An Oracle White Paper August Using Oracle Solaris 10 to Overcome Security Challenges
|
|
|
- Dwight Brendan Montgomery
- 10 years ago
- Views:
Transcription
1 An Oracle White Paper August 2010 Using Oracle Solaris 10 to Overcome Security Challenges
2 Introduction... 1 Security Features in Oracle Solaris Reduce and Securely Delegate Privileges... 2 Network Security and Encryption... 4 Minimizing and Hardening the Operating System Securing Virtualized Environments Independent Security Certifications For More Information... 14
3 Introduction In today's hyper-connected economy, organizations of every kind and size depend on networked computing systems to conduct business. This reliance on computing systems can leave organizations vulnerable to a wide variety of potential cyber attacks. Over time, hackers have honed sophisticated methods for gaining access to systems, applications, and data. These methods can include network attacks, code attacks, and social engineering, and can originate from within the organization itself, or from anywhere around the globe. Indeed, IT staff may not even be aware that their systems have been compromised. As a result, security is foremost in the minds of IT managers, with most assuming the IT infrastructure is a target for attacks and other security threats. In addition to concerns over intrusions, IT managers must be able to meet requirements for security, privacy, and internal auditing that are being imposed worldwide. Some examples include legislation such as the Health Insurance Portability and Accountability Act (HIPAA) of 1996 and the Sarbanes-Oxley Act of 2002 in the U.S, and the European Union Data Protection Directive of 1995 in Europe. Regulatory oversight requires that data, applications, and systems be properly secured. Proper audit controls and other procedures must be instituted to safeguard identities and data. HIPAA privacy rules require appropriate measures to protect the privacy of personal health information and set limits and conditions on the uses and disclosures that may be made of such information. The security enhancements in Oracle Solaris 10 make it attractive to organizations that require comprehensive system security features. IT departments seeking an effective and efficient solution to computer security can take advantage of these unique and powerful features to protect the enterprise from potential threats, comply with corporate and regulatory requirements, and stay ahead of daunting security challenges. 1
4 Security Features in Oracle Solaris 10 Oracle Solaris 10 is a robust, premier enterprise operating system that offers proven security features. With a sophisticated network-wide security system that controls the way users access files, protect system databases, and use system resources, Oracle Solaris 10 addresses security needs at every layer. While traditional operating systems can contain inherent security weaknesses, Oracle Solaris 10 facilitates new approaches to protect the entire compute environment from the datacenter, through the network, and to the desktop. Following is a discussion of key security approaches and how administrators can utilize Oracle Solaris 10 to implement greater enterprise-wide safety measures. Reduce and Securely Delegate Privileges Most operating systems require applications that need to perform privileged operations to run as the root user, making the application all-powerful. In this case, any vulnerability in the application can be exploited by hackers to escalate their privileges, take over the system, damage data, or even conduct a zombie attack. Another approach used by some Linux distributions is to constrain applications using the Security- Enhanced Linux policy. Implementing this policy can be quite complex and typically requires vast quantities of policy code in order to get commercial applications to run. In addition, modifications to policy files can require full system reboots, making it more difficult to implement and administer Linux systems 1. Process Rights Management Oracle Solaris 10 adopts a different approach, utilizing the principle of least privilege. Over 65 discrete, fine-grained privileges are built into the kernel and user access space. The concept of privileges as implemented in Oracle Solaris 10 is extended throughout the operating system even the built-in tools take these rights and privileges into account. Using this approach, administrators can grant new or existing applications only the appropriate privileges necessary to perform tasks. Many system components such as NFS, the Oracle Solaris Cryptographic Framework, IP Filter, file system mount commands, and more, are already configured to run with reduced privileges by default, with no configuration required by the administrator. Implementing privileges is a simple task and requires an amendment to a policy file for most typical applications 2. Oracle Solaris 10 also invokes the proper privileges for an application service when started by the service management facility (SMF) in Oracle Solaris. As a result, the application does not 1 See the Security-Enhanced Linux Users Guide at 2 See for more information. 2
5 need to be modified, and is not granted unlimited system access. The system or security administrator can determine which privileges to grant or deny to the application, tightening security and eliminating the need for extensive coding changes. This approach helps to prevent the hacking of applications that are running with super user privileges, yet maintains full compatibility with existing applications. For example, Web server applications typically run as root in order to bind to port 80 on the system, which is a privileged port. Oracle Solaris 10 contains a special privilege, net_privaddr that can be granted to the Web server application in order to be able to bind to the privileged port 80, as illustrated in Figure 1. When the Web server application starts, the Oracle Solaris 10 kernel checks for Process Rights Management attributes, finds the net_privaddr privilege, and starts the server without root or superuser access. Figure 1. Process Rights Management can be used to set privileges that restrict the access rights of applications. User Rights Management System administrators frequently are faced with the need to limit access to administrative functions while being able to delegate certain specific privileged operations at the same time. Much like Process Rights Management, User Rights Management gives administrators the ability to grant or deny privileges to individual users in order to let them perform some privileged operations without needing to give them full superuser powers. Also known as Role-Based Access Control, User Rights Management lets administrators create roles for users. Each role has a set of profiles that determine what tasks and commands the role can perform, and the privileges, or process rights, with which the commands run. Oracle Solaris 10 includes a number of standard pre-defined profiles that can be combined into roles. Administrators also can create customized per-site role definitions as needed, and are not limited by the Oracle Solaris concept of system administration. By utilizing roles, administrators 3
6 can delegate specific operations to different users on the system and grant only the privileges required to accomplish those operations. There is an additional layer of security built into the user roles functionality. Roles are assigned to specific users and each user must log in to his or her own user ID and then assume the role they have been granted. As a result, users are never logging into a given role anonymously, and system administrators can always see who did what where, when, and how on the system. For example, administrators can define a Web server administrator role and apply it to those users that need to be able to perform Web server administrative tasks without being the superuser. Role definitions can be stored in a naming service such as NIS, NIS+ or LDAP to allow administration of Web servers on any system within the network. Any other administrative access to the server is not allowed. Figure 2 illustrates the use of roles to grant specific administrative privileges needed for users to complete certain tasks. With support for a centralized repository, roles and profiles can be changed centrally and then automatically propagated throughout the enterprise. Figure 2. Using roles grants certain administrative privileges for specific tasks without root or superuser access. Network Security and Encryption Remote access to systems is vital. Administrators frequently need to be able to administer systems remotely, and users often require the ability to log onto servers from other locations. Typically, any system that provides remote capabilities offers a means for intruders to gain access. Network services, such as Telnet, FTP, file sharing, or even interactive user accounts, pose potential security risks for enterprises if they are not administered carefully. In addition, regulations typically require that communications, even when self-contained within the datacenter, be encrypted in the event that data is confidential or sensitive. Oracle Solaris 10 offers a number of features that can help administrators secure systems from intruders and comply with regulatory or corporate requirements. 4
7 Securing the Default Networking Configuration at Install Time There are a number of services in UNIX operating systems that are configured to listen for external network connections when the system is first booted after installation. These services can present security holes, particularly if an administrator is unaware of a specific service functionality. Oracle Solaris 10 offers a choice of Secure by Default Networking during the installation, which changes the state of these services so that they can only communicate with other processes on the same system by default. When configured this way, the only service that can be accessed from outside the system is the secure shell service in Oracle Solaris. However, Oracle Solaris 10 can still be used to connect to external services such as mail, print, and file sharing services, and runs with a fully functional administrative and interactive desktop interface. Any of these services can be turned on for internet listening or be disabled completely. This approach is far more secure and resource efficient than merely placing a firewall on the system. IP Packet Filtering Firewall Every company uses firewalls to protect internal IT infrastructure from network-based attacks. Oracle Solaris 10 integrates an IP packet filtering firewall within the TCP/IP stack. Providing stateful packet filtering and network address translation (NAT), the IP Filter firewall also includes the ability to create and manage address pools. A popular choice for Oracle Solaris administrators, the IP Filter can filter by IP address, port, protocol, network interface, and traffic direction, as well as by an individual source IP address, a destination IP address, a range of IP addresses, and more. Security administrators gain a high degree of control and can block specific internet addresses that may be part of an organized attempt to gain access to the system. Support for both IP4 and IP6 addressing makes it possible for administrators to deploy the firewall with existing or emerging new generation networks. TCP Wrappers Controlling access to network services is one of the most important security tasks facing a server administrator. TCP wrappers add an additional layer of protection by defining which hosts are allowed to connect to wrapped network services. Oracle Solaris 10 contains integrated TCP wrappers, making it possible to restrict access to TCP services based on domain name, host name, IP address, network address, and more. For example, administrators can set up an FTP service for addresses of a newlyacquired company (*.foo.com). Any system attempting to access the FTP service from within the *.foo.com domain can be granted access. In addition, TCP wrappers provide access control to a host and service depending on the origin of the request, and log both successful and unsuccessful connections to that host. Integrated Cryptographic Framework and Key Management Framework The increasingly distributed nature of computing resources necessitates the use of encryption and decryption operations, even where they were once considered impractical. Often under-utilized due to the system overhead it can generate, encryption is vital along with security standards and new regulations requiring greater use of encryption key factors. The cryptographic framework in Oracle Solaris provides a set of kernel-level and user-level cryptographic services, and includes several 5
8 software encryption modules for applications to offload cryptographic operations. The cryptographic framework provides access to the best available hardware or software encryption modules on the system without any configuration or customizing of the application. A standard feature of the operating system, the cryptographic framework is not a set of add-ons that must be installed later, nor does it incur any additional fees in order to be able to use it. Figure 3 shows the cryptographic framework. Figure 3. The standards-based cryptographic framework in Oracle Solaris. Based on the PKCS#11 cryptography standard created by RSA Security, Inc, the cryptographic framework provides a consistent framework for application-level and kernel-level cryptographic operations. This framework gives applications access to the same hardware accelerators used by the operating system kernel and provides a mechanism and API by which both kernel- and user-based cryptographic functions can be executed by the same optimized encryption software or transparently use hardware accelerators configured on the system. The cryptographic framework helps to increase security and performance and brings the power of advanced, streamlined encryption algorithms and hardware acceleration to user-level C and Java programming language-based applications. Oracle offers servers with built-in cryptographic acceleration hardware technology that speeds the process of encrypting and decrypting data. Indeed, many system services in Oracle Solaris, such as IPSec/IKE and Kerberos authentication, take advantage of the cryptographic framework and automatically utilize the hardware acceleration that is provided by the server hardware. Running Oracle Solaris on these servers can help to reduce system overhead, improve performance, and increase overall computing and network efficiency by improving responsiveness across the entire solution. Oracle servers with CoolThreads Technology. Running applications such as the JD Edwards Web server on Oracle servers with CoolThreads technology lets companies leverage on-chip 6
9 cryptographic acceleration and eliminates the need for additional co-processor cards, special licensing, network appliances, or power hungry add-on components. Oracle x86 and x64 servers. Enhancements for chip-based acceleration are incorporated on the latest Oracle x86 and x64 servers 3. These servers contain Intel Xeon processors incorporating new hardware instructions that directly implement the Advanced Encryption Standard (AES) cryptographic algorithm within the hardware. This implementation provides significant performance improvements over the previous hand-coded machine language implementation. For more information, see Speed+Cryptography. IPSec/IKE Many organizations utilize virtual private networks (VPNs) to provide remote users and locations with secure access to an organization's internal network. Deployed over public telecommunication infrastructure, VPNs offer a cost-effective alternative to leased lines, but present security challenges because of the use of public networks. In order to be secure, corporate data traveling over VPNs requires a protected communications channel. Internet Protocol Security and Internet Key Exchange (IPSec/IKE) is the technology used to implement secure communications over VPNs. Providing application-independent encryption, IPSec/IKE encrypts data as it leaves the system. Oracle Solaris 10 incorporates standards-based IPSec/IKE encryption and can interoperate with other operating systems, including Windows, Linux, and HP-UX. Applications do not need to be modified, as data encryption occurs in the network stack, away from the knowledge of the application itself. Performance can be accelerated automatically if the systems connected through the VPNs are Oracle servers with CoolThreads technology, Oracle servers with Intel processors, or any system with a cryptographic accelerator card (either an Oracle s Sun Cryptographic Accelerator 6000 PCIe Adapter, or third-party accelerator with an Oracle Solaris plug-in). The Secure Shell Service in Oracle Solaris Administrators often need to maintain networked systems located in a variety of disparate locations. Using a shell, administrative staff can login to systems no matter where they are located in another building, around the globe, outside the organizational intranet, in the cloud, or at a customer site. However, logging into and maintaining systems over an insecure network such as the internet leaves corporate data security and enterprise network integrity vulnerable. The Secure Shell service in Oracle Solaris allows data to be exchanged over a secure channel between two networked systems. It replaces telnet and other insecure protocols that transmit sensitive data such 3 7
10 as passwords in plain text, leaving communications vulnerable to packet analysis. Providing a way to protect against a number of network threats such as session eavesdropping, password theft or misuse, and session hijacking, the Secure Shell encrypts all network traffic, delivers stronger authentication, and monitors the integrity of network sessions. Because it is integrated into the Oracle Solaris 10 operating system, the Secure Shell environment can leverage the cryptographic framework in Oracle Solaris for even greater security. Password Management Password management can be a headache for system administrators. It can be difficult to ensure that passwords are not getting stale, being passed around, or accidentally given out. In addition, users are notorious for leaving written passwords in work areas and creating easily guessed passwords using the names of children or pets, or other non-secure methods. Oracle Solaris 10 contains enhanced password management functions that let administrators set policies for password length, complexity, reuse, dictionary checking, account locking, and defined password complexity levels. Password management functions work in conjunction with password setting policies from the NIS+ and LDAP naming services. Kerberos While password-based authentication schemes can work well for standalone systems, they fall short in networked environments. Passwords sent from one system to another can be intercepted as they travel across public and private networks, posing significant risk to users and the enterprise. To address this concern, Oracle Solaris 10 supports Kerberos, a standard for enabling single sign-on capabilities across the enterprise. Based on cryptography, Kerberos provides strong authentication methods that are based on industry-standard encryption algorithms. Capable of interoperating with other technologies, such as Microsoft s Active Directory or MIT Kerberos, passwords are never sent across the wire. Instead, Kerberos uses authentication tokens that are passed among the machines in a Kerberos realm. As a result, users are prevented from assuming root privileges on their local system and executing commands or accessing files that do not belong to them. All basic remote access functions supported by Oracle Solaris 10 are Kerberos-aware, and services such as NFS v3 and NFS v4 can be secured. In fact, Oracle Solaris was the first operating system to secure NFS using Kerberos, and Oracle Solaris engineers defined the original IETF standard. Oracle Solaris System Auditing IT infrastructure forms the lifeblood of many organizations today, and corporate data can be irreplaceable. Whether a deliberate attempt to attack a system, or the result of user error, securityrelated system events must be tracked in order for system administrators to be able to safeguard valuable assets. Oracle Solaris auditing collects data that records how the system is being used and can report specific activity by users at a specific time and date. Administrators can configure audit tools to monitor and record specific system events and use included tools to assist with the analysis of collected data. 8
11 At login, after a user supplies a user name and password, a unique audit ID is associated with the user's process. This audit ID is inherited by every process that is started during the login session. Even if a user changes identity, all user actions are tracked with the same audit ID. Collecting and analyzing the data makes it possible to determine patterns of access and see the access histories of individuals and objects. While auditing cannot prevent hackers from unauthorized entry, it can help detect potential security breaches, misuse, or unauthorized activity, attempts to bypass the protection mechanisms, or the extended use of privilege that occurs when a user changes identity. Auditing also provides an effective means to follow internal governance and maintain compliance with corporate, industry, or regulatory requirements. For example, the Sarbanes-Oxley legislation mandates checks to ensure that users are not performing unauthorized operations or masquerading as another process in order to gain additional privileges for which they are not authorized. Audit records can be exported either in real-time through syslog or XML for use with an external network intrusion detection service, and audit records can be viewed through syslog command output. File Integrity and Validation Some cyber attacks can involve unobserved system changes that leave administrators unaware of intrusions that result in compromised data, applications, or user accounts. Oracle Solaris 10 offers features that make it possible for administrators to determine whether a system has been compromised, verify systems against known good distributions, and check to ensure that data integrity is secure. For example, almost every executable binary file in Oracle Solaris carries a signature in the system to validate its integrity. Any binary can be checked by using the elfsign verify command to validate the file against its embedded signature. All patches from Oracle are issued with signed binaries as well so that administrators can verify the integrity of each patch applied to a system. In addition, the cryptographic framework in Oracle Solaris self-validates its signatures at boot time or upon reload. Oracle offers other tools to aid the validation process. Basic Audit and Reporting Tool (BART). With BART, administrators can generate cryptographic hashes to validate data, applications, and critical system files. Administrators can run BART from scripts or on command to detect changes. Fingerprint Database. The Oracle Solaris fingerprint database provides digital fingerprints for all files shipped in the Oracle Solaris operating system, including previous generations dating back to Oracle Solaris 2.1. With free online verification utilities, the fingerprint database allows administrators to check the integrity of Oracle Solaris files on any existing system to ensure that no hacker has modified critical system files. It provides a single point of comparison for known good files and MD5 hashes of those files. If the comparison yields matches, then administrators can feel certain that the system has not been compromised. A discrepancy indicates that changes have been made to the system. 9
12 Minimizing and Hardening the Operating System Many operating systems can present security risks when installed on a system right out of the box. In an attempt to minimize risk, administrators with an urgent need to address security concerns often remove unneeded software from the system and tighten security settings. Such changes often are done in haste or without an understanding of the potentially far-reaching implications they can create. In fact, minimizing and hardening the system after it is in use can be a too little, too late approach. To address these concerns, Oracle Solaris 10 gives administrators the ability to minimize and harden the system at the time it is installed. Administrators can reduce the features installed in order to provide fewer opportunities for hackers. Indeed, Oracle Solaris 10 offers significantly smaller packages than previous releases, separating functionality into smaller groups for finer installation granularity. For example, the telnet package is split into separate server and client software. A system can be installed with only the client portion, making it possible to allow users to initiate telnet sessions out to other systems yet prevent telnet connections into the system. In addition, security settings can be modified to harden the system against attack. Reduced Networking MetaCluster System administrators that need to install a minimal system can find it difficult to know which Oracle Solaris packages to install. Earlier versions of the Oracle Solaris operating system are packaged in five different software groups: Core, End User, Developer, Entire, and Entire+OEM. Oracle Solaris 10 offers an additional Reduced Networking MetaCluster, which provides the smallest Oracle Solaris installation that can or should be installed for a working and supported system. Table 1 lists the different MetaClusters and sizes. Smaller than the smallest previously available software group, the Reduced Networking MetaCluster serves as a base configuration. Additional services and components are turned on or installed as needed to increase system capabilities. The Reduced Networking MetaCluster works with the Oracle Solaris JumpStart mechanism so that multiple systems can be installed and deployed rapidly and securely. 10
13 TABLE 1. METACLUSTER SIZES METACLUSTER SIZE (MB) NUMBER OF PACKAGES Reduced Networking Core End User 2, Developer 2, Entire 3, Entire + OEM 3, Oracle Solaris Security Toolkit With many organizations requiring operations to be running 24x7 around the globe, it is critical to be able to rapidly and securely deploy new systems. The Oracle Solaris Security Toolkit, formerly known as the JumpStart Architecture and Security Scripts (JASS) Toolkit, provides a flexible and extensible mechanism to harden and audit Oracle Solaris operating systems. Designed to simplify and automate the process, the security toolkit is based on proven security best practices and practical customer site experience gathered over many years. The toolkit contains a set of profiles and Oracle Solaris JumpStart scripts that can make it easy to quickly deploy a new purpose-built server with the appropriate software packages, system services, and more already installed according to the desired server type. The toolkit fully complies with Support Services requirements for system packaging and can be used to implement NSA Security Technical Implementation Guides. See for more information. Securing Virtualized Environments Traditionally, IT organizations concerned about security deploy separate systems in order to isolate users and applications. However, utilizing dedicated servers can lead to rapidly growing numbers of systems, increased complexity, lowered resource utilization, and greater costs. Server virtualization is an important tool for administrators looking to consolidate systems and reduce operating costs. However, one application environment cannot be allowed to affect another either through overconsumption of system resources, propagation of software faults, or security breaches. Oracle Solaris 10 offers technology that can help administrators isolate and protect applications and users. Oracle Solaris Containers Built into Oracle Solaris 10, Oracle Solaris Containers support the creation of a virtualized instance of the Oracle Solaris 10 operating system. Leveraging the Process Rights Management technology in Oracle Solaris, Oracle Solaris Containers provision many secure, isolated runtime environments for 11
14 individual applications using flexible, software-defined boundaries. All containers run under a single operating system kernel, enabling fine-grained control over rights and resources within a consolidated server without increasing the number of operating system instances to manage. With Oracle Solaris Containers, applications can be managed independently of each other, placing one application in each virtual server to maintain isolation while simultaneously sharing hardware resources. Resource controls enable administrators to allocate CPU, memory, and network resources to each container, preventing any single container from monopolizing system assets. Applications that must communicate with one another to complete a job can be moved closer to one another to take advantage of intra-server scalability and eliminate latencies introduced by physical server-to-server network interaction. The result is significantly fewer systems that deliver strong performance improvements across a greatly reduced hardware footprint. Deploying applications in Oracle Solaris Containers can help to improve security. For example, a Web server documentation directory can be mounted read/write in an Oracle Solaris Container used by content providers, while it is mounted read only where the Web server process itself is running. This procedure prevents intruders from modifying or hacking the Web server content even if they gain access to the root user ID within the Web server container. (For information, see How to Eliminate Web Page Hijacking Using Oracle Solaris 10 Security at The BART utility can monitor file changes (using a least privilege process) within a container from the global zone so that no intruder knows that its actions or modifications are being monitored and cannot see or change the audit system, its configuration, or its logs. Indeed, intruders that gain access to a container cannot delete audit data if the container is configured correctly. Processes within a container have no knowledge of overall system configuration, nor can they see other containers unless explicitly permitted. Oracle Solaris Trusted Extensions Many customers need to have explicit controls over how data is disseminated, and regulatory requirements for certain industries stipulate stringent data security policies. An integrated set of features within the operating system, Oracle Solaris Trusted Extensions provide an optional layer of secure label technology that makes it possible to implement Mandatory Access Control (MAC) security policies. Labeled security separates data security policies from data ownership, enables the operating system to support multilevel data access policies, and helps organizations to meet strict government regulatory compliance goals without modifying existing applications for underlying hardware platforms. The labeled security features within Oracle Solaris Trusted Extensions provide a platform for deploying high security desktops, database servers, firewalls, and communication gateways, as well as any application where access to sensitive information or networks must be strictly controlled. Oracle Solaris Trusted Extensions is the only set of labeled security features that offer a complete enterprise security model that is ready for the real world. Capable of being implemented with both the Trusted CDE and GNOME interfaces, Oracle Solaris Trusted Extensions allow for both server-based and desktop use. Resources within the local system or on an LDAP server within a network are subject to policies for authentication and storage according to administrator-specified parameters. Printing, file 12
15 sharing, and complete device control on the network also follow labeled security policies, enabling administrators to control data on the network and how and where it can be accessed. Indeed, administrators implementing an Oracle Solaris Trusted Extensions security policy can supersede user decisions to share home directory files using world readable file permissions. Oracle Solaris Trusted Extensions limit sharing the directory files to those processes on the system that contain the same, or dominate, security label as the modified files, preventing a complete breach of security. Labeled security delivers a powerful tool to prevent either deliberate or unwitting security breaches by users. Many sites can lose control of data to users who employ devices with removable media to copy sensitive data and carry it from the premises. Labeled security extends security policies to system devices including USB devices. This approach enables administrators to prevent users from copying confidential data onto a labeled device they are not authorized to use and removing it from the premises. Figure 4 illustrates how information is shared in a security hierarchy using Oracle Solaris Trusted Extensions. Figure 4. Oracle Solaris Trusted Extensions and labeled security help to implement stringent data security policies. Independent Security Certifications Certifications can be helpful indicators when evaluating the security of an operating system, but many operating systems have been tested using only bare minimum configurations. Oracle Solaris 10 is the only operating system to be fully certified using configurations found in many real-world deployments, including multiple systems, LDAP naming services, NFS file sharing, remote printing, and a labeled desktop interface. While it may seem like Red Hat Enterprise Linux holds the same Common Criteria Certifications, Oracle Solaris 10 testing includes multilevel file sharing, multilevel desktops, multilevel network printing, and naming services such as LDAP. In addition, Oracle Solaris 10 testing extends to workstation access for standard users. As a result, Oracle Solaris 10 supports secure, complex environments, ensures applications can run without modification, and eliminates the need for lengthy and complicated policy files. 13
16 For More Information Organizations looking to implement strong corporate governance to meet stringent security regulations, or that want to protect corporate IT systems from a wide variety of cyber attacks, can adopt Oracle Solaris 10 security features for powerful solutions to security concerns. For more information on Oracle Solaris 10 security features, visit the sites listed in Table 2. TABLE 2. REFERENCES Oracle Solaris 10 Security Homepage Oracle Solaris 10 Security Best Practices blogs.sun.com/gbrunett/entry/new_solaris_10_security_best Oracle Solaris Trusted Extensions Collection Taking Advantage of Wire Speed Cryptography Speed+Cryptography How to Eliminate Web Page Hijacking Using Oracle Solaris 10 Security Glenn Brunette's Security Weblog Glenn Faden: Trusted Blogger 14
17 Using Oracle Solaris 10 to Overcome Security Challenges August 2010 Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA U.S.A. Worldwide Inquiries: Phone: Fax: oracle.com Copyright 2010, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. UNIX is a registered trademark licensed through X/Open Company, Ltd. 0310
An Oracle White Paper June 2014. Security and the Oracle Database Cloud Service
An Oracle White Paper June 2014 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
An Oracle White Paper May 2011. Distributed Development Using Oracle Secure Global Desktop
An Oracle White Paper May 2011 Distributed Development Using Oracle Secure Global Desktop Introduction One of the biggest challenges software development organizations face today is how to provide software
An Oracle White Paper July 2013. Introducing the Oracle Home User in Oracle Database 12c for Microsoft Windows
An Oracle White Paper July 2013 Introducing the Oracle Home User Introduction Starting with Oracle Database 12c Release 1 (12.1), Oracle Database on Microsoft Windows supports the use of an Oracle Home
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
An Oracle White Paper July 2011. Oracle Desktop Virtualization Simplified Client Access for Oracle Applications
An Oracle White Paper July 2011 Oracle Desktop Virtualization Simplified Client Access for Oracle Applications Overview Oracle has the world s most comprehensive portfolio of industry-specific applications
Virtual Compute Appliance Frequently Asked Questions
General Overview What is Oracle s Virtual Compute Appliance? Oracle s Virtual Compute Appliance is an integrated, wire once, software-defined infrastructure system designed for rapid deployment of both
An Oracle White Paper August 2010. Higher Security, Greater Access with Oracle Desktop Virtualization
An Oracle White Paper August 2010 Higher Security, Greater Access with Oracle Desktop Virtualization Introduction... 1 Desktop Infrastructure Challenges... 2 Oracle s Desktop Virtualization Solutions Beyond
An Oracle White Paper June 2011. Oracle Database Firewall 5.0 Sizing Best Practices
An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database
An Oracle White Paper May 2012. Oracle Database Cloud Service
An Oracle White Paper May 2012 Oracle Database Cloud Service Executive Overview The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing
An Oracle Technical Article November 2015. Certification with Oracle Linux 6
An Oracle Technical Article November 2015 Certification with Oracle Linux 6 Oracle Technical Article Certification with Oracle Linux 6 Introduction... 1 Comparing Oracle Linux 6 and Red Hat Enterprise
REDUCE RISK WITH ORACLE SOLARIS 11
REDUCE RISK WITH ORACLE SOLARIS 11 MITIGATE RISKS WITH INTELLIGENT SECURITY CONTROLS KEY FEATURES Security in Silicon: Hardware-integrated cryptographic acceleration to protect both data and network. Reduce
Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003
Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity
An Oracle White Paper January 2011. Oracle Database Firewall
An Oracle White Paper January 2011 Oracle Database Firewall Introduction... 1 Oracle Database Firewall Overview... 2 Oracle Database Firewall... 2 White List for Positive Security Enforcement... 3 Black
An Oracle White Paper December 2010. Implementing Enterprise Single Sign-On in an Identity Management System
An Oracle White Paper December 2010 Implementing Enterprise Single Sign-On in an Identity Management System Introduction Most users need a unique password for every enterprise application, causing an exponential
Oracle Virtual Desktop Infrastructure. VDI Demo (Microsoft Remote Desktop Services) for Version 3.2
Oracle Virtual Desktop Infrastructure VDI Demo (Microsoft Remote Desktop Services) for Version 2 April 2011 Copyright 2011, Oracle and/or its affiliates. All rights reserved. This software and related
Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004
Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory
An Oracle Technical Article March 2015. Certification with Oracle Linux 7
An Oracle Technical Article March 2015 Certification with Oracle Linux 7 Oracle Technical Article Certification with Oracle Linux 7 Introduction...1 Comparing Oracle Linux 7 and Red Hat Enterprise Linux
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK KEY FEATURES PROVISION FROM BARE- METAL TO PRODUCTION QUICKLY AND EFFICIENTLY Controlled discovery with active control of your hardware Automatically
Oracle Whitepaper April 2015. Security and the Oracle Database Cloud Service
Oracle Whitepaper April 2015 Security and the Oracle Database Cloud Service Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database Cloud
Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 Part Number: E69079-01. April 2016
Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 Part Number: E69079-01 April 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. This software and related documentation
An Oracle White Paper June 2013. Oracle Linux Management with Oracle Enterprise Manager 12c
An Oracle White Paper June 2013 Oracle Linux Management with Oracle Enterprise Manager 12c Introduction... 1 Oracle Enterprise Manager 12c Overview... 3 Managing Oracle Linux with Oracle Enterprise Manager
An Oracle White Paper January 2012. Oracle Database Firewall
An Oracle White Paper January 2012 Oracle Database Firewall Introduction... 2 Oracle Database Firewall Overview... 3 Oracle Database Firewall... 3 White List for Positive Security Enforcement... 4 Black
The Oracle Mobile Security Suite: Secure Adoption of BYOD
An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will
ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK
ORACLE OPS CENTER: VIRTUALIZATION MANAGEMENT PACK KEY FEATURES LIFECYCLE MANAGEMENT OF VIRTUALIZATION TECHNOLOGIES MADE SIMPLE Automation of lifecycle management reduces costs and errors while improving
Security Guide Release 7.3
[1]Oracle Communications ASAP Security Guide Release 7.3 E61084-01 July 2015 Oracle Communications ASAP Security Guide, Release 7.3 E61084-01 Copyright 2012, 2015, Oracle and/or its affiliates. All rights
Oracle Net Services for Oracle10g. An Oracle White Paper May 2005
Oracle Net Services for Oracle10g An Oracle White Paper May 2005 Oracle Net Services INTRODUCTION Oracle Database 10g is the first database designed for enterprise grid computing, the most flexible and
Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015
Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Disclaimer The following is intended to outline our general product direction. It is intended
An Oracle White Paper February 2014. Centralized vs. Distributed SIP Trunking: Making an Informed Decision
An Oracle White Paper February 2014 Centralized vs. Distributed SIP Trunking: Making an Informed Decision Executive Overview Businesses across the globe are migrating from TDM access services to SIP trunks
An Oracle White Paper August 2011. Oracle VM 3: Application-Driven Virtualization
An Oracle White Paper August 2011 Oracle VM 3: Application-Driven Virtualization Introduction Virtualization has experienced tremendous growth in the datacenter over the past few years. Recent Gartner
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
An Oracle White Paper December 2010. Integrating Oracle Enterprise Single Sign-On Suite Plus with Strong Authentication
An Oracle White Paper December 2010 Integrating Oracle Enterprise Single Sign-On Suite Plus with Strong Authentication Introduction Protecting data in the digital age is critical. A security breach, if
An Oracle Technical White Paper May 2015. How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance
An Oracle Technical White Paper May 2015 How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing Kaspersky
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
An Oracle White Paper September 2013. Directory Services Integration with Database Enterprise User Security
An Oracle White Paper September 2013 Directory Services Integration with Database Enterprise User Security Disclaimer The following is intended to outline our general product direction. It is intended
An Oracle White Paper October 2011. BI Publisher 11g Scheduling & Apache ActiveMQ as JMS Provider
An Oracle White Paper October 2011 BI Publisher 11g Scheduling & Apache ActiveMQ as JMS Provider Disclaimer The following is intended to outline our general product direction. It is intended for information
An Oracle White Paper November 2010. Oracle Business Intelligence Standard Edition One 11g
An Oracle White Paper November 2010 Oracle Business Intelligence Standard Edition One 11g Introduction Oracle Business Intelligence Standard Edition One is a complete, integrated BI system designed for
An Oracle White Paper August 2010. Oracle Database Auditing: Performance Guidelines
An Oracle White Paper August 2010 Oracle Database Auditing: Performance Guidelines Introduction Database auditing has become increasingly important as threats to applications become more sophisticated.
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Disclaimer The following is intended to outline our general product
An Oracle White Paper September 2013. Oracle WebLogic Server 12c on Microsoft Windows Azure
An Oracle White Paper September 2013 Oracle WebLogic Server 12c on Microsoft Windows Azure Table of Contents Introduction... 1 Getting Started: Creating a Single Virtual Machine... 2 Before You Begin...
An Oracle White Paper April 2010. How to Install the Oracle Solaris 10 Operating System on x86 Systems
An Oracle White Paper April 2010 How to Install the Oracle Solaris 10 Operating System on x86 Systems Introduction... 1 Installation Assumptions... 2 Check the Hardware Compatibility List... 2 Basic System
Top Ten Reasons for Deploying Oracle Virtual Networking in Your Data Center
Top Ten Reasons for Deploying Oracle Virtual Networking in Your Data Center Expect enhancements in performance, simplicity, and agility when deploying Oracle Virtual Networking in the data center. ORACLE
An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance
An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
An Oracle White Paper October 2013. Oracle Data Integrator 12c New Features Overview
An Oracle White Paper October 2013 Oracle Data Integrator 12c Disclaimer This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should
An Oracle White Paper July 2014. Oracle Linux and Oracle VM Remote Lab User Guide
An Oracle White Paper July 2014 Oracle Linux and Oracle VM Remote Lab User Guide Contents Introduction... 1 Infrastructure Requirements on the Client Side... 2 Overview of the Lab Hardware... 3 Logging
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory Overview August 2008 Introduction... 3 Centralizing DataBase Account Management using Existing Directories with OVD...
An Oracle Technical White Paper January 2014. How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance
An Oracle Technical White Paper January 2014 How to Configure the Trend Micro IWSA Virus Scanner for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing
An Oracle White Paper June 2010. How to Install and Configure a Two-Node Cluster
An Oracle White Paper June 2010 How to Install and Configure a Two-Node Cluster Table of Contents Introduction... 3 Two-Node Cluster: Overview... 4 Prerequisites, Assumptions, and Defaults... 4 Configuration
An Oracle White Paper January 2013. Integrating Oracle Application Express with Oracle Access Manager. Revision 1
An Oracle White Paper January 2013 Integrating Oracle Application Express with Oracle Access Manager Revision 1 Disclaimer The following is intended to outline our general product direction. It is intended
ORACLE VM MANAGEMENT PACK
ORACLE VM MANAGEMENT PACK Effective use of virtualization promises to deliver significant cost savings and operational efficiencies. However, it does pose some management challenges that need to be addressed
Oracle Primavera Gateway
Oracle Primavera Gateway Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is
ORACLE INFRASTRUCTURE AS A SERVICE PRIVATE CLOUD WITH CAPACITY ON DEMAND
ORACLE INFRASTRUCTURE AS A SERVICE PRIVATE CLOUD WITH CAPACITY ON DEMAND FEATURES AND FACTS FEATURES Hardware and hardware support for a monthly fee Optionally acquire Exadata Storage Server Software and
How to Configure Symantec Protection Engine for Network Attached Storage for the Oracle ZFS Storage Appliance
An Oracle Technical White Paper January 2014 How to Configure Symantec Protection Engine for Network Attached Storage for the Oracle ZFS Storage Appliance Table of Contents Introduction... 3 How VSCAN
An Oracle Technical Article October 2014. Certification with Oracle Linux 5
An Oracle Technical Article October 2014 Certification with Oracle Linux 5 Introduction... 1 Comparing Oracle Linux 5 and Red Hat Enterprise Linux (RHEL) 5.. 2 Checking the /etc/ File... 2 Checking for
An Oracle White Paper September 2012. Oracle Database and the Oracle Database Cloud
An Oracle White Paper September 2012 Oracle Database and the Oracle Database Cloud 1 Table of Contents Overview... 3 Cloud taxonomy... 4 The Cloud stack... 4 Differences between Cloud computing categories...
PeopleSoft Enterprise Directory Interface
PeopleSoft Enterprise Directory Interface Today s self-service applications deliver information and functionality to large groups of users over the internet. Organizations use these applications as a cost-effective
An Oracle White Paper August 2011. Oracle VM 3: Server Pool Deployment Planning Considerations for Scalability and Availability
An Oracle White Paper August 2011 Oracle VM 3: Server Pool Deployment Planning Considerations for Scalability and Availability Note This whitepaper discusses a number of considerations to be made when
An Oracle Communications White Paper December 2014. Serialized Asset Lifecycle Management and Property Accountability
An Oracle Communications White Paper December 2014 Serialized Asset Lifecycle Management and Property Accountability Disclaimer The following is intended to outline our general product direction. It is
How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance
An Oracle Technical White Paper November 2014 How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance Table of Contents Introduction...3 Active Directory LDAP Services...4
An Oracle White Paper January 2011. Using Oracle's StorageTek Search Accelerator
An Oracle White Paper January 2011 Using Oracle's StorageTek Search Accelerator Executive Summary...2 Introduction...2 The Problem with Searching Large Data Sets...3 The StorageTek Search Accelerator Solution...3
Oracle s Solution for Secure Remote Workers. Providing Protected Access to Enterprise Communications
Oracle s Solution for Secure Remote Workers Providing Protected Access to Enterprise Communications Our forecast shows that the worldwide mobile worker population will increase to more than 1.3 billion
An Oracle White Paper August 2010. Oracle OpenSSO Fedlet
An Oracle White Paper August 2010 Oracle OpenSSO Fedlet Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide
An Oracle White Paper February 2011 Sun ZFS Storage Appliance Rule-Based Identity Mapping Between Active Directory and Network Information Services Implementation Guide Introduction... 4 Overview and Prerequisites...
Managed Storage Services
An Oracle White Paper January 2014 Managed Storage Services Designed to Meet Your Custom Needs for Availability, Reliability and Security A complete Storage Solution Oracle Managed Cloud Services (OMCS)
Oracle Fusion Middleware
Oracle Fusion Middleware Getting Started with Oracle Data Integrator 12c Virtual Machine Installation Guide December 2014 Oracle Fusion Middleware Getting Started with Oracle Data Integrator, 12c Copyright
An Oracle White Paper February 2014. Oracle Data Integrator 12c Architecture Overview
An Oracle White Paper February 2014 Oracle Data Integrator 12c Introduction Oracle Data Integrator (ODI) 12c is built on several components all working together around a centralized metadata repository.
An Oracle Technical White Paper November 2011. Oracle Solaris 11 Network Virtualization and Network Resource Management
An Oracle Technical White Paper November 2011 Oracle Solaris 11 Network Virtualization and Network Resource Management Executive Overview... 2 Introduction... 2 Network Virtualization... 2 Network Resource
An Oracle White Paper September 2013. Advanced Java Diagnostics and Monitoring Without Performance Overhead
An Oracle White Paper September 2013 Advanced Java Diagnostics and Monitoring Without Performance Overhead Introduction... 1 Non-Intrusive Profiling and Diagnostics... 2 JMX Console... 2 Java Flight Recorder...
APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS
APPLICATION MANAGEMENT SUITE FOR ORACLE E-BUSINESS SUITE APPLICATIONS Oracle Application Management Suite for Oracle E-Business Suite is a robust application management solution that helps you achieve
Performance with the Oracle Database Cloud
An Oracle White Paper September 2012 Performance with the Oracle Database Cloud Multi-tenant architectures and resource sharing 1 Table of Contents Overview... 3 Performance and the Cloud... 4 Performance
An Oracle White Paper March 2013. Oracle s Single Server Solution for VDI
An Oracle White Paper March 2013 Oracle s Single Server Solution for VDI Introduction The concept of running corporate desktops in virtual machines hosted on servers is a compelling proposition. In contrast
Oracle s Unified Communications Infrastructure Solution. Delivering Secure, Reliable, and Scalable Unified Communications Services
Oracle s Unified Communications Infrastructure Solution Delivering Secure, Reliable, and Scalable Unified Communications Services Oracle s UC infrastructure solution combines tightly coupled session management,
Highmark Unifies Identity Data With Oracle Virtual Directory. An Oracle White Paper January 2009
Highmark Unifies Identity Data With Oracle Virtual Directory An Oracle White Paper January 2009 Highmark Unifies Identity Data With Oracle Virtual Directory Executive Summary... 3 The Challenge: A Single
Oracle Database Backup Service. Secure Backup in the Oracle Cloud
Oracle Database Backup Service Secure Backup in the Oracle Cloud Today s organizations are increasingly adopting cloud-based IT solutions and migrating on-premises workloads to public clouds. The motivation
An Oracle White Paper May 2013. Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices
An Oracle White Paper May 2013 Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices Introduction... 1 Component Overview... 2 Sizing Hardware Requirements... 3 Audit Vault Server Sizing...
Using Symantec NetBackup with VSS Snapshot to Perform a Backup of SAN LUNs in the Oracle ZFS Storage Appliance
An Oracle Technical White Paper March 2014 Using Symantec NetBackup with VSS Snapshot to Perform a Backup of SAN LUNs in the Oracle ZFS Storage Appliance Introduction... 2 Overview... 3 Oracle ZFS Storage
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
Introduction to the HP Server Automation system security architecture
Introduction to the HP Server Automation system security architecture Technical white paper Table of contents Introduction to the HP Server Automation system security architecture... 2 Enforcing strict
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere
Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere White Paper 7KH#&KDOOHQJH Virtual Private Networks (VPNs) provides a powerful means of protecting the privacy and integrity
Introduction to Virtual Datacenter
Oracle Enterprise Manager Ops Center Configuring a Virtual Datacenter 12c Release 1 (12.1.1.0.0) E27347-01 June 2012 This guide provides an end-to-end example for how to use Oracle Enterprise Manager Ops
How To Achieve Pca Compliance With Redhat Enterprise Linux
Achieving PCI Compliance with Red Hat Enterprise Linux June 2009 CONTENTS EXECUTIVE SUMMARY...2 OVERVIEW OF PCI...3 1.1. What is PCI DSS?... 3 1.2. Who is impacted by PCI?... 3 1.3. Requirements for achieving
An Oracle White Paper January, 2015. Enterprise Manager Cloud Control 12c: Configuring External User Authentication Using Microsoft Active Directory
An Oracle White Paper January, 2015 Enterprise Manager Cloud Control 12c: Configuring External User Authentication Using Microsoft Active Directory Table of Contents Executive Overview... 3 Introduction...
ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE
ORACLE FINANCIAL SERVICES ANALYTICAL APPLICATIONS INFRASTRUCTURE KEY FEATURES Rich and comprehensive business metadata allows business users to interact with financial services data model to configure
ORACLE VIRTUAL DESKTOP INFRASTRUCTURE
ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops
An Oracle White Paper April 2012. Network Isolation in Private Database Clouds
An Oracle White Paper April 2012 Network Isolation in Private Database Clouds Executive Overview... 1 Different types of network isolation... 2 Network Traffic Isolation... 3 Network Security Isolation...
An Oracle White Paper December 2013. The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks
An Oracle White Paper December 2013 The Value of Diameter Signaling in Security and Interworking Between 3G and LTE Networks Introduction Today s mobile networks are no longer limited to voice calls. With
An Oracle White Paper October 2013. Gneis Turns to Oracle to Secure and Manage SIP Trunks
An Oracle White Paper October 2013 Gneis Turns to Oracle to Secure and Manage s Gneis Turns to Oracle to Secure and Manage s Executive Overview Gneis Global Services SA planned to introduce Session Initiation
An Oracle White Paper November 2011. Upgrade Best Practices - Using the Oracle Upgrade Factory for Siebel Customer Relationship Management
An Oracle White Paper November 2011 Upgrade Best Practices - Using the Oracle Upgrade Factory for Siebel Customer Relationship Management Executive Overview... 1 Introduction... 1 Standard Siebel CRM Upgrade
A Comprehensive Solution for API Management
An Oracle White Paper March 2015 A Comprehensive Solution for API Management Executive Summary... 3 What is API Management?... 4 Defining an API Management Strategy... 5 API Management Solutions from Oracle...
Driving Down the High Cost of Storage. Pillar Axiom 600
Driving Down the High Cost of Storage Pillar Axiom 600 Accelerate Initial Time to Value, and Control Costs over the Long Term Make a storage investment that will pay off in rapid time to value and low
Oracle TimesTen In-Memory Database on Oracle Exalogic Elastic Cloud
An Oracle White Paper July 2011 Oracle TimesTen In-Memory Database on Oracle Exalogic Elastic Cloud Executive Summary... 3 Introduction... 4 Hardware and Software Overview... 5 Compute Node... 5 Storage
An Oracle Technical White Paper June 2010. Oracle VM Windows Paravirtual (PV) Drivers 2.0: New Features
An Oracle Technical White Paper June 2010 Oracle VM Windows Paravirtual (PV) Drivers 2.0: New Features Introduction... 2 Windows Paravirtual Drivers 2.0 Release... 2 Live Migration... 3 Hibernation...
Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E 2 0 15
Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E 2 0 15 Table of Contents Fully Integrated Hardware and Software
An Oracle White Paper June, 2012. Provisioning & Patching Oracle Database using Enterprise Manager 12c.
An Oracle White Paper June, 2012 Provisioning & Patching Oracle Database using Enterprise Manager 12c. Table of Contents Executive Overview... 2 Introduction... 2 EM Readiness:... 3 Installing Agent...
End-to-End E-Clinical Coverage with Oracle Health Sciences InForm GTM
End-to-End E-Clinical Coverage with InForm GTM A Complete Solution for Global Clinical Trials The broad market acceptance of electronic data capture (EDC) technology, coupled with an industry moving toward
