2020-05-18T07:50:00Z

What needs improvement with Oracle Advanced Security?

Julia Miller - PeerSpot reviewer
  • 0
  • 1
PeerSpot user
2

2 Answers

FH
Real User
2020-12-02T14:03:14Z
Dec 2, 2020

Encrypting a single column is straightforward, but encrypting at the table level requires more work and takes longer to complete. Having a single command to encrypt a table would be an improvement.

Search for a product comparison
AL
Real User
2020-05-18T07:50:00Z
May 18, 2020

It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained.

Find out what your peers are saying about Oracle, Microsoft, OpenText and others in Endpoint Encryption. Updated: March 2024.
765,234 professionals have used our research since 2012.
Endpoint Encryption
What is endpoint security? Endpoint security refers to securing entry points or endpoints of user devices to protect them from malicious attacks or cybersecurity threats and other sophisticated malware. An endpoint can be defined as any device that can be connected to a network, which can include laptops, tablets, mobile devices, smart watches, printers, servers, ATM machines, and even medical devices. It is crucial for organizations to use endpoint security in order to secure their...
Download Endpoint Encryption ReportRead more