Oracle Database Security: Preventing Enterprise Data Leaks at the Source

Addressing information protection and control (IPC) is a complex challenge. Enterprises must secure their databases to protect sensitive information and comply with policy regulations. Learn more about threats to business information, the impact of government regulations on data protection, and how database security best practices can prevent sensitive customer data or company information from being distributed.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

Databases and ERP Selection: Oracle vs. SQL Server

The database is an essential component of enterprise applications such as enterprise resource planning (ERP) and enterprise asset management (EAM). This white paper outlines the advantages and disadvantages of the Oracle and Microsoft SQL Server database platforms. How do the two compare when it comes to reliability, scalability, and total cost of ownership (TCO) when integrated with enterprise software?
  • Written By:
  • Published On:

Comparing the Total Cost of Ownership of Business Intelligence Solutions

For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions.
  • Written By:
  • Published On:

Linked Enterprise Data: Principles, Uses, and Benefits

Over time, as a result of operating pressures, the proliferation of tools, and changing technology, the corporate information system (IS) has become fragmented. Whereas the database formed the heart of the system 20 years ago, today there are countless sources of data: ERP, customer relations systems, sales management, internal directories, intranets, extranets, websites, etc. Yet this huge quantity of data is not being mined for the wealth and scope of its potential by either employees or information system applications, mainly because the data is closed off in an array of silos. Read this white paper to see how linked enterprise data (LED) can help.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Cost Effective Security and Compliance with Oracle Database 11g Release 2

Increasingly sophisticated threats and the push toward data consolidation and cloud computing are in part why a defense-in-depth approach to security is critical to safeguarding data. Data breach investigations have shown that security controls must be multi-layered to protect against threats, and the ever changing regulatory landscape and focus on privacy demonstrate the need for solutions to be transparent and cost effective. Read this white paper for more.
  • Written By:
  • Published On:

A Layered Security Strategy for Preventing Data Leakage, Theft, and Insider Abuse

Threats to data content posed by insiders. Compliance regulations entailing stringent data controls. It’s hardly surprising companies need to find more secure methods for keeping confidential data under lock and key. Learn about managing security challenges across three important layers of your IT infrastructure, and how database activity monitoring (DAM) and database auditing and protection (DAP) can help you.
  • Written By:
  • Published On:

How to Prevent Data Leaks and Achieve PCI Compliance

The greatest threat on the Internet involves increased data theft, data leakage, and targeted attacks for the purpose of stealing confidential information. To combat this, the payment card industry (PCI) has created a data security standard (DSS) that holds all merchants—regardless of size—to much higher standards of performance when it comes to protecting customers’ financial and personal information.
  • Written By:
  • Published On: