Oracle Exadata Database Machine : ASM Level Security and Data Base ( Part 3 )

In the previous two parts of this article on implementing security in an environment of "Oracle Exadata Database Machine" it has shown the way in which security is created at the level of ASM (Part 1) and database level (Part [...]

By | July 29th, 2015|Oracle, Whitepapers|0 Comments

Oracle Exadata Database Machine : ASM level security and Base Data (Part 2)

In the first part of this article explained why it is very important to implement security in an environment of "Oracle Exadata Database Machine" to restrict the use of the "Grid Disk" to certain databases or clusters of ASM and [...]

By | July 29th, 2015|Oracle, Whitepapers|0 Comments

Oracle Exadata Database Machine : ASM level security and Base Data (Part 1)

The secure access to data is a very important issue that any organization should implement and not neglect. In an environment of "Oracle Exadata Database Machine " is well known that you have multiple servers, each dedicated to instances of [...]

By | July 29th, 2015|Oracle, Whitepapers|0 Comments
Load More Posts