Any Company/Organization planning to move to cloud or looking to deploy a greenfield workload, will require a well architected landing zone with the right security posture.
If we are planning to use Rest Services provided by Integrated SOA Gateway (ISG), the first step is to ensure that our EBS instance is configured to use it. The prerequisite is that we should know the E-Business Suite concepts, patching and backend components.
Security has always been a pressing concern even for the most seasoned DBA. Regardless of versions and editions, SQL databases are under constant threat as they hold sensitive data, and that is what the malicious hackers want to access.
This blog describes how to set up the security in PostgreSQL and AWS Aurora and related best practices. The Database security refers to a set of procedures and policies that safeguard data. It becomes crucial to understand its significance.
MFA is where users are prompted /required to authenticate with additional verification using additional form of identity verification.
MFA is a way to secure your apps and data by requiring users to use another form of verification. Also, MFA gives additional security by introducing an additional form for verification and provide strong authentication by a range of simple-to-use validation methods.
This blog covers steps on how to implement Multi Factor Authentication (MFA) for E-business suite, and Security Assertion Markup Language (SAML).
With Growing business demands and volume, grows the necessity of having a fault tolerant system. A system that will still be available in case of any natural disaster. There are scenarios when systems need to be taken down for scheduled maintenance. But what if the business demands do not allow the system to be taken down? The answer is to have a Disaster Recovery site (DR).
Rackspace offers Cloudflare’s Zero Trust platform which consolidates many once distinct technology solutions — Zero Trust Network Access, Secure Web Gateway, DNS Filtering, Cloud Access Security Broker (CASB), and more — into a single, natively integrated platform.
When configuring Oracle E-Business Suite in a DMZ configuration, you can deploy firewalls at different levels to restrict access to only the web pages required for the business.
It all started with a discussion with one of my colleagues who is working as an SAP security consultant.