Tag: Database & Technology
Attendees will learn how to use the powerful and often forgotten LogMiner utility to their advantage. In this presentation you will learn how to use the Oracle LogMiner utility to increase database security, recover from logical corruption, capture user DDL and replicate your databases to DR sites and to off-prem databases in the cloud. After…
-
- Whitepapers & presentations
- 4/03/17
What you wanted to know about the Alert Log all the time. A contribution about formats, contents, versions and differences. We will learn about different tools and also, what we can't see from this famous log file. The lecture also includes a quick overview about the components of an Oracle Database System. This allows the listener to…
-
- Whitepapers & presentations
- 4/03/17
What you wanted to know about the Alert Log all the time. A contribution about formats, contents, versions and differences. We will learn about different tools and also, what we can't see from this famous log file. The lecture also includes a quick overview about the components of an Oracle Database System. This allows the listener to…
-
- Whitepapers & presentations
- 4/03/17
This presentation is a case study that will demostrate that implementing Virtual Private Database and Database Data Vault allows data access restriction to sensitive data at table row level from all unauthorized privilged user, including SYS. Why still allowing SYS user to access and perform required database functions. Virtual Private Database (VPD) secures data from…
-
- Whitepapers & presentations
- 4/03/17
With the increased adoption of the Cloud, security professionals often face the challenge where they have to apply security controls efficiently for databases both on-premise and in the Cloud. This session will address the challenges related to managing audit data collection and encryption keys in hybrid scenarios, by maintaining the audit data and encryption keys…
-
- Whitepapers & presentations
- 4/03/17
This presentation is a case study that will demostrate that implementing Virtual Private Database and Database Data Vault allows data access restriction to sensitive data at table row level from all unauthorized privilged user, including SYS. Why still allowing SYS user to access and perform required database functions. Virtual Private Database (VPD) secures data from…
-
- Whitepapers & presentations
- 4/03/17
With the increased adoption of the Cloud, security professionals often face the challenge where they have to apply security controls efficiently for databases both on-premise and in the Cloud. This session will address the challenges related to managing audit data collection and encryption keys in hybrid scenarios, by maintaining the audit data and encryption keys…
-
- Whitepapers & presentations
- 4/03/17
With the increased adoption of the Cloud, security professionals often face the challenge where they have to apply security controls efficiently for databases both on-premise and in the Cloud. This session will address the challenges related to managing audit data collection and encryption keys in hybrid scenarios, by maintaining the audit data and encryption keys…
-
- Whitepapers & presentations
- 4/03/17
Cloud is a skill you need but didn’t know because you’ve been so busy trying to keep running what’s already been deployed. The role of the Oracle DBA continues to evolve with new Oracle technology releases. And as demand and business tolerance for manual infrastructure practices, database installations and patching decreases, DBAs are needed that…
-
- Whitepapers & presentations
- 4/03/17
With the increased adoption of the Cloud, security professionals often face the challenge where they have to apply security controls efficiently for databases both on-premise and in the Cloud. This session will address the challenges related to managing audit data collection and encryption keys in hybrid scenarios, by maintaining the audit data and encryption keys…
-
- Whitepapers & presentations
- 4/03/17