database security

Security

Oracle delivers secure infrastructure through a wide range of products, processes, and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management. (Note: Oracle does not validate the information on any third-party sites or content you may see here.)

 View the most recent Critical Patch Update Advisory
  Read the Oracle Software Security Assurance Blog

What's New

Untitled Document
Mass Reset Password - Part1: Oracle Internet Directory
Need to simultaneously reset multiple passwords? Fusion Middleware solution architect Thiago Leonicio shows you how in this concise, illustrated how-to.
posted Mon, 24 Nov 2014 20:10:25 +0000
Secure Oracle MAF applications with Oracle Mobile Security Suite (The Oracle Mobile Platform Blog)
This article by Kundan Vyas illustrates how to containerize and secure the content of an Oracle Mobile Application Foundation app using Oracle Mobile Security Suite (OMSS).
posted Thu, 20 Nov 2014 20:05:50 +0000
Automated Policy Synchronization (APS) for OAM Clone Environment
Automated Synchronization between Master and Clone OAM Environments is supported in Oracle Access Manager R2PS2. In this article, Kiran Thakkar walks you step-by-step through the configuration process.
posted Wed, 19 Nov 2014 19:04:16 +0000
Integrating Oracle Access Management platform with Mobile Application Framework | Identity, Security & Me
Paul Toal shows you how to use your existing Oracle Identity and Access Management platform as the security layer within your mobile applications.
posted Tue, 18 Nov 2014 15:17:20 +0000
Managing WebLogic Server and Deployed Applications in DMZ and Other Complicated Network Setups
WebLogic Server comes out of the box with a general configuration that should satisfy most applications. But DMZ setups and other special environments require additional configuration, communication and security. This article by Martin Heinzl focuses on options for various DMZ setups.
posted Thu, 13 Nov 2014 20:47:07 +0000
Monitoring an OAM Environment
Effective monitoring involves two types of controls; preventive monitoring and detective monitoring. In this article Kiran Thakkar explains how to use the OAM features to facilitate both the types of monitoring.
posted Tue, 11 Nov 2014 18:02:07 +0000
More...