database security


Oracle delivers secure infrastructure through a wide range of products, processes, and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management. (Note: Oracle does not validate the information on any third-party sites or content you may see here.)

 View the most recent Critical Patch Update Advisory
  Read the Oracle Software Security Assurance Blog

What's New

Untitled Document
Fusion Applications User, Role Identity Flow and Initial Bulk Load
When implementing Fusion Applications (FA), enterprise user and role identity data from various HR applications must be migrated to FA so that the users can become part of FA system and be able to use the application. This article by Veer Natarajan covers the important steps in the process and offers helpful tips for a successful user and role load.
posted Thu, 29 Jan 2015 17:01:03 +0000
Building a Scalable, Highly Available Oracle API Gateway 11g Infrastructure in a Cloud Environment
With its focus on service protection, and its authentication mechanisms, message encryption, and security/policy functionalities, Oracle API Gateway (OAG) 11g can be a very powerful tool in the secure provisioning of services in the cloud. This article shows you how to create a cloud-based OAG infrastructure, with high-availability and scalability support.
posted Mon, 26 Jan 2015 14:14:36 +0000
January 2015 Critical Patch Update Released
This Oracle Critical Patch Update provides 169 new fixes for security issues across a wide range of product families.
posted Tue, 20 Jan 2015 22:24:31 +0000
The Future of User Authentication
"The best authentication model is useless if customers or employees find it difficult to use," says Prateek Mishra. "This is the key reason why it has proven so difficult to transition away from passwords."
posted Wed, 14 Jan 2015 16:55:17 +0000
Resilience: Bouncing Back When Bad Things Happen
"From an IT perspective, the next time you design a solution or a system, stop and think about how your solution or system could be designed for greater resilience. You'd be amazed how simple and inexpensive it can be once you invest a little brain power."
posted Mon, 12 Jan 2015 14:51:33 +0000
Minecraft and Identity Management: What an Identity Management guy learned from managing a world populated by tweens and teens
In the span of two years, Oracle Identity Management and Mobile Security product management VP Clayton Donley, has learned a lot about managing a system where the bulk of the users have pre-teen or early teen levels of maturity. He shares lessons learned in this informative and entertaining article.
posted Mon, 05 Jan 2015 18:16:00 +0000
Left Curve
Popular Downloads
Right Curve
Untitled Document