• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Oracle a TBIZ2011
 

Oracle a TBIZ2011

on

  • 1,186 views

 

Statistics

Views

Total Views
1,186
Views on SlideShare
1,100
Embed Views
86

Actions

Likes
1
Downloads
42
Comments
0

2 Embeds 86

http://www.technologybiz.it 52
http://ibank.uk.com 34

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Oracle a TBIZ2011 Oracle a TBIZ2011 Presentation Transcript

    • <Insert Picture Here>Oracle Security SolutionsAngelo Maria BosisTechnology Sales Consultant Senior Manager
    • Agenda • Innovation & Constraints • Oracle Enterprise Security • Oracle Identity Management • Oracle DataBase Security • Oracle Security beyond the Enterprise • Summary© 2011 Oracle Corporation – Proprietary and Confidential 2
    • What Keeps You up at Night? Compliance Threats • Tougher Regulations • Intrusive Audits • Attacks • Costly Burdensome Reporting • Improper Access • Infrastructure Scaling Opportunities • Social Identity • Mobile Access • Cloud Computing • Massive Web© 2011 Oracle Corporation – Proprietary and Confidential 3
    • Is it Possible? How is it Possible?© 2011 Oracle Corporation – Proprietary and Confidential 4
    • Focus on Protecting Your Data, Applications & Infrastructure End-users and access points Firewall Applications & Middleware Identity Management Database Database Security Infrastructure Infrastructure Security© 2011 Oracle Corporation – Proprietary and Confidential 5
    • Oracle Identity Management 11g Complete and Integrated Suite Unified Administration Identity Directory Administration Services Access Management • Unified and Modern Web 2.0 • Simplified Systems Management based Admin Interface • Shared Services for: • Unified Installation and Configuration • Password Management • Common Auditing and Logging • Identity Administration • Common Policy Framework • Single Sign-On • Strong Authentication© 2011 Oracle Corporation – Proprietary and Confidential 6
    • Oracle Identity Management Overview Complete, Hot-Pluggable, & Service-Oriented Security Identity Administration Access Management Directory Services Access Manager Identity Federation Identity Manager Adaptive Access Manager Unified Directory Server Enterprise Single Sign-On Directory Server EE Entitlements Server Internet Directory Enterprise Gateway Virtual Directory Web Services Security Identity & Access Governance Identity Analytics Platform Security Services Operational Manageability Management Pack For Identity Management© 2011 Oracle Corporation – Proprietary and Confidential 7
    • Access: Authentication & Authorization© 2011 Oracle Corporation – Proprietary and Confidential 8
    • Focus on Protecting Your Data, Applications & Infrastructure End-users and access points Firewall Applications & Middleware Identity Management Database Database Security Infrastructure Infrastructure Security© 2011 Oracle Corporation – Proprietary and Confidential 9
    • Oracle Database Security Continuous Innovation Database Firewall Oracle Database 11g Data Masking TDE Tablespace Encryption Audit Vault Oracle Database 10g Database Vault Transparent Data Encryption (TDE) Proxy Authentication Oracle Database 9i Fine Grained Auditing Oracle Label Security Enterprise User Security Virtual Private Database (VPD) Oracle8i Database Encryption API Strong Authentication Native Network Encryption Oracle7 Database Auditing© 2011 Oracle Corporation – Proprietary and Confidential 10
    • Database Security Defense-in-Depth  Prevent access by non-database users for data at rest, in motion, and storage  Increase database user identity assurance  Strict access control to application data even from privileged users  Enforce multi-factor authorization  Audit database activity, and create reports Data  Monitor database traffic and prevent threats from reaching the database  Ensure database production environment is secure and prevent drift  Mask sensitive data in non-production environments© 2011 Oracle Corporation – Proprietary and Confidential 11
    • Database Defense-in-Depth Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking© 2011 Oracle Corporation – Proprietary and Confidential 12
    • Database Defense-in-Depth Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking Access Control • Oracle Database Vault • Enterprise User Security • Oracle Label Security© 2011 Oracle Corporation – Proprietary and Confidential 13
    • Database Defense-in-Depth Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking Access Control • Oracle Database Vault • Enterprise User Security • Oracle Label Security Auditing and Monitoring • Oracle Audit Vault • Oracle Configuration Management • Oracle Total Recall© 2011 Oracle Corporation – Proprietary and Confidential 14
    • Database Defense-in-Depth Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking Access Control • Oracle Database Vault • Enterprise User Security • Oracle Label Security Auditing and Monitoring • Oracle Audit Vault • Oracle Configuration Management • Oracle Total Recall Blocking and Logging • Oracle Database Firewall© 2011 Oracle Corporation – Proprietary and Confidential 15
    • Oracle Database Security Solutions Complete Defense-in-Depth• Comprehensive single vendor addresses all your requirements• Transparent to existing applications or databases• Easy to deploy point and click interfaces deliver value within hours Encryption & Masking Access Control• Cost Effective integrated solutions reduce risk and lower TCO Auditing Monitoring & Blocking• Proven #1 database vendor with over 30 years of security innovation! Monitoring Auditing Access Encryption & Blocking & Masking Control • Database • Audit Vault • Database • Advanced Firewall • Total Recall Vault Security • Configuration • Label Security • Secure Backup Management • Enterprise • Data Masking User Security© 2011 Oracle Corporation – Proprietary and Confidential 16
    • Oracle Infrastructure for HealthCare Complete Open Integrated AND Secure!© 2011 Oracle Corporation – Proprietary and Confidential 17
    • 18 Copyright © 2010, Oracle. All rights reserved
    • Database Cloud Service Overview • #1 database; in the cloud • Rapid provisioning • Simple pricing • Easy to use and manage • Rapid cloud-based application development • Access using Java, RESTful Web Services and Oracle APEX • Packaged business productivity applications© 2011 Oracle Corporation – Proprietary and Confidential 19
    • Security & Identity Management Service • A key enabler and differentiator of Oracle Public Cloud • Single Sign On and Identity Federation • Integration between Oracle Public Cloud & on- premise identity management systems • Fully delegated administration and dashboards • Multi-factor authentication • Use of standards for application visibility into public identity profiles • Built on Oracle Identity Management© 2011 Oracle Corporation – Proprietary and Confidential 20
    • A Leader in all Analyst Coverage 2010 Magic Quadrant for 2009 Magic Quadrant for 2009 Forrester Wave for Identity & Access Mgmt User Provisioning Web Access Management As of Sept. 30th 2010 As of Nov. 12th 2009 As of Nov 30th 2009Magic Quadrant Disclaimer: The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartners analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. The Magic Quadrant graphic was published by Gartner, Inc., as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Oracle
    • #1 Database and Most Secure “Most DBMS vendors offer basic security features; Oracle’s offering is most comprehensive.” - Noel Yuhanna Source: Forrester Database Security Market Report, 2009© 2011 Oracle Corporation – Proprietary and Confidential 22
    • Oracle Security Customers in HC Footprint in Healthcare with 4000+ Clients Worldwide© 2011 Oracle Corporation – Proprietary and Confidential 23
    • Customer Advisory Board Share, Communicate, & Partner© 2011 Oracle Corporation – Proprietary and Confidential 24
    • For More Information search.oracle.com security solutions or oracle.com/security© 2011 Oracle Corporation – Proprietary and Confidential 25
    • © 2011 Oracle Corporation – Proprietary and Confidential 26