Thursday Aug 26, 2010

Register Today for Free Webinar: Simplify Access Management with F5 & Oracle

On Thursday, August 26.  We are hosting a webcast that will take you through the solution and talk about why we believe this will simplify Access Management.  Please join us as F5 and Oracle product experts explain this simple solution.

Title: Live Webcast: Streamline Access Management with F5 & Oracle

When:  Thursday, August 26, 2010, 10:00 a.m. PT or 1:00 p.m. ET

Where: Register for this live webcast here: Streamline Access Management with F5 & Oracle

Tuesday Apr 27, 2010

Iron Man 2, Identity Security, Directory Services and the Cloud

If you are a security expert and you have not been to the new Oracle Iron Man 2 website you have to take a look at the cool demo site listed under "Stark Expo".  The intro has a great security questionnaire on Security in the cloud in an cutting edge interface.  If you read yesterday's blog, and went to the Iron-Clad Cloud: Secure Cloud Computing article in the new Security Newsletter, you were able to get an insight into way's Oracle can help secure the cloud.  You will also do well on the questionnaire at "Stark Expo".

 Go Check it out!

In Iron Man 2, Oracle is a proud sponsor of Stark Expo, a world-class tradeshow that depends on a cloud computing architecture to ensure that all systems are free from overload. And that’s where you come in: by becoming a Master Cloud Operative, you’ll help keep Stark Expo up and running. Complete your training, test your troubleshooting skills, and get certified in the Oracle Pavilion.

Monday Apr 26, 2010

Iron-Clad Cloud: Secure Cloud Computing

As organizations continue to leverage the cloud for essential business applications and services the provisioning and security of identity data becomes an essential compliance requirement.  Oracle's new Security Newsletter  has an article that provides information on critical approaches to security in the cloud.

One solution to the security problem with cloud services can be overcome using Service Oriented Security.  The Oracle approach to using Service Oriented Security allows developers to pull from a centralized, authoritative source of identity services.  This allows developers to build security into every application from the inside-out.   This is critical to ensuring this is done in a standardized manner and most importantly it allows developers to develop without being security experts.

The "Iron-Clad Cloud:  Secure Cloud Computing" article in this quarter's Security Newsletter is a great place to start when looking for information on how to use these tools to improve the security for your organizations cloud services.  You will also find articles on database security and other bloggers who are sharing data about the security industry and Oracle's thought-leadership.
About

This blog provides information regarding the Oracle Directory Server Enterprise Edition and Oracle Unified Directory products. Use this blog to get the latest breaking information regarding releases and updates plus other technical and non-technical information.

Search

Archives
« April 2014
SunMonTueWedThuFriSat
  
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
   
       
Today