Manager at a manufacturing company with 5,001-10,000 employees
Real User
2020-12-02T14:03:14Z
Dec 2, 2020
Encrypting a single column is straightforward, but encrypting at the table level requires more work and takes longer to complete. Having a single command to encrypt a table would be an improvement.
Oracle Cloud Project Manager at a tech services company with 501-1,000 employees
Real User
2020-05-18T07:50:00Z
May 18, 2020
It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained.
What is endpoint security? Endpoint security refers to securing entry points or endpoints of user devices to protect them from malicious attacks or cybersecurity threats and other sophisticated malware. An endpoint can be defined as any device that can be connected to a network, which can include laptops, tablets, mobile devices, smart watches, printers, servers, ATM machines, and even medical devices. It is crucial for organizations to use endpoint security in order to secure their...
Encrypting a single column is straightforward, but encrypting at the table level requires more work and takes longer to complete. Having a single command to encrypt a table would be an improvement.
It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained.