The Impossible Cat for the Business Intelligence Community

Let us share with you fresh news from the SeaCat kitchen.

A few weeks ago we had a workshop with one potential customer who was currently working on a mobile application which should access Oracle Business Intelligence (BI) suite, basically Oracle Business Intelligence Mobile HD based solution. We piloted Oracle BI SDK & SeaCat integration.

After only 10 minutes, we finished the integration. This was unbelievable for the customer who had a completely different experience to a major mobile security vendor in the market (BIG one). They failed to do the same thing for seven months. Yes you read this right. They couldn’t do during that long time frame what we could in just 10 minutes.

The facial expression from our customer was unbelievable.

There are two good things we would like to share with you. The first one is that we have another SeaCat adopter. The second, better news is that we can start offering easy and smooth mobile security enablement option for every Oracle Business Intelligence users, like you.

So what say you?

This video summarizes the entire experience.




You Might Be Interested in Reading These Articles

[Video] Oracle BI Mobile App Present for Christmas

Let us share with you an update from the SeaCat kitchen. We have officially completed the integration and implementation of securing Oracle BI Mobile Solution by Christmas. Enjoy our mini video.

Continue reading ...

business-intelligence kitchen-news

Published on December 23, 2014

SeaCat tutorial - Chapter 1: Hello World (iOS)

This is the first practical tutorial in our tutorial series to demonstrate the strength and capabilities of SeaCat secure access solution. Our goal is to develop several sample applications and uncover the best practices you might be interested in.

Continue reading ...

tech tutorial ios osx

Published on August 18, 2014

A beginner-friendly intro to the Correlator for effective cybersecurity detection

At TeskaLabs, we know that a cybersecurity system is only as effective as its ability to detect threats. That's why we developed a powerful tool that will prove essential in your arsenal: the Correlator.

Continue reading ...

security tech

Published on March 15, 2024