X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 oracle security research


Oracle
Founded in 1977, Oracle Corporation (NASDAQ: ORCL) offers its database, tools, and application products, along with related consulting, education, and support

oracle security research  Founded in 1977, Oracle Corporation (NASDAQ: ORCL) offers its database, tools, and application products, along with related consulting, education, and support services, to more than 400,000 customers in more than 145 countries around the world. Today, Oracle is all about simplifying: shifting the complexity from IT, moving it out of the enterprise by engineering hardware and software to work together—to reside in the cloud and in the data center. By eliminating complexity and simplifying IT,

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Information Security Selection Software Evaluation Report

Based on a wide range of security-related issues, the Information Security Knowledge Base covers both solution suites and individual software packages. Organizations can evaluate the capabilities of different vendors' firewall, intrusion detection, anti-virus, virtual private network, public key infrastructure, cryptography, and other enterprise security solutions. 

Start Now

Documents related to » oracle security research

Oracle Database Security: Preventing Enterprise Data Leaks at the Source


Addressing information protection and control (IPC) is a complex challenge. Enterprises must secure their databases to protect sensitive information and comply with policy regulations. Learn more about threats to business information, the impact of government regulations on data protection, and how database security best practices can prevent sensitive customer data or company information from being distributed.

oracle security research   Read More

Cost Effective Security and Compliance with Oracle Database 11g Release 2


Increasingly sophisticated threats and the push toward data consolidation and cloud computing are in part why a defense-in-depth approach to security is critical to safeguarding data. Data breach investigations have shown that security controls must be multi-layered to protect against threats, and the ever changing regulatory landscape and focus on privacy demonstrate the need for solutions to be transparent and cost effective. Read this white paper for more.

oracle security research   Read More

Oracle Gets SAP'ed by IBM


SAP AG (NYSE: SAP) and IBM (NYSE: IBM) today announced an agreement to expand their global sales, marketing and development relationship. As part of this agreement, the two companies will work together to provide expanded choices for customers that wish to implement mySAP.com and IBM's DB2 Universal Database on a variety of hardware platforms. Following in the footsteps of Siebel, SAP has abandoned Oracle and is standardizing on DB2 UDB as its preferred platform. The deal is estimated at $400 million in sales annually.

oracle security research   Read More

Intrusion Detection and Security Auditing In Oracle


Database intrusion detection and security auditing continues to grow in importance. Thus, monitoring your database applications is a critical component of achieving a strong defense-in-depth around your sensitive data. However, to be efficient and effective, you must use the right combination of tools. Monitoring should never replace other layers in the security stack—it should complement the existing pieces instead.

oracle security research   Read More

Focus Research


Focus makes the world's business expertise available to everyone. At the heart of Focus is a network of thousands of leading business and technology experts who are thought leaders, veteran practitioners and upstart innovators in hundreds of different topics and markets.

oracle security research   Read More

Bootcamp for the Pros; Why Ernst & Young Will Lead Security Auditing Standards


Original News & Educational Review Course Summary Ernst & Young, has put together the quintessential course for security engineers looking to improve their ability to protect their organization's website, systems, and network. Dubbed eXtreme Hacking, and carrying a price tag of $5,000 a slot, this course is for anyone but hacks. With an impressive course book that fills a two-inch thick binder, leading Ernst & Young security engineers take you step-by-step through all the ways that bad guys try to subvert your mission critical servers and network configurations. Using dual-bootable NT-Linux laptops, and an accompanying network setup for practicing subversive attacks and exploits, attendees will leave the course with an entire new bag of tools and tricks that help them understand how bad guys identify target IP addresses, collect information about the systems they plan on compromising, and exploit weaknesses without being noticed. The idea is to learn how to figure out what the weaknesses are in your organization's network before the bad guys do.

oracle security research   Read More

Research Note: IBM Cognos Express


Many senior managers of small and medium-sized businesses hesitate at the cost and complexity of adopting technology such as business intelligence (BI) and performance management (PM). But these companies cannot postpone the adoption of BI or PM indefinitely. This research note explains how smaller companies can benefit from adopting a BI and PM solution, and makes the case for adopting IBM Cognos Express.

oracle security research   Read More

JD Edwards EnterpriseOne


Oracle JD Edwards EnterpriseOne (formerly PeopleSoft) is a suite of modular pre-integrated industry specific business applications designed for rapid deployment and ease of administration on a pure internet architecture. It is suited for organizations that manufacture, construct, distribute, service, or manage products or physical assets.

oracle security research   Read More

Ventana Research


Ventana Research is a research and advisory services firm that provides guidance to help organizations manage and optimize performance.

oracle security research   Read More