Manager at a manufacturing company with 5,001-10,000 employees
Real User
Dec 2, 2020
Encrypting a single column is straightforward, but encrypting at the table level requires more work and takes longer to complete. Having a single command to encrypt a table would be an improvement.
Oracle Cloud Project Manager at a tech services company with 501-1,000 employees
Real User
May 18, 2020
It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained.
Endpoint Encryption provides robust protection for sensitive data, ensuring it remains secure even if devices are lost or stolen. It encrypts entire disks, files, or specific data sectors, safeguarding information from unauthorized access. This solution is a critical tool for organizations aiming to protect data on endpoints such as laptops, tablets, and smartphones. The encryption process is usually transparent to users, making it seamless and efficient in operational environments....
Encrypting a single column is straightforward, but encrypting at the table level requires more work and takes longer to complete. Having a single command to encrypt a table would be an improvement.
It is really constrained as an environment because you cannot change something that would be useful. It is a very good product because it is very similar to what you have on-premises. Yes, it is constrained, but it is expected because it is a platform as a service so it has to be constrained.