Pretius. Built Smarter: Strategic merger as an answer to modern challenges
Pretius. Built Smarter:
Strategic merger as an answer to modern challenges

Oracle APEX for banking, insurance, and financial services: meeting compliance requirements without compromising delivery speed

Bartosz Świątek

Content Writer

  • April 7, 2026

Contents

The gap between what regulators require and what legacy IT can demonstrate has been widening for years. DORA came into force on 17 January 2025, adding mandatory ICT risk management frameworks, incident reporting obligations, and third-party oversight requirements to a compliance landscape already shaped by GDPR, Solvency II, MiFID II, and national supervisory guidelines. The institutions most exposed to this widening gap are those running core operations on platforms that were built before any of these frameworks existed.

Oracle APEX occupies an unusual position in this context. It is a low-code development platform that runs inside the Oracle Database, inheriting the security architecture, audit infrastructure, and access control mechanisms that financial institutions have already invested in, already validated in audits, and already accepted as part of their risk frameworks. This is not a marketing claim about compliance-readiness. It is a structural consequence of how APEX works, and it has practical implications for every regulated organisation considering whether APEX can carry the weight of what they need to build.

This article examines what Oracle APEX specifically provides for banking, insurance, and financial services organisations in the current regulatory environment, where the case studies demonstrate what has been built and delivered, and where the architecture produces genuine compliance advantages rather than compliance marketing.

Why financial sector institutions stay on Oracle long after the visible reason disappears

Banks, insurance companies, and financial intermediaries that are still running Oracle Forms, Oracle EBS, or Oracle Database-centric applications in 2026 are not there by inertia alone. They are there because the Oracle stack contains something that is genuinely difficult to replicate: a data architecture that was built to handle financial transaction integrity, a security model that operates at the row level inside the database, and an audit trail that predates modern regulatory requirements by decades and was therefore mature before those requirements existed.

The problem is that Oracle Forms and OBIEE, the front-end and reporting layers that were built on top of this infrastructure, have been declared end-of-life on the Oracle support roadmap, with Premier Support for Oracle Forms 12.2.1.19 ending in December 2026. The underlying Oracle Database, which holds the actual business logic, transaction history, and customer data, is not going anywhere. But the applications that give users access to it (and the regulatory evidence those applications generate) increasingly cannot be patched, updated, or audited to current standards.

Oracle APEX was designed for exactly this structural situation. It is not a migration target that requires the organisation to move its data, rewrite its PL/SQL, or replace its Oracle Database. It is a modern web application layer built inside the database, accessing the same data through the same security mechanisms, generating the same audit records, enforcing the same row-level policies, but doing so through a browser-based interface that can be deployed on any device, updated continuously, and extended with new features without touching the underlying data model.

For regulated financial institutions, this distinction matters enormously because it separates the compliance risk (the unsupported application layer) from the compliance asset (the Oracle Database and its security infrastructure). APEX replaces the former while preserving the latter.

What Oracle APEX inherits from Oracle Database that matters for compliance

The compliance advantages of Oracle APEX in regulated environments are not features of the APEX platform itself. They are consequences of the architecture: APEX runs inside Oracle Database, which means every security mechanism and audit capability built into Oracle Database is natively available to APEX applications without integration, without an additional middleware layer, and without a separate audit database.

Row-level security through Virtual Private Database. Oracle VPD enforces security policies at the row level, inside the database, transparently to the application. A bank consultant can query a customer table and receive only the rows their access policy permits, not because the application filtered the results, but because the database returned only what they were authorised to see. This mechanism survives any change to the application layer because it operates below the application. In APEX, VPD policies apply automatically to every SQL statement executed against protected tables, regardless of which APEX page or process generates that statement. For organisations subject to GDPR’s data minimisation requirements, MiFID II’s client data segregation obligations, or Solvency II’s data governance requirements, this is the relevant architectural fact.

Fine-Grained Auditing at the data level. Oracle FGA captures, at the database level, exactly who accessed which rows of which tables, under what conditions, at what time. Unlike application-level logging, which records what the application did, FGA records what data was actually read or modified. The distinction is critical for regulatory evidence: an auditor verifying GDPR compliance is satisfied by evidence that only authorised personnel accessed specific categories of personal data. An application log shows page visits; FGA shows data access. For DORA’s ICT risk management requirements, which include monitoring obligations and audit trail documentation, FGA provides the evidence layer at the appropriate level of granularity.

Key management and Transparent Data Encryption. Oracle Database’s TDE encrypts data at rest at the tablespace or column level, managed through the Oracle Key Management infrastructure. For APEX applications, data stored in the database inherits this encryption without additional configuration. For organisations subject to GDPR’s security of processing requirements under Article 32, or to national banking regulations requiring encryption of customer and transaction data, TDE provides the technical measure that compliance documentation refers to.

Oracle Label Security for multi-tier classification. OLS extends VPD with a label-based access control model that mirrors security classification schemes used in regulated industries. Insurance companies managing data across different regulatory jurisdictions, banks with different access tiers for retail and private banking, and financial intermediaries with segregated client pools have used OLS to implement the access control model required by their specific regulatory context. APEX applications can implement label-based access with no changes to application logic because OLS operates at the database layer.

Session-level audit and activity logging through APEX built-in views. APEX maintains its own activity log in the Oracle Database, recording page requests, authentication events, and session activity. Combined with Oracle Database audit, this provides two complementary audit layers: the database-level record of data access and the application-level record of user interaction. For DORA incident reporting requirements, which require financial entities to identify, classify, and report major ICT incidents, this audit infrastructure provides the basis for incident investigation and evidence production.

Banking: Where Oracle APEX has been deployed at production scale

Banks operate some of the most demanding Oracle environments in any industry. Transaction volumes, data volumes, concurrency requirements, and regulatory obligations converge in systems that have often been running continuously, with accumulated business logic, for fifteen or twenty years. Oracle APEX has been deployed in banking environments at production scale across several categories of applications.

Commission calculation and sales agent management. A large Polish bank operating on the domestic market built its sales agent commission calculation system on Oracle APEX, including the configuration of calculation algorithms, reporting, and a dealer portal. When three banks subsequently unified under one umbrella, the APEX-based solution was evaluated against the commission systems from the other institutions and selected as the target platform for the merged organisation. The system now serves the merged institution’s agent network across three formerly separate operational environments. The case demonstrates APEX’s capacity to handle post-merger consolidation in banking, where the alternative is either a new external platform or the complex data migration that typically accompanies bank mergers.

It’s one of many examples of APEX’s capability to serve as a basis for an enterprise-grade system. Here are a couple more.

HR and operational systems at European banking scale. Pretius has delivered HR systems for some of the largest banks in Europe, applications where regulatory requirements around data handling, auditability, and access control are enforced at the infrastructure level by Oracle Database’s security mechanisms rather than by application-layer controls that an external platform would require configuring separately.

Cloud migration of banking workloads with regulatory compliance guarantee. A leading financial services organisation in the insurance sector, operating under strict regulatory requirements for data residency and processing transparency, was running significant workloads on AWS infrastructure. Pretius conducted an audit of the cloud footprint and proposed a migration to Oracle Cloud Infrastructure to guarantee full compliance with applicable regulations while reducing costs. Total cloud costs were reduced by 53% within seven months. For banks and insurers whose regulators impose specific data residency requirements, a category that has expanded significantly under GDPR and national supervisory frameworks. OCI’s EU Sovereign Cloud and its architecture of guaranteed data residency provide an option that hyperscale cloud platforms have been slow to match in every jurisdiction.

Insurance: the SMAART case and what it demonstrates about APEX in complex analytical environments

The most detailed publicly documented example of Oracle APEX in financial services is the SMAART system for Munich Re HealthTech, a division of Munich Re, one of the world’s leading reinsurance providers. SMAART is an analytical tool used by insurance companies to shape their pricing strategy and risk management approach. It processes complex actuarial calculations, supports regulatory reporting, and serves as the data backbone for pricing decisions across multiple insurance product lines.

The system was originally built on Oracle Business Intelligence Enterprise Edition, combined with BI Publisher and WebLogic. The licensing costs for these components ran to thousands of dollars per month per client. The system lacked editing capabilities for end users and required days of manual processing for analytical tasks that had time-sensitive implications for pricing decisions.

Pretius migrated the entire SMAART system to Oracle APEX, developed a new front-end, automated previously manual analytical processes, and enriched the application with new features, delivering the complete transformation in under four months (400 man-days). Since deployment in 2019, the system has operated with zero critical bugs and recorded only 64 incidents across four years, none of them severe. Complex analytical tasks that previously took days are now completed in minutes. The OBIEE licensing cost, which ran to thousands of dollars monthly, was eliminated because APEX is included in the Oracle Database license.

For the insurance sector, the SMAART case demonstrates three things that are directly relevant to compliance-driven decisions. First, Oracle APEX handles analytical complexity at the depth required for actuarial and risk management applications, not just data entry and transaction processing. Second, the security and data governance requirements that insurance regulatory frameworks impose (Solvency II in Europe, equivalent national frameworks elsewhere) are served by the Oracle Database infrastructure that APEX inherits, without requiring additional security layer configuration. Third, the migration can be executed at a speed that regulatory timelines demand rather than prohibit: under four months for a mission-critical analytical platform rather than prohibit.

Munich Re HealthTech also chose a co-creation model: Pretius trained the client’s internal developers in Oracle APEX, enabling the organisation to maintain and extend the system independently. For regulated entities that require demonstrable internal control over their ICT systems under DORA, the ability to bring technical maintenance in-house is not optional; it is an element of the ICT risk management framework.

What “delivery speed without compromising compliance” actually means in practice

The phrase “speed without compromising compliance” is used liberally in vendor materials. It is worth being precise about what it means in the Oracle APEX context for financial services, because the mechanism is specific.

In most application development frameworks, compliance is a parallel workstream that runs alongside development and adds time. Access control must be implemented in the application layer. Audit logging must be configured and connected to a log management system. Encryption must be added to the data store. Security controls must be documented and tested. Each of these workstreams requires development time, testing time, and audit time, and each represents a surface area where implementation errors create compliance exposure.

In APEX, running inside Oracle Database, these workstreams are substantially collapsed. Row-level access control through VPD is configured once at the database layer and applies to every application that runs against those tables. The audit trail exists natively in the database and captures data access at the appropriate level of granularity. Encryption is a property of the database configuration, not the application. When an APEX application is built, the developer builds business logic and user interface; they do not build the compliance infrastructure because it already exists in the platform they are building on.

The practical consequence is that an APEX development cycle is shorter than an equivalent development cycle on a platform without native Oracle Database security, and the resulting application has fewer compliance gaps, because the compliance mechanisms are not application-level implementations that can be misconfigured; they are database-level mechanisms that operate regardless of what the application layer does.

This is the accurate version of “speed without compromising compliance” for financial services organisations with Oracle Database infrastructure. It is not a marketing claim. It is an architectural consequence.

Data residency, sovereign cloud, and the regulatory geography question

Financial services organisations operating across EU member states, and those in jurisdictions with specific national data residency requirements, face a compliance geography problem that cloud adoption has made more acute: where does the data physically reside, who can access it, and what national law governs it?

Oracle Cloud Infrastructure addresses this with a dedicated EU Sovereign Cloud architecture: regions physically located within EU member states, operated exclusively by EU-resident personnel, with contractual guarantees that no data crosses EU external borders. OCI holds ISO/IEC 27001 certification, SOC 1, SOC 2, and SOC 3 attestations, and regional configurations aligned with sector-specific requirements, including banking regulation frameworks from national supervisory authorities.

For Pretius clients in the EU financial sector, the combination of APEX running on OCI EU Sovereign Cloud provides an architecture where the development platform, the application runtime, the database, and the infrastructure all sit within a single regulatory perimeter. This eliminates the jurisdictional ambiguity that arises when application components are distributed across cloud providers without a coordinated data residency design.

The UK Sovereign Cloud, with which Pretius has direct experience through its London operations, provides an equivalent architecture for FCA-regulated entities subject to UK-specific data governance requirements. The parallel development of UK and EU sovereign cloud capabilities reflects the regulatory divergence that has followed different data governance trajectories since 2020.

The evaluation questions that surface what regulated organisations actually need

For a CIO or Compliance Officer at a bank, insurer, or financial intermediary evaluating whether Oracle APEX is appropriate for their environment, the relevant questions are not about APEX features in the abstract. They are about whether APEX, as deployed in their specific Oracle environment, addresses the specific compliance obligations they are accountable for. The following questions are the productive ones to put to any APEX development partner during evaluation.

How do you implement row-level security for applications that must enforce client data segregation at the database level, not the application level?

The answer should describe VPD policy configuration, how policies are inherited by APEX applications, and how policy coverage is verified through testing. A partner who describes application-level filtering rather than VPD is describing an architecture that GDPR auditors and banking supervisors may not accept as a technical measure.

What audit evidence does an APEX application generate natively, and how does that evidence map to DORA’s ICT risk monitoring and reporting requirements?

The answer should describe the combination of Oracle Database audit and APEX activity logs, what each captures, and how the two are used together to produce the evidence that a DORA compliance review requires.

How have you structured APEX applications for environments that require external audit access, and specifically, how do you give auditors read access to audit records without giving them access to production data?

This is a standard requirement in banking and insurance audits, and the answer reveals whether the partner has done this before under real audit conditions.

Can you describe a deployment where APEX ran in an OCI EU Sovereign Cloud environment subject to GDPR and national banking regulation, and what the regulatory acceptance process looked like?

This tests whether the partner’s sovereign cloud experience is actual rather than theoretical.

Looking for a software development company?

Work with a team that already helped dozens of market leaders. Book a discovery call to see:

  • How our products work
  • How you can save time & costs
  • How we’re different from another solutions

footer-contact-steps

We keep your data safe: ISO certified

We operate in accordance with the ISO 27001 standard, ensuring the highest level of security for your data.
certified dekra 27001
logo pretius color black
Pretius Software Sp. z o.o.
Żwirki i Wigury 16a
02-092 Warsaw
Poland
pretius-uk-logo
Pretius Ltd.
Ealing Cross, 1st Floor
85 Uxbridge Road
London W5 5TH
United Kingdom

Drop us a line at

hello@pretius.com

Want to work with us?

Careers
© 2026 Pretius. All right reserved.