Manager at a manufacturing company with 5,001-10,000 employees
Real User
2020-12-02T14:03:14Z
Dec 2, 2020
Encrypting a single column is straightforward, but encrypting at the table level requires more work and takes longer to complete. Having a single command to encrypt a table would be an improvement.
Oracle Cloud Project Manager at a tech services company with 501-1,000 employees
Real User
2020-05-18T07:50:00Z
May 18, 2020
It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained.
Endpoint Encryption protects sensitive data by encrypting it on devices such as laptops, tablets, and smartphones. It ensures data security even if the device is lost or stolen.
Organizations use Endpoint Encryption to safeguard proprietary information and comply with regulatory requirements. This solution encrypts data at the file or disk level, making it unreadable without proper authorization. It is essential for securing confidential information and preventing unauthorized access....
Encrypting a single column is straightforward, but encrypting at the table level requires more work and takes longer to complete. Having a single command to encrypt a table would be an improvement.
It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained.