Tag: Database
Encrypting data is a useful tool to protect sensitive data be it at rest, in motion, or in use. For an Oracle Database, encryption may be done at the storage, application, network, and backup layers. Therefore, implementing database encryption can be time consuming and difficult as there are performance considerations and challenges such as effective…
-
- Whitepapers & presentations
- 4/09/18
Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though databases are not externally accessible, they are still a target as most cyber-attacks penetrate the network perimeter and look for high value targets within your internal…
-
- Whitepapers & presentations
- 4/09/18
Oracle Databases are a target of cyber-attacks by hackers looking to obtain sensitive data such as credit card numbers and personally identifiable information used in identify theft. Even though databases are not externally accessible, they are still a target as most cyber-attacks penetrate the network perimeter and look for high value targets within your internal…
-
- Whitepapers & presentations
- 4/09/18
To properly secure an Oracle database requires significant effort and often expensive security add-on products. The Thrifty DBA likes having secure databases, but doesn’t like to spend money on expensive security products when equivalent zero or low-cost solutions are available. The Thrifty DBA will show you thrifty yet effective auditing and logging solutions for the…
-
- Whitepapers & presentations
- 4/09/18
To properly secure an Oracle database requires significant effort and often expensive security add-on products. The Thrifty DBA likes having secure databases, but doesn’t like to spend money on expensive security products when equivalent zero or low-cost solutions are available. The Thrifty DBA will show you thrifty yet effective auditing and logging solutions for the…
-
- Whitepapers & presentations
- 4/09/18
In this session I will share some of experience on migrate or upgrading different versions of Oracle databases to the Oracle 12cR2. This session will discuss the difference between upgrade and upgrade when you should use which method. We will also focus the latest 12cR2 upgrade tools and various upgrade 12cR2 paths/methods that help you…
-
- Whitepapers & presentations
- 4/09/18
Many DBAs are faced with the task of migrating and updating older Oracle databases to newer platforms and to Oracle12c, sometimes on-premises and sometimes to the cloud. Frequently an endian change adds additional complexity. Outage time constraints add to the challenge. While Data Pump may seem like an obvious choice, it does introduce many issues…
-
- Whitepapers & presentations
- 4/09/18
Database Security is important to understand and implement for data protection from insider and external threats. The cloud is another environment to make sure that the data is secure in the cloud and in transit. There are options and products available in the Oracle Cloud that can be utilized and DBAs and Security Professionals should…
-
- Whitepapers & presentations
- 4/09/18
Database Security is important to understand and implement for data protection from insider and external threats. The cloud is another environment to make sure that the data is secure in the cloud and in transit. There are options and products available in the Oracle Cloud that can be utilized and DBAs and Security Professionals should…
-
- Whitepapers & presentations
- 4/09/18
Database Security is important to understand and implement for data protection from insider and external threats. The cloud is another environment to make sure that the data is secure in the cloud and in transit. There are options and products available in the Oracle Cloud that can be utilized and DBAs and Security Professionals should…
-
- Whitepapers & presentations
- 4/09/18