1 An Oracle White Paper June 2011 Oracle Database Firewall 5.0 Sizing Best Practices
2 Introduction... 1 Component Overview... 1 Database Firewall Deployment Modes... 2 Sizing Hardware Requirements... 2 Database Firewall Sizing... 2 Management Server Sizing... 3 Deployment Planning... 4 High Availability Considerations... 4 Single Platform Deployments... 4 SQL Logging Policies... 5 Deployment Reference Architectures... 5 Allocation of Database Firewalls to Protected Databases... 6 Requirements for Resiliency, High-Availability and Testing... 6 Conclusion... 7
3 Introduction Oracle Database Firewall provides the first line of defense for databases, helping prevent internal and external attacks from ever reaching the database. Highly accurate SQL grammarbased technology monitors and blocks unauthorized SQL traffic on the network, while flexible configuration options allow for efficient, cost-effective deployments across the enterprise. Oracle Database Firewall can be tailored to suit numerous environments with seamless support for an extensive range of hardware platforms, assuring that a deployed architecture can scale for future growth. This guide contains three sections. The first section provides a brief overview of the Oracle Database Firewall components. The second section provides a method for determining hardware requirements for individual Oracle Database Firewall deployments. The third section outlines the issues that will determine the placement and number of Oracle Database Firewalls and Oracle Management Servers throughout the enterprise. Component Overview Oracle Database Firewall deployments are comprised of two primary components: the Database Firewall and the Management Server. The Database Firewall is placed in-line or out-of-band on the network to inspect the network traffic. The Management Server is used for centralized configuration, administration, and reporting. SQL traffic logged by Database Firewalls is transferred to the central Management Server. Figure 1: Oracle Database Firewall Components 1
4 Database Firewall Deployment Modes The Database Firewall can be deployed in different configurations depending on your individual security requirements. In-line network blocking - SQL traffic is passed through the Database Firewall and inspected before it is forwarded to the database or blocked. Out-of-band passive network monitoring A copy of the SQL traffic to and from the database is sent to the Database Firewall (usually by means of a span port) for analysis and alerting. Combined deployment: in-line and/or out-of-band deployments can be configured on the same Database Firewall and combined with local server-side, monitor-only agents for local connections. The Database Firewall operates in two modes depending on your security and operational needs. Database Activity Monitoring (DAM): The system detects and logs unusual activity, and produces warnings, but does not block potential threats. It is also known as monitoring mode. Database Policy Enforcement (DPE): The system performs all the actions of database activity monitoring and blocks potential attacks. It is also known as blocking mode. It is important to note that a single Database Firewall can provide heterogeneous, multi-database enforcement support for Oracle 8i, Oracle Database 10g and Oracle Database 11g databases simultaneously, as well as Microsoft SQL Server, Sybase ASE, Sybase SQL Anywhere, and IBM DB2 LUW databases. Sizing Hardware Requirements Database Firewall Sizing The total number of transactions per second is the main factor used in planning for Database Firewall capacity. CPU As a result, available processing power is an important factor determining the capacity and performance of a Database Firewall. The number of cores required can be estimated by allocating one core for management overhead, and adding another core for every 5,000 SQL transactions per second monitored by Database Firewall. Table 1 lists the recommended number of CPU cores based on the total rate of SQL transactions per second for all databases protected by Database Firewall. The Oracle column in the table represents the estimated transactions per second (TPS) that can be read by the Database Firewall. The Other RDBMS column in the table represents the number of TPS that can be read by the Database Firewall for the other supported databases. If you have a Database Firewall that is monitoring a combination of heterogeneous RDBMSs, then you can use an estimate of 5,000 TPS, otherwise the numbers in the columns can guide you on the number of COREs that are recommended. 2
5 NUMBER OF CORES PERFORMANCE: TRANSACTIONS PER SECOND (TPS) >= 2.8 GHZ PLANNING FOR MIXED RDBMS ENVIRONMENT ORACLE OTHER RDBMS 2 5,600 4,200 8, ,800 12,600 25, ,000 21,000 42, ,200 29,400 58, ,400 37,800 75, ,600 46,200 92, ,800 54, , ,000 63, , , , , , , ,800 Memory Minimum: Recommended: 2.0GB 1.0GB per Protected Database: moderate use 1.5GB per Protected Database: medium use 2.0GB per Protected Database: heavy use The system will function with less memory, but a larger memory size will improve performance during periods of high throughput. Disk Minimum: Recommended: 100 GB 300 GB Disk space is used for temporary storage of log files containing the captured SQL traffic and associated data. Available disk space should be large enough to retain several days of log files in case communication between the Database Firewall and the Management Server is interrupted (e.g. link failure between data centers). Management Server Sizing The volume of transactions logged will be the primary influence on the specification of the Management Server. 3
6 CPU Minimum: 1 core Recommended minimum: 2 cores Although the Management Server can operate on 1 core, it is recommended that 2 to 8 cores be available depending primarily on the amount of data being logged and the number and size of reports being generated. The number of databases being protected should be considered as a secondary factor. Memory Minimum: 2 GB Recommended minimum: 4 GB Memory should be increased up to 8 GB for systems with heavy loads. Disk When planning disk space requirements, follow the formula below, changing values as required for the target environment. Industry best-practices should be followed when choosing RAID configurations and disk type and speed. Assumption: 1 statement = 1000 bytes of storage after binary logging, summarization, reporting and compression 10 statements = 10k 1,000 statements = 1Mk bytes 1,000,000 statements 1GB bytes Logging 1,000tps = 85m transactions per day logged 85 x 1GB = 85Gb / day 12 Days = 1 TB Deployment Planning High Availability Considerations For high availability, it is recommended to deploy a secondary (standby) Management Server using the same hardware specification as the primary Management Server. This will enable it to stay synchronized with the primary during heavy loads, and ensure that it can properly perform the role as the primary unit. Single Platform Deployments In most cases, the Database Firewall and Management Server are deployed on separate, dedicated machines. However, it is possible to combine the two functions on one server. Determining the appropriate hardware specification required for a single platform deployment can be done most simply by combining the guidelines for a separate Database Firewall and Management Server. 4
7 For example, a deployment required to handle 15,000 transactions per second would require 4 CPU cores and 4GB of memory. The Management Server for this level of throughput could be the minimum, with one CPU core and 2GB of memory. The total required for the stand-alone unit would therefore be 5 CPU cores and 6GB of memory. Remember to ensure you have an adequate amount of disk space, with the speed of the disks and RAID configuration also impacting the performance. As industry best practice, it is strongly recommended that a separate Management Server be deployed on separate dedicated hardware. This minimizes the potential for reporting, archiving and configuration functions of the management server to impact on the higher priority functions of blocking, alerting and logging performed by the Database Firewalls. Many customers find it useful to undertake an initial sizing exercise to get an estimate for deployment planning. A stand-alone Management Server is ideal for monitoring database traffic at different points in the corporate network to collect and report the information required and to build initial policy baselines. SQL Logging Policies One of the primary factors determining the capacity of the Management Server will be the logging policy applied. In high through-put environments, a log-all policy is not recommended on several fronts. Firstly, the amount of data stored (one record for every query sent to the database) will soon create a repository much larger than the databases being protected. Secondly, a large amount of data often makes forensic and audit reporting more difficult by obscuring important transactions by the sheer volume of data. The Oracle Database Firewall has been designed as a security product from the beginning, with the ability to identify database queries of significance from a security and/or audit perspective in real time in a sub-millisecond timeframe. The accuracy and speed with which the Database Firewall operates allows the end-user to deploy a selective logging policy, knowing that activity identified as legitimate can be discarded with confidence as a valid part of an accurate white list. Likewise, the end user can also be confident that only interactions relevant to security and audit requirements will be logged and/or alerted. It is important to remember that the vast majority of entries in an Oracle Database Firewall white list will consist of expected transactions. Audit and security events are identified through a combination of session factors, significant white list entries, polices based on statementtypes and sensitive tables, and general out-of-policy events (anomalies). Deployment Reference Architectures Given the flexibility of Oracle Database Firewall, deployment planning should start with understanding the existing network infrastructure in the context of security and compliance requirements. Objectives to be considered are: Monitoring versus policy enforcement Security versus SQL Logging System resilience and high-availability 5
8 Allocation of Database Firewalls to Protected Databases The number and choice of databases protected by a given Database Firewall depends on the distribution of databases across the network infrastructure. The choice will also be affected by any preference for a particular size of hardware on which to deploy the Database Firewall. For example, depending on current hardware and maintenance costs, it may be more cost-effective to deploy two or three mid-range servers versus one high performance machine. Network Infrastructure Distribution Layer - The Distribution Layer of the network is comprised of the group of switches directly attached to database servers. At this level, multiple small-to-mid-sized Database Firewalls are deployed for in-line or span-port monitoring of traffic near the database. If preferred, a smaller number of larger Database Firewalls with multiple network interfaces can be used instead. Core Layer - The Core Layer (or network backbone) includes high-end switches and high-speed cables. A small number of larger Database Firewalls can monitor uplink traffic at the core (up to 10GB per network segment) in-line or via span-ports to capture SQL traffic from other segments of the corporate network or from external sources. Note that when deployed in Database Policy Enforcement (DPE) mode, the databases protected by a given network segment must be in the same subnet as the IP address assigned to the corresponding bridge on the Database Firewall. This restriction does not apply to Database Activity Monitoring (DAM) mode, whether deployed in-line or via a span port. Multiple Data Centers - For centralized management, one Management Server can control Oracle Database Firewalls deployed across multiple data centers. Distributed Management Database Firewalls can be managed by a local Management Server to suit local network topologies. Corporate security and auditing policies may encourage a separation of management between data centers or between departments. Deploying a separate Management Server may also be desirable where interconnectivity between data centers is limited by bandwidth restrictions or data protection policies. Requirements for Resiliency, High-Availability and Testing High Availability Systems Database Firewalls are compatible with a number of resilient network technologies, monitoring both primary and secondary network links. For blocking mode, HA deployments must preserve session integrity across any given Database Firewall bridge, and must utilize standard TCP/IP. When failing over, the HA configuration must also initiate new sessions across the alternate link. In addition, there is a special mode for span-port deployments that allows a resilient pair of Database Firewalls to monitor the same traffic without creating duplicate events. Management Servers can also be deployed as resilient pairs, with one Management Server operating as the primary unit, and synchronizing configuration settings and reporting data with the secondary unit. Load Balanced Environments Database Firewalls can be deployed as multiple individual units immediately in front of the database servers to match the performance and high-availability 6
9 architecture of the protected systems. Load balancers must retain session integrity through any given Database Firewall bridge and must utilize standard TCP/IP. Failover/Backup Data Centers Redundant Database Firewalls can be deployed in backup data centers, running in active mode with the latest policy settings to ensure protection for the backup systems the instant a failover occurs. Testing and Development - Most customers find it beneficial to deploy one or more Database Firewalls in their testing and development environments. In addition to the valuable summary of SQL traffic it provides, it can be used to develop and update white list policies before new systems or functionality is released. Conclusion Increasingly sophisticated threats combined with the push toward data consolidation and cloud computing are just a few of the reasons why Oracle Database Firewall is critical to safeguarding data. Data breach investigations have shown that security controls must be multi-layered to protect against threats that range from account misuse to SQL injection attacks. In addition, the ever changing regulatory landscape and renewed focus on privacy demonstrates the need for solutions to be transparent and cost effective to deploy. 7
10 Oracle Database Firewall 5.0 Sizing Best Practices June 2011 Author: Stuart Sharp Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA U.S.A. Worldwide Inquiries: Phone: Fax: Copyright 2011, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. UNIX is a registered trademark licensed through X/Open Company, Ltd oracle.com
An Oracle White Paper May 2013 Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices Introduction... 1 Component Overview... 2 Sizing Hardware Requirements... 3 Audit Vault Server Sizing...
An Oracle White Paper January 2011 Oracle Database Firewall Introduction... 1 Oracle Database Firewall Overview... 2 Oracle Database Firewall... 2 White List for Positive Security Enforcement... 3 Black
An Oracle White Paper January 2012 Oracle Database Firewall Introduction... 2 Oracle Database Firewall Overview... 3 Oracle Database Firewall... 3 White List for Positive Security Enforcement... 4 Black
Top Ten Reasons for Deploying Oracle Virtual Networking in Your Data Center Expect enhancements in performance, simplicity, and agility when deploying Oracle Virtual Networking in the data center. ORACLE
An Oracle White Paper July 2013 Introducing the Oracle Home User Introduction Starting with Oracle Database 12c Release 1 (12.1), Oracle Database on Microsoft Windows supports the use of an Oracle Home
An Oracle White Paper February 2014 Oracle Data Integrator 12c Introduction Oracle Data Integrator (ODI) 12c is built on several components all working together around a centralized metadata repository.
An Oracle White Paper August 2010 Oracle Database Auditing: Performance Guidelines Introduction Database auditing has become increasingly important as threats to applications become more sophisticated.
An Oracle White Paper September 2012 Oracle Database and the Oracle Database Cloud 1 Table of Contents Overview... 3 Cloud taxonomy... 4 The Cloud stack... 4 Differences between Cloud computing categories...
An Oracle White Paper January 2014 Managed Storage Services Designed to Meet Your Custom Needs for Availability, Reliability and Security A complete Storage Solution Oracle Managed Cloud Services (OMCS)
An Oracle White Paper March 2013 Oracle s Single Server Solution for VDI Introduction The concept of running corporate desktops in virtual machines hosted on servers is a compelling proposition. In contrast
An Oracle White Paper November 2010 Oracle Business Intelligence Standard Edition One 11g Introduction Oracle Business Intelligence Standard Edition One is a complete, integrated BI system designed for
Oracle Database Backup Service Secure Backup in the Oracle Cloud Today s organizations are increasingly adopting cloud-based IT solutions and migrating on-premises workloads to public clouds. The motivation
ORACLE VM MANAGEMENT PACK Effective use of virtualization promises to deliver significant cost savings and operational efficiencies. However, it does pose some management challenges that need to be addressed
An Oracle Communications White Paper December 2014 Serialized Asset Lifecycle Management and Property Accountability Disclaimer The following is intended to outline our general product direction. It is
An Oracle White Paper June 2012 High Performance Connectors for Load and Access of Data from Hadoop to Oracle Database Executive Overview... 1 Introduction... 1 Oracle Loader for Hadoop... 2 Oracle Direct
An Oracle White Paper January 2011 Using Oracle's StorageTek Search Accelerator Executive Summary...2 Introduction...2 The Problem with Searching Large Data Sets...3 The StorageTek Search Accelerator Solution...3
An Oracle White Paper July 2013 Accelerating Database Infrastructure Using Oracle Real Application Clusters 11g R2 and QLogic FabricCache Adapters Executive Overview Thousands of companies world-wide use
An Oracle White Paper May 2011 Distributed Development Using Oracle Secure Global Desktop Introduction One of the biggest challenges software development organizations face today is how to provide software
Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E 2 0 15 Table of Contents Fully Integrated Hardware and Software
An Oracle White Paper February 2010 Rapid Bottleneck Identification - A Better Way to do Load Testing Introduction You re ready to launch a critical Web application. Ensuring good application performance
An Oracle White Paper September 2012 Performance with the Oracle Database Cloud Multi-tenant architectures and resource sharing 1 Table of Contents Overview... 3 Performance and the Cloud... 4 Performance
An Oracle White Paper June 2013 Comparing Session Border Controllers to Firewalls with SIP Application Layer Gateways in Enterprise Voice over IP and Unified Communications Scenarios Introduction Voice
An Oracle White Paper August 2010 Higher Security, Greater Access with Oracle Desktop Virtualization Introduction... 1 Desktop Infrastructure Challenges... 2 Oracle s Desktop Virtualization Solutions Beyond
March 2014 Oracle Business Intelligence Discoverer Statement of Direction Oracle Statement of Direction Oracle Business Intelligence Discoverer Disclaimer This document in any form, software or printed
An Oracle White Paper November 2010 Leveraging Massively Parallel Processing in an Oracle Environment for Big Data Analytics 1 Introduction New applications such as web searches, recommendation engines,
An Oracle White Paper March 2012 Managing Metadata with Oracle Data Integrator Introduction Metadata information that describes data is the foundation of all information management initiatives aimed at
Configuring Oracle SDN Virtual Network Services on Netra Modular System ORACLE WHITE PAPER SEPTEMBER 2015 Introduction 1 Netra Modular System 2 Oracle SDN Virtual Network Services 3 Configuration Details
An Oracle White Paper September 2013 Advanced Java Diagnostics and Monitoring Without Performance Overhead Introduction... 1 Non-Intrusive Profiling and Diagnostics... 2 JMX Console... 2 Java Flight Recorder...
Oracle Insurance General Agent Hardware and Software Requirements Version 8.0 April 2009 Table of Contents OIGA Hardware and Software Requirements... 3 OIGA Installation Configurations... 3 Oracle Insurance
An Oracle White Paper May 2011 Exadata Smart Flash Cache and the Oracle Exadata Database Machine Exadata Smart Flash Cache... 2 Oracle Database 11g: The First Flash Optimized Database... 2 Exadata Smart
An Oracle White Paper April 2014 Oracle Audit Vault and Database Firewall Introduction... 2 Oracle Audit Vault and Database Firewall Overview... 3 Auditing and Monitoring Overview... 3 Audit Vault... 4
An Oracle White Paper September 2013 Lowering Storage Costs with the World's Fastest, Highest Capacity Tape Drive Executive Overview... 1 Introduction... 1 Unmatched Capacity and Performance... 3 Lowering
ORACLE OPS CENTER: PROVISIONING AND PATCH AUTOMATION PACK KEY FEATURES PROVISION FROM BARE- METAL TO PRODUCTION QUICKLY AND EFFICIENTLY Controlled discovery with active control of your hardware Automatically
An Oracle White Paper April, 2010 Effective Account Origination with Siebel Financial Services Customer Order Management for Banking Executive Overview In the absence of an enterprise account origination
An Oracle White Paper July 2011 Oracle Desktop Virtualization Simplified Client Access for Oracle Applications Overview Oracle has the world s most comprehensive portfolio of industry-specific applications
An Oracle White Paper May 2012 Oracle Database Cloud Service Executive Overview The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing
An Oracle White Paper July 2011 Oracle TimesTen In-Memory Database on Oracle Exalogic Elastic Cloud Executive Summary... 3 Introduction... 4 Hardware and Software Overview... 5 Compute Node... 5 Storage
An Oracle Technical White Paper November 2011 Oracle Solaris 11 Network Virtualization and Network Resource Management Executive Overview... 2 Introduction... 2 Network Virtualization... 2 Network Resource
Migrating Non-Oracle Databases and their Applications to Oracle Database 12c O R A C L E W H I T E P A P E R D E C E M B E R 2 0 1 4 1. Introduction Oracle provides products that reduce the time, risk,
An Oracle White Paper February 2014 Centralized vs. Distributed SIP Trunking: Making an Informed Decision Executive Overview Businesses across the globe are migrating from TDM access services to SIP trunks
An Oracle White Paper December 2010 Tutor Top Ten List: Implement a Sustainable Document Management Environment Executive Overview Your organization (executives, managers, and employees) understands the
An Oracle White Paper April 2010 How to Install the Oracle Solaris 10 Operating System on x86 Systems Introduction... 1 Installation Assumptions... 2 Check the Hardware Compatibility List... 2 Basic System
General Overview What is Oracle s Virtual Compute Appliance? Oracle s Virtual Compute Appliance is an integrated, wire once, software-defined infrastructure system designed for rapid deployment of both
ORACLE VIRTUAL DESKTOP INFRASTRUCTURE HIGHLY SECURE AND MOBILE ACCESS TO VIRTUALIZED DESKTOP ENVIRONMENTS KEY FEATURES Centralized virtual desktop management and hosting Facilitates access to VDI desktops
An Oracle White Paper June 2011 Managing the Product Value Chain for the Industrial Manufacturing Industry Contributing Authors: John DaDamio, Oracle PLM/PIM Applications Pre-Sales Kerrie Foy, Oracle PLM/PIM
Oracle Primavera Contract Management, Business Intelligence Publisher Edition-Sizing Guide An Oracle White Paper July 2011 1 Disclaimer The following is intended to outline our general product direction.
An Oracle White Paper June 2013 Oracle Linux Management with Oracle Enterprise Manager 12c Introduction... 1 Oracle Enterprise Manager 12c Overview... 3 Managing Oracle Linux with Oracle Enterprise Manager
An Oracle White Paper September 2013 Oracle WebLogic Server 12c on Microsoft Windows Azure Table of Contents Introduction... 1 Getting Started: Creating a Single Virtual Machine... 2 Before You Begin...
Oracle Fusion Middleware Getting Started with Oracle Data Integrator 12c Virtual Machine Installation Guide December 2014 Oracle Fusion Middleware Getting Started with Oracle Data Integrator, 12c Copyright
An Oracle White Paper February 2013 Integration with Oracle Fusion Financials Cloud Service Executive Overview Cloud computing is a vision that is increasingly turning to reality for many companies. Enterprises,
An Oracle White Paper October 2011 BI Publisher 11g Scheduling & Apache ActiveMQ as JMS Provider Disclaimer The following is intended to outline our general product direction. It is intended for information
Oracle s Solution for Secure Remote Workers Providing Protected Access to Enterprise Communications Our forecast shows that the worldwide mobile worker population will increase to more than 1.3 billion
An Oracle White Paper November 2010 Oracle Real Application Clusters One Node: The Always On Single-Instance Database Executive Summary... 1 Oracle Real Application Clusters One Node Overview... 1 Always
Next Generation Siebel Monitoring: A Real World Customer Experience An Oracle White Paper June 2010 Next Generation Siebel Monitoring: A Real World Customer Experience Table of Contents Introduction...
An Oracle Technical White Paper May 2015 How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance Table of Contents Introduction... 2 How VSCAN Works... 3 Installing Kaspersky
SUN ORACLE EXADATA STORAGE SERVER KEY FEATURES AND BENEFITS FEATURES 12 x 3.5 inch SAS or SATA disks 384 GB of Exadata Smart Flash Cache 2 Intel 2.53 Ghz quad-core processors 24 GB memory Dual InfiniBand
User Experience Direct (UX Direct) FAQ: How to create Effective Messages Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
An Oracle White Paper June 2010 How to Install and Configure a Two-Node Cluster Table of Contents Introduction... 3 Two-Node Cluster: Overview... 4 Prerequisites, Assumptions, and Defaults... 4 Configuration
An Oracle White Paper April 2012 Network Isolation in Private Database Clouds Executive Overview... 1 Different types of network isolation... 2 Network Traffic Isolation... 3 Network Security Isolation...
An Oracle White Paper October 2013 Gneis Turns to Oracle to Secure and Manage s Gneis Turns to Oracle to Secure and Manage s Executive Overview Gneis Global Services SA planned to introduce Session Initiation
Oracle s BigMachines Solutions Cloud-Based Configuration, Pricing, and Quoting Solutions for Enterprises and Fast-Growing Midsize Companies Oracle s BigMachines cloud-based solutions enable both enterprise
Oracle Virtual Networking Overview and Frequently Asked Questions March 26, 2013 Overview Oracle Virtual Networking revolutionizes data center economics by creating an agile, highly efficient infrastructure
A Framework for Implementing World-Class Talent Management The highest performing businesses are re-focusing on talent management The highest performing businesses are re-focusing on talent management.
Why Oracle Database Runs Best on Oracle Servers and Storage Optimize the Performance of the World s #1 Enterprise Database. 2 Contents 4 Engineered to Work Together 6 Oracle Optimized Solutions 10 Lower
Monitoring and Diagnosing Production Applications Using Oracle Application Diagnostics for Java An Oracle White Paper December 2007 Monitoring and Diagnosing Production Applications Using Oracle Application
An Oracle White Paper May 2011 BETTER INSIGHTS AND ALIGNMENT WITH BUSINESS INTELLIGENCE AND SCORECARDS 1 Introduction Business Intelligence systems have been helping organizations improve performance by
An Oracle Strategy Brief November 2011 Rules for Rules: Bringing Order and Efficiency to the Modern Insurance Enterprise Executive Overview... 1 Introduction... 2 Rules, Rules, Everywhere... 2 The Baseline:
An Oracle White Paper October 2011 Oracle Database Appliance Introduction The Oracle Database Appliance is a new engineered system consisting of hardware and software that saves customers time and money
An Oracle White Paper June 2010 Introduction to Determinations Engines Introduction to Determinations Engines Executive Overview IT tools and approaches can deliver significant benefits to policy implementation
An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will
An Oracle White Paper July 2014 Oracle Linux and Oracle VM Remote Lab User Guide Contents Introduction... 1 Infrastructure Requirements on the Client Side... 2 Overview of the Lab Hardware... 3 Logging
APPLICATION MANAGEMENT SUITE FOR SIEBEL APPLICATIONS USER EXPERIENCE MANAGEMENT SERVICE LEVEL OBJECTIVE REAL USER MONITORING SYNTHETIC USER MONITORING SERVICE TEST KEY PERFORMANCE INDICATOR PERFORMANCE
Oracle Whitepaper April 2015 Security and the Oracle Database Cloud Service Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database Cloud
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
An Oracle White Paper June, 2013 Enterprise Manager 12c Cloud Control Executive Overview... 2 Introduction... 2 Business Application Performance Monitoring... 3 Business Application... 4 User Experience
Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper October 2010 Disclaimer The following is intended to outline our general product direction.
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
An Oracle White Paper December 2013 Advanced Network Compression Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not