Manager at a manufacturing company with 5,001-10,000 employees
Real User
2020-12-02T14:03:14Z
Dec 2, 2020
Encrypting a single column is straightforward, but encrypting at the table level requires more work and takes longer to complete. Having a single command to encrypt a table would be an improvement.
Oracle Cloud Project Manager at a tech services company with 501-1,000 employees
Real User
2020-05-18T07:50:00Z
May 18, 2020
It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained.
Endpoint Encryption ensures data on devices is secure, protecting sensitive information from unauthorized access. It encrypts files on laptops, desktops, and other devices, making data accessible only to authorized users. As data breaches become more sophisticated, Endpoint Encryption provides a robust method for safeguarding information. This technology encrypts data at rest, ensuring only individuals with decryption keys can access it. This layer of security is vital for organizations...
Encrypting a single column is straightforward, but encrypting at the table level requires more work and takes longer to complete. Having a single command to encrypt a table would be an improvement.
It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained.