Skip to main content

Posts Tagged ‘security’

Oracle Fusion SaaS Security with Oracle Analytics Cloud

The question that is often asked is: Can we leverage the same security we already have in Oracle Fusion SaaS (which includes users, duties, roles and security policies) to secure data in Oracle Analytics Cloud (OAC – an Oracle PaaS)? The answer is Yes. To understand better how this is possible, keep reading. This blog […]

How to Create an OAC Data Replication from Oracle SaaS?

Oracle Analytics Cloud offer several options when it comes to loading data from Oracle SaaS (such as Financials, HCM, Sales, etc…). Using OAC against Oracle SaaS has several advantages, and most importantly being able to perform analytics on data that is not part of the SaaS application. You may be familiar with using Data Sync […]

How to Integrate Oracle SaaS Data into Oracle Analytics Cloud?

Reporting on Oracle Fusion and non-Fusion SaaS Apps from Oracle Analytics Cloud (OAC) is a common solution to performing cross-functional reporting from one or more Cloud and non-Cloud applications. The BI capabilities within each of the transaction systems, whether Financials, HCM, Sales or other, are limited when it comes to integrated reporting with external data […]

Fortifying your eCommerce Servers with a Bastion Host

Ensuring the security of business-critical servers hosting e-commerce websites is a challenge in itself. And with the internet becoming an increasingly hostile environment, with threats of all kinds lurking around and ready to exploit, one needs to be a step ahead and increase the perimeter of their security. A bastion host, as the name itself […]

Custom Data Connector Integrates Power BI and MicroStrategy

Custom Data Connector for Power BI Using MicroStrategy

The MicroStrategy platform allows custom data connectors to access data from nearly any source, which includes Microsoft Power BI. In order to bring the best of both worlds together, Perficient’s MicroStrategy experts have developed a custom data connector to help Power BI users do just that. This custom connector integrates the two products and provides […]

Advantages of Datorama

Preparing for TLS 1.0/1.1 Deprecation and Why You Should Care

As you may have heard through the grape vine, TLS 1.0/1.1 will be deprecated starting October 31st, 2018. So what does that mean and why should you care? In this article we’ll discuss what this means for users of Lync/Skype for Business on-premises and Skype for Business Online and why TLS 1.2 will be mandatory going […]

The Different Types Of Iot Security Attacks

The Different Types of IoT Security Attacks

?When we introduced the concept of IoT security in this blog post, we covered some simple guidelines to help you prevent security breaches and minimize the damage caused by attacks on IoT devices. In this article, we’ll focus more on defining the potential security risks in regards to IoT.  To understand the risks in IoT infrastructure […]

How Iot Infrastructure Factors Into Data Security And What That Means For You

How IoT Infrastructure Factors into Data Security and What That Means for You

What can you truly do to prevent and deal with cyber attacks? The answer is right here in these primary IoT principles. The Internet of Things, or IoT, is transforming traditional industries and providing unprecedented amounts of data to provide world-altering information to all users and adopters. However, the IoT is also vulnerable to security breaches and the ensuing […]

5 Common Ops Mistakes You Should Catch Early

5 Common Ops Mistakes You Should Catch Early

In Devops, change is imminent but when poorly managed it can lead to these five common mistakes and further performance issues. Because DevOps centers around change, and consistent change at that, it’s easy to encounter instability during a project. No one wants that, but avoiding it entirely is not possible. You see, in Ops we […]

consumers

4 Benefits of a Single Sign On in Healthcare

Wouldn’t it be nice if there was a single sign on (SSO) for your daily work routine? How many moments would be spent helping a patient, instead of staring at a screen trying to remember usernames or password credentials? Take a moment and consider this. How many applications, websites, and dashboards do you have to […]

FR 2052a

IoMT and the Necessity for Cybersecurity

Cyber-security: a continuous mission to supervise, support, and evolve data protection. Healthcare providers remain aware and proactive in regards to cyber-attacks or malware that feature threats to patient records, and internal documents. By continuously remaining alert, healthcare organizations can confirm their IoMT networks are secure. What is Internet of Medical Things (IoMT)? IoMT features a […]

How Microsoft Word “Protected View” Stops Information Leaks

Microsoft Word has long offered support for loading images and templates over the network.  This is a great feature within corporate environments because it facilitates the reuse of assets like logos and corporate document templates.  Unfortunately, these features can be abused by bad actors to obtain operational intelligence on individuals, or even to steal credentials.  […]

Load More