Skip to main content

Posts Tagged ‘security’

Healthcare Cloud Usage Grows Despite Doubts

The healthcare industry is leaning upon cloud more heavily, but there is still mistrust regarding its security, according to research presented at HIMSS 2019. The insights, shared by HIMSS Media’s Janet King at the conference, show contradictions around cloud in the industry. Security worries persist despite cloud usage growing. Here are the five key takeaways […]

5 Tips For Managing Ip And Security Protections When Outsourcing

5 Tips for Managing IP and Security Protections When Outsourcing

Information security and IP protections are more important than ever, considering the resounding impacts of the latest security breaches and the numerous points of vulnerability. In 2018 alone, Facebook, Uber, Google+, T-Mobile, and FIFA all experienced security breaches with each breach affecting, at a minimum, millions of users and costing millions of dollars. In fact, […]

Dispatcher Hero

Mastering AEM Dispatcher Part 7: Securing the Dispatcher

We’re locking down the AEM Dispatcher as we continue in the series, Mastering the AEM Dispatcher. In this post, we’ll discuss gotchas with Sling Servlets and the AEM Dispatcher and a tool to scan your Dispatcher for common security issues. The AEM Dispatcher is not just a caching engine and load balancer is the first […]

Oracle Fusion SaaS Security with Oracle Analytics Cloud

The question that is often asked is: Can we leverage the same security we already have in Oracle Fusion SaaS (which includes users, duties, roles and security policies) to secure data in Oracle Analytics Cloud (OAC – an Oracle PaaS)? The answer is Yes. To understand better how this is possible, keep reading. This blog […]

How to Create an OAC Data Replication from Oracle SaaS?

Oracle Analytics Cloud offer several options when it comes to loading data from Oracle SaaS (such as Financials, HCM, Sales, etc…). Using OAC against Oracle SaaS has several advantages, and most importantly being able to perform analytics on data that is not part of the SaaS application. You may be familiar with using Data Sync […]

How to Integrate Oracle SaaS Data into Oracle Analytics Cloud?

Reporting on Oracle Fusion and non-Fusion SaaS Apps from Oracle Analytics Cloud (OAC) is a common solution to performing cross-functional reporting from one or more Cloud and non-Cloud applications. The BI capabilities within each of the transaction systems, whether Financials, HCM, Sales or other, are limited when it comes to integrated reporting with external data […]

Fortifying your eCommerce Servers with a Bastion Host

Ensuring the security of business-critical servers hosting e-commerce websites is a challenge in itself. And with the internet becoming an increasingly hostile environment, with threats of all kinds lurking around and ready to exploit, one needs to be a step ahead and increase the perimeter of their security. A bastion host, as the name itself […]

Custom Data Connector Integrates Power BI and MicroStrategy

Custom Data Connector for Power BI Using MicroStrategy

The MicroStrategy platform allows custom data connectors to access data from nearly any source, which includes Microsoft Power BI. In order to bring the best of both worlds together, Perficient’s MicroStrategy experts have developed a custom data connector to help Power BI users do just that. This custom connector integrates the two products and provides […]

Advantages of Datorama

Preparing for TLS 1.0/1.1 Deprecation and Why You Should Care

As you may have heard through the grape vine, TLS 1.0/1.1 will be deprecated starting October 31st, 2018. So what does that mean and why should you care? In this article we’ll discuss what this means for users of Lync/Skype for Business on-premises and Skype for Business Online and why TLS 1.2 will be mandatory going […]

The Different Types Of Iot Security Attacks

The Different Types of IoT Security Attacks

?When we introduced the concept of IoT security in this blog post, we covered some simple guidelines to help you prevent security breaches and minimize the damage caused by attacks on IoT devices. In this article, we’ll focus more on defining the potential security risks in regards to IoT.  To understand the risks in IoT infrastructure […]

How Iot Infrastructure Factors Into Data Security And What That Means For You

How IoT Infrastructure Factors into Data Security and What That Means for You

What can you truly do to prevent and deal with cyber attacks? The answer is right here in these primary IoT principles. The Internet of Things, or IoT, is transforming traditional industries and providing unprecedented amounts of data to provide world-altering information to all users and adopters. However, the IoT is also vulnerable to security breaches and the ensuing […]

5 Common Ops Mistakes You Should Catch Early

5 Common Ops Mistakes You Should Catch Early

In Devops, change is imminent but when poorly managed it can lead to these five common mistakes and further performance issues. Because DevOps centers around change, and consistent change at that, it’s easy to encounter instability during a project. No one wants that, but avoiding it entirely is not possible. You see, in Ops we […]

Load More