Webcast Replay Available: E-Business Suite Data Protection

I am pleased to release the replay and presentation for the latest ATG Live Webcast:

E-Business Suite Data Protection (Presentation)

Screenshot of E-Business Suite Data Access auditing


Robert Armstrong, Product Strategy Security Architect and Eric Bing, Senior Director discussed the best practices and recommendations for securing your E-Business Suite data.

Finding other recorded ATG webcasts

The catalog of ATG Live Webcast replays, presentations, and all ATG training materials is available in this blog's Webcasts and Training section.

Comments:

Thanks for making this available Bill. Its a very interesting article, especially the new ccm features in 12.1.3
Regards
Stuart

Posted by Stuart on March 22, 2012 at 06:28 AM PDT #

Stuart,

I am glad you are finding the articles/presentations useful. I will pass this along to the presenters. I am sure they will appreciate the recognition.

Regards,
Bill Sawyer

Posted by Bill Sawyer on March 22, 2012 at 06:47 AM PDT #

Thanks Bill for this detailed presentation and webcast. I have following questions on this presentation:
1. This presentation suggest that no application changes are required when we use Transparent Tablespace Encryption. Is this transparent even when we use Oracle Data Guard to have stand-by database image in disaster recovery site?
2. Presentation suggest that Transparent Tablespace Encryption is "High Performance". Does it mean that enabling this kind of encryption does not have any negative impact on query performance?

Posted by Nitin Jain on May 30, 2012 at 11:32 AM PDT #

Nitin,

Here are your responses from the Development Team.

1.) Yes, DataGuard is not a problem; in Active DataGuard, when HSMs are used for key management, we even ship the re-key commands to the secondary sites; my TDE FAQ on OTN has an entry for that use case.

2.) We measured the performance impact (CPU load and end-user response time) to be less than 10%; (most customers say it's not recognizable), but that was before we leveraged the hardware crypto acceleration available in Intel XEON CPUs with AES-NI and SPARC T4 CPUs. With that, we get close to 0%

Posted by Bill Sawyer on June 08, 2012 at 10:03 AM PDT #

Post a Comment:
  • HTML Syntax: NOT allowed
About

Search

Categories
Archives
« April 2014
SunMonTueWedThuFriSat
  
1
4
5
6
7
8
9
10
11
12
13
14
19
20
21
22
23
24
25
26
27
28
29
30
   
       
Today