how Siebel sites are realizing the benefits of a full-lifecycle enterprise data management strategy that includes database archiving to deliver enhanced application performance and lower costs. (less)
 219 views
Anatomy of an Oracle E-Business Archiving Project
Presented by Princeton Softech
Certified Partner
Published: 2008-02-13
Download this white paper and learn how Oracle E-business Suite sites are realizing the benefits of a full-lifecycle enterprise data management... (more)
Download this white paper and learn how Oracle E-business Suite sites are realizing the benefits of a full-lifecycle enterprise data management strategy that includes database archiving to deliver enhanced application performance and reduce costs. (less)
 340 views
Application Retirement: EDM Strategies For Decommissioning Projects
Presented by Princeton Softech
Certified Partner
Published: 2008-03-27
Organizations make substantial investments in managing and maintaining enterprise applications, as well as their supporting databases and IT infrastructure. Download this... (more)
Organizations make substantial investments in managing and maintaining enterprise applications, as well as their supporting databases and IT infrastructure. Download this white paper and learn how to to simplify your application portfolio and control your costs. (less)
 193 views
Closing The Data Privacy Gap For Oracle E-Business Suite
Presented by Princeton Softech
Certified Partner
Published: 2008-01-11
How can IT organizations protect sensitive data? Industry analysts recommend “de-identifying” or masking data as a best practice for protecting privacy.... (more)
How can IT organizations protect sensitive data? Industry analysts recommend “de-identifying” or masking data as a best practice for protecting privacy. This White Paper explains why protecting sensitive information and ensuring privacy have become high priorities and the requirements for selecting a data privacy solution. (less)
 86 views
Closing The Data Privacy Gap For Oracle's Siebel CRM Applications
Presented by Princeton Softech
Certified Partner
Published: 2008-03-28
How can IT organizations protect sensitive data? Industry analysts recommend “de-identifying” or masking data as a best practice for protecting privacy.... (more)
How can IT organizations protect sensitive data? Industry analysts recommend “de-identifying” or masking data as a best practice for protecting privacy. This White Paper explains why protecting sensitive information and ensuring privacy have become high priorities and the requirements for selecting a data privacy solution. (less)
 126 views
Creating Focused Siebel Test Databases
Presented by Princeton Softech
Certified Partner
Published: 2008-01-11
Download this White Paper and learn how to optimize test environments to speed the deployment of Siebel applications. Allowing you to... (more)
Download this White Paper and learn how to optimize test environments to speed the deployment of Siebel applications. Allowing you to deliver application upgrades and deployments quicker, cheaper and more accurately. (less)
 116 views
Download a Key Chapter of The Definitive Guide to Database Security and Auditing
Presented by Guardium
Partner
Published: 2008-01-02
Authored by database security expert, IBM Gold Consultant, and Guardium CTO Ron Ben-Natan, Ph.D., Implementing Database Security and Auditing (Elsevier Press,... (more)
Authored by database security expert, IBM Gold Consultant, and Guardium CTO Ron Ben-Natan, Ph.D., Implementing Database Security and Auditing (Elsevier Press, 2005) is the definitive guide for DBAs, IT security professionals, and auditors. CHAPTER 12, AUDITING CATEGORIES: Learn which audit trails to implement in order to address common compliance requirements, including audit trails for: Database logins and logouts, Client information, Usage outside normal hours, Database errors, Changes to privileges and other security attributes…and many others. (less)
 337 views
Effective Governance Risk and Compliance with JD Edwards Enterprise One
Presented by QSoftware
Published: 2008-08-07
Q Software is Oracle’s only Certified Partner providing security Governance Risk and Compliance solutions for JD Edwards customers, and is Oracle’s... (more)
Q Software is Oracle’s only Certified Partner providing security Governance Risk and Compliance solutions for JD Edwards customers, and is Oracle’s selected Enterprise Security and GRC global partner for JD Edwards. Our security management solutions have been certified by Oracle and are recommended by Oracle in its white papers on achieving compliance. They are also recommended by leading audit firms. We support the JD Edwards EnterpriseOne Financial Management and Compliance Console (FMCC) development and complement it with our own comprehensive compliance reporting solutions. More than 250 customers tell us we typically cut their security costs by up to 80%. No wonder ours are the Security solutions of choice for JD Edwards customers. (less)
 106 views
Forrester Consulting Case Study on Database Security & Compliance (with ROI Analysis)
Presented by Guardium
Partner
Published: 2008-03-31
This commissioned Forrester Consulting case study describes how a F500 company:
  • Simplified database monitoring for SOX without performance impact or... (more)
  • This commissioned Forrester Consulting case study describes how a F500 company:
  • Simplified database monitoring for SOX without performance impact or database changes.
  • Reduced DBA effort with automated reporting and an appliance-based solution (self-contained storage, preconfigured applications, SOX reports, embedded DBMS, etc.).
  • Captures all activities (DDL, DML, DCL, failed logins, bind values, local access, etc.).
  • Created a single set of audit policies and audit repository for all platforms (Oracle, SQL Server, IBM DB2) accessed via Siebel, SAP and 22 other financial systems.
  • Provides real-time security for unauthorized changes including data updates.
  • Delivered 239% ROI and 5.9 months payback compared to homegrown scripts using native logging/auditing.
  • (less)
     219 views
    How Enterprise Password Vault™ Helps to Meet Key Requirements within the PCI DSS
    Presented by Cyber-Ark
    Partner
    Published: 2008-07-28
    The Payment Card Industry Data Security (PCI DSS) defines security measures to protect cardholder information that must be implemented by processors,... (more)
    The Payment Card Industry Data Security (PCI DSS) defines security measures to protect cardholder information that must be implemented by processors, merchants and service providers. Cyber-Ark’s EPV addresses the business concerns and regulatory mandates for sensitive document security by providing a centralized secure repository and sharing platform for an organization’s most highly sensitive information. Based on our patented and ICSA validated secure Digital Vault technology, the Enterprise Password Vault creates a multiple-layered information security infrastructure that is easy to use, simple to adopt and efficient to administer, all while providing the security, flexibility and detailed tracking capabilities missing from today’s plethora of one-dimensional encryption only based solutions. (less)
     34 views
    How Midsize Businesses Can Reduce Costs, Secure Data and Ensure Compliance with an Identity Management Program
    Presented by Oracle
    Published: 2008-03-14
    This white paper highlights the unique needs of midsize businesses and explores the factors driving them toward stronger identity management platforms,... (more)
    This white paper highlights the unique needs of midsize businesses and explores the factors driving them toward stronger identity management platforms, such as Oracle Identity Management. (less)
     90 views
    IDC Report: Preventing Data Leaks at the Source
    Presented by Oracle
    Published: 2008-04-09
    The growing number of high-profile data breach incidents and numerous information-intensive government and industry regulations requiring protection of personal information and... (more)
    The growing number of high-profile data breach incidents and numerous information-intensive government and industry regulations requiring protection of personal information and corporate digital assets are forcing organizations to adopt proactive and cost-effective information protection and control (IPC) solutions. This new IDC report discusses the growing internal threats to business information, the impact of regulations on data protection, and how enterprises must adopt database security best practices to prevent theft of sensitive personal and corporate information. Learn how IDC believes that Oracle offer customers a comprehensive, integrated set of security products that address both insider threat mitigation and regulatory requirements (less)
     261 views
    Keep Out: This Means You, IT Admin
    Presented by Cyber-Ark
    Partner
    Published: 2008-07-29
    Cyber-Ark tops field of four privilege-account management (PAM) products. Learn why with this NetworkWorld article.... (more)
    Cyber-Ark tops field of four privilege-account management (PAM) products. Learn why with this NetworkWorld article. (less)
     73 views
    Oracle Advanced Security Technical White Paper
    Presented by Oracle
    Published: 2008-04-09
    Oracle Advanced Security provides transparent, standards-based security that protects data on the network, on disk and on backup media. Learn how... (more)
    Oracle Advanced Security provides transparent, standards-based security that protects data on the network, on disk and on backup media. Learn how to use the Oracle Advanced Security as a key component of your defense-in-depth strategy for protecting data in transit and at rest. (less)
     765 views
    Oracle Audit Vault
    Presented by Oracle
    Published: 2008-04-09
    Auditing is playing an increasingly important role in the areas of compliance, privacy, and security. Learn how Oracle Audit Vault automates... (more)
    Auditing is playing an increasingly important role in the areas of compliance, privacy, and security. Learn how Oracle Audit Vault automates the audit collection and analysis process, turning audit data into a key security resource to help address today's security and compliance challenges. (less)
     265 views
    Oracle Database 11g Transparent Solutions for Security and Compliance
    Presented by Oracle
    Published: 2008-04-09
    Enterprises face many challenges safeguarding data against internal and external threats and complying with data privacy regulations. This whitepaper outlines how... (more)
    Enterprises face many challenges safeguarding data against internal and external threats and complying with data privacy regulations. This whitepaper outlines how Oracle Database 11g a comprehensive portfolio of security solutions to address these challenges. (less)
     269 views
    Oracle Database Vault
    Presented by Oracle
    Published: 2008-04-09
    Strengthening internal controls for regulations, enforcing industry best practices, and guarding against insider threats are just a few of the challenges... (more)
    Strengthening internal controls for regulations, enforcing industry best practices, and guarding against insider threats are just a few of the challenges facing organizations in today's global economy. Controlling access to databases, applications and data requires sophisticated access controls that are enforced from within the database. Learn how Oracle Database Vault is the industry's leading solution for safeguarding data from unauthorized activity by any user, including privileged application or DBA users. (less)
     294 views
    Oracle Label Security for Privacy and Compliance
    Presented by Oracle
    Published: 2008-04-10
    Oracle Label Security can be used to address numerous operational issues related to security, compliance and privacy. Learn how label authorizations... (more)
    Oracle Label Security can be used to address numerous operational issues related to security, compliance and privacy. Learn how label authorizations provide tremendous flexibility in making access control decisions and enforcing separation of duty. (less)
     255 views
    Oracle Label Security: Best Practices for Government and Defense Applications
    Presented by Oracle
    Published: 2008-04-09
    Oracle Label Security is a powerful, yet simple to use tool for classifying data. By applying labels to data, government agencies... (more)
    Oracle Label Security is a powerful, yet simple to use tool for classifying data. By applying labels to data, government agencies can enforce “need to know” and other data compartmentalization policies. Read this white paper to learn best practices to successfully use Oracle Label Security to restrict access to sensitive information in government and defense applications. (less)
     258 views
    Privileged Identity Management: IDC Defines an Identity
    Presented by Cyber-Ark
    Partner
    Published: 2008-07-28
    Over the past several years enterprise IT organizations have been forced to publicly acknowledge an unsettling truth: Risk associated with insider... (more)
    Over the past several years enterprise IT organizations have been forced to publicly acknowledge an unsettling truth: Risk associated with insider threats far exceeds that of outsider threats. These insider threats affect organizations at many levels, serving to erode consumer trust and increase corporate costs exponentially. While identity and access management (IAM) solutions typically serve as the foundation for access control and audit, insider threat remains a critical obstacle within the IT enterprise. IDC believes that a significant portion of the insider threat problem can be alleviated by applying a specialized subset of IAM technologies, a privileged identity management (PIM) platform. (less)
     51 views
    The case for remote database and applications support in providing critical service assurance & ROI
    Presented by Quantix
    Certified Advantage Partner
    Published: 2007-12-28
    Need to make the case for remote database and applications support for your UK based business? This insightful paper by Quantix... (more)
    Need to make the case for remote database and applications support for your UK based business? This insightful paper by Quantix provides real world examples of how both commercial and government customers drive greater ROI and critical service assurance using remote database management and support applications. (less)
     170 views
    Upgrade & Archive Strategies For JD Edwards
    Presented by Princeton Softech
    Certified Partner
    Published: 2008-01-11
    This White Paper describes the alternative archive and upgrade scenarios andprovides insight into selecting the solution to best meet your requirements.... (more)
    This White Paper describes the alternative archive and upgrade scenarios andprovides insight into selecting the solution to best meet your requirements. It has been shown that archiving improves the outcome of upgrade projects, giving sites greater business value and higher overall success rates. (less)
     196 views
    Upgrade & Archive Strategies For Oracle E-Business Suite
    Presented by Princeton Softech
    Certified Partner
    Published: 2008-01-11
    This White Paper describes the alternative archive and upgrade scenarios and provides insight into selecting the solution to best meet your... (more)
    This White Paper describes the alternative archive and upgrade scenarios and provides insight into selecting the solution to best meet your requirements. It has been shown that archiving improves the outcome of upgrade projects, giving sites greater business value and higher overall success rates. (less)
     247 views
    Use Integrated Software to Automate MSDS Authoring & Distribution, and Comply with REACH
    Presented by The Wercs, Ltd.
    Partner
    Published: 2008-07-16
    This article argues for the establishment of a Central Substance database within an organization to meet the growing regulatory and compliance... (more)
    This article argues for the establishment of a Central Substance database within an organization to meet the growing regulatory and compliance requirements associated with chemical based finished goods. Many ERP and legacy based solutions are well equipped to handle product based information, however the establishment of component based data, integrated with regulatory content can be lacking. Integrating a solution that can seamlessly interact with your ERP solution, while maintaining the component (ingredient) based regulatory data is essential for complying with regulations around the globe. (less)
     46 views
    Where Physical Security Meets Logical Security
    Presented by Alert Enterprises
    Partner
    Published: 2008-08-12
    It’s the single most overlooked gap in enterprise security. Either you don’t know about it, you don’t know what to do... (more)
    It’s the single most overlooked gap in enterprise security. Either you don’t know about it, you don’t know what to do about it or you think there is no solution short of magic. Unless you’ve been living in a cave or you’re completely irresponsible, you’ve got security for your logical systems, applications and databases. You’ve got more security for your physical locations. And, if you’re diligent in regulatory compliance, you’ve got environmental health and safety covered too. Congratulations…maybe. (less)
     125 views