SlideShare a Scribd company logo
1 of 19
Download to read offline
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
Note	
  to	
  presenters	
  
The	
  focus	
  of	
  this	
  presentaBon	
  is	
  the	
  security	
  provided	
  by	
  SPARC/Solaris	
  servers	
  for	
  private	
  cloud	
  
deployments.	
  Security	
  is	
  of	
  paramount	
  importance	
  for	
  any	
  deployment	
  and	
  certainly	
  for	
  private	
  cloud	
  
deployments.	
  	
  This	
  presentaBon	
  does	
  not	
  detail	
  all	
  of	
  Oracle’s	
  security	
  features	
  as	
  that	
  would	
  take	
  a	
  much	
  
longer	
  presentaBon	
  but	
  focuses	
  on	
  the	
  SPARC	
  and	
  Solaris	
  parts	
  of	
  the	
  Oracle	
  red	
  stack.	
  You	
  need	
  to	
  point	
  
out	
  that	
  Oracle	
  has	
  a	
  layered	
  security	
  story	
  but	
  this	
  presentaBon	
  focuses	
  on	
  just	
  a	
  couple	
  of	
  those	
  layers.	
  	
  
The	
  presentaBon	
  tries	
  to	
  educate	
  the	
  the	
  customer	
  as	
  to	
  the	
  nature	
  of	
  many	
  threats	
  and	
  follows	
  that	
  up	
  
with	
  how	
  Solaris	
  on	
  SPARC	
  can	
  fix	
  many	
  of	
  those	
  threats.	
  	
  The	
  goal	
  isto	
  	
  show	
  that	
  securing	
  the	
  network	
  is	
  
not	
  enough,	
  you	
  much	
  secure	
  every	
  layer.	
  	
  Abuse	
  of	
  credenBals	
  is	
  a	
  vector	
  of	
  aPack	
  and	
  the	
  access	
  control	
  
of	
  Solaris	
  can	
  dramaBcally	
  reduce	
  the	
  thread	
  of	
  stolen	
  credenBals.	
  Another	
  major	
  aPack	
  vector	
  is	
  
aPacking	
  servers	
  that	
  are	
  mis-­‐configured	
  or	
  clearly	
  out	
  of	
  date	
  with	
  regards	
  to	
  patches.	
  	
  Poor	
  patching	
  
leaves	
  many	
  fixed	
  vulnerabiliBes	
  un-­‐fixed.	
  	
  The	
  level	
  of	
  the	
  presentaBon	
  is	
  designed	
  for	
  sales	
  reps.	
  
Hopefully,	
  this	
  presentaBon	
  will	
  generate	
  follow	
  up	
  discussions	
  to	
  drill	
  down	
  to	
  specific	
  security	
  
capabiliBes	
  of	
  SPARC/Solaris	
  and	
  the	
  other	
  layers	
  of	
  the	
  stack.	
  
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
The	
  “Security”	
  in	
  Oracle’s	
  
Secure	
  Cloud	
  Infrastructure	
  
Why	
  is	
  security	
  on	
  the	
  rise	
  ?	
  
	
  
Jaroslav	
  Malina	
  
Senior	
  Channel	
  Sales	
  Manager	
  
Oracle	
  Systems	
  CEE	
  North	
  
Copyright	
  ©	
  2015,	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
   4	
  
Market	
  Forces	
  Are	
  Driving	
  Change	
  
Managing	
  and	
  Securing	
  Data	
  is	
  Crucial	
  
	
  
	
  
40	
  Billion	
  
Devices	
  	
  
3.8	
  Billion	
  
Mobile	
  Users	
  
24	
  ZeJabytes	
  
of	
  Data	
  
77	
  Billion	
  
Datacenter	
  Cores	
  
Market	
  Forces:	
  2014	
  -­‐2018	
  -­‐	
  IDC	
  Oracle	
  Briefing	
  Jan	
  2015	
  
Security	
  Threat	
  #1:	
  	
  
Stolen	
  Privileged	
  User	
  CredenUals	
  	
  
Security	
  Threat	
  #2:	
  
Unpatched	
  and	
  misconfigured	
  
Systems	
  
Security	
  Threat	
  #3:	
  	
  
Direct	
  Data	
  Access	
  	
  
Copyright	
  ©	
  2015,	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
   5	
  
Has	
  Changed	
  Everything	
  
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
Journey	
  to	
  Private	
  Cloud	
  
Private	
  Cloud	
  
• Security	
  
• Self-­‐service	
  
• Auto-­‐scaling	
  
• Metering	
  &	
  chargeback	
  
Consolidated	
  TradiUonal	
  Silos	
  
•  Physical	
  
•  Dedicated	
  
•  Heterogeneous	
  
•  Virtual	
  
•  Shared	
  
•  Standardized	
  
Start with consolidation • Extend to private cloud • Secure the environment	
  
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
	
  
	
  
NEJSTE	
  DOST	
  PARANOIDNÍ	
  ?	
  
	
  
	
  
hPps://www.privacyrights.org/data-­‐breach	
  
	
  
7	
  
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
200M	
  	
  
Experian	
  
Mar	
  ‘14	
  
	
  
	
  	
  
150M	
  
eBay	
  
May	
  ‘14	
  
22M	
  
EducaBon	
  
July	
  ‘14	
  
SA	
  Banks	
  
OCT	
  ‘13	
  
Credit	
  	
  
Cards	
  
150M	
  +	
  Code	
  
Adobe	
  Oct	
  ‘13	
  
98M	
  
Target	
  
Dec‘13	
  
20M	
  
Credit	
  Bureau	
  
12M	
  
Telecom	
  
Jan	
  ‘14	
  
56M	
  
Home	
  Depot	
  
Sep	
  ‘14	
  
ImmigraUon	
  
June’14	
  
	
  
Personal	
  
Records	
  
76M	
  
JPMC	
  
Oct	
  ‘14	
  
The	
  Age	
  of	
  Mega	
  Breaches	
  
8	
  Copyright	
  ©	
  2015,	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
53M	
  
Sony	
  
Dec	
  ‘14	
  
227M	
  
80M	
  
Anthem	
  
Feb	
  ‘15	
  
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
82%	
  of	
  APacks	
  Are	
  User,	
  System,	
  or	
  Database	
  VulnerabiliBes	
  
9	
  
Abuse	
  and	
  misuse	
  of	
  credenBals	
  
Poorly	
  configured	
  systems	
  
Un-­‐patched	
  systems	
  
Unprotected	
  
Data	
  	
  
50%	
  
19%	
  
13%	
  
82%	
  
Source:	
  2014	
  Verizon	
  DBIR	
  
•  Many	
  2014	
  aPacks	
  used	
  old	
  vulnerabiliBes	
  
•  Fixes	
  published	
  many	
  years	
  prior	
  to	
  2014	
  
•  Fixes	
  not	
  deployed	
  due	
  to	
  patching	
  difficulBes	
  
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
Risks	
  are	
  Outside;	
  VulnerabiliBes	
  Within	
  
10	
  
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
How	
  the	
  Sony	
  Breach	
  Changed	
  Security	
  
Not	
  once	
  but	
  twice!	
  
11	
  
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
Threat	
  #1:	
  Stolen	
  Privileged	
  User	
  CredenBals	
  	
  
12	
  
100%	
  
Of	
  invesBgated	
  data	
  breaches	
  
involved	
  stolen	
  credenBals	
  
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
Threat	
  #2:Unpatched	
  and	
  Misconfigured	
  Systems	
  
13	
  
99.9%	
  
Of	
  the	
  exploited	
  vulnerabiliBes	
  were	
  
compromised	
  more	
  than	
  a	
  year	
  aker	
  
the	
  fix	
  was	
  published	
  
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
   14	
  
Fixes	
  are	
  not	
  being	
  applied	
  
Fixed	
  VulnerabiliBes	
  SBll	
  Exposed	
  
74%	
  
OF	
  ORGANIZATIONS	
  
TAKE	
  3	
  MONTHS+	
  
TO	
  PATCH	
  
Source:	
  Verizon	
  Data	
  Breach	
  InvesBgaBons	
  Report,	
  2015;	
  IIOUG	
  Data	
  Security	
  
Survey,	
  2014	
  
Breaches	
  in	
  2014	
  and	
  Year	
  Fixed	
  
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
Threat	
  #3:	
  Direct	
  Data	
  Access	
  	
  
15	
  
$194	
  
The	
  average	
  cost	
  per	
  record	
  
stolen	
  in	
  a	
  data	
  breach	
  
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
  
0%	
  
10%	
  
20%	
  
30%	
  
40%	
  
50%	
  
60%	
  
70%	
  
80%	
  
Database	
   Network	
   ApplicaBon	
   Middleware	
  
52%	
  
34%	
  
11%	
  
4%	
  
15%	
  
67%	
  
15%	
  
3%	
  
Source:	
  CSO	
  Online	
  MarketPulse,	
  2013	
  	
  
IT	
  Execs	
  Consider	
  
Most	
  vulnerable	
  
IT	
  OrganizaBons	
  Are	
  Over-­‐InvesBng	
  in	
  Technologies	
  that	
  
Don’t	
  Directly	
  Protect	
  Databases	
  
Resource	
  allocaBon	
  
Only	
  24%	
  of	
  breaches	
  are	
  
stopped	
  by	
  network	
  security	
  	
  
Copyright	
  ©	
  2015	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
   17	
  
	
  
SECURING THE COMPLETE STACK INSIDE
OUT SAVES TIME, MONEY AND REDUCES RISK
MiUgates	
  credenUal	
  abuse/
misuse	
  
Patching	
  done	
  right	
  
End-­‐to-­‐End,	
  always	
  on	
  
cryptography	
  
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |	
   18	
  
The “Security” in Oracle’s Secure Cloud Infrastructure

More Related Content

What's hot

Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecCSA Argentina
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategyxKinAnx
 
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat IntelligenceCisco Canada
 
Selex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security ForumSelex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security ForumLeonardo
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarIBM Security
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksImperva
 
Crafting Your Oracle License, Contract and Vendor Management Strategy
Crafting Your Oracle License, Contract and Vendor Management StrategyCrafting Your Oracle License, Contract and Vendor Management Strategy
Crafting Your Oracle License, Contract and Vendor Management StrategyFlexera
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarImperva
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation SecurityCisco Canada
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallMundo Contact
 
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Global Knowledge Training
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security ArchitectureCisco Canada
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksHarry Gunns
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Zernike College
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksSkycure
 

What's hot (20)

Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantecSegurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
 
Presentation cisco cloud security strategy
Presentation   cisco cloud security strategyPresentation   cisco cloud security strategy
Presentation cisco cloud security strategy
 
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid:  Malware Analysis and Threat IntelligenceCisco ThreatGrid:  Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
 
Selex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security ForumSelex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security Forum
 
Presentacion Palo Alto Networks
Presentacion Palo Alto NetworksPresentacion Palo Alto Networks
Presentacion Palo Alto Networks
 
SourceFire IPS Overview
SourceFire IPS OverviewSourceFire IPS Overview
SourceFire IPS Overview
 
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadarDon’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
 
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their TracksStop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
 
Crafting Your Oracle License, Contract and Vendor Management Strategy
Crafting Your Oracle License, Contract and Vendor Management StrategyCrafting Your Oracle License, Contract and Vendor Management Strategy
Crafting Your Oracle License, Contract and Vendor Management Strategy
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
 
Next Generation Security
Next Generation SecurityNext Generation Security
Next Generation Security
 
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation FirewallPalo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
 
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction Building Up Network Security: An Introduction
Building Up Network Security: An Introduction
 
Cisco Security Architecture
Cisco Security ArchitectureCisco Security Architecture
Cisco Security Architecture
 
Application Framework - Palo Alto Networks
Application Framework - Palo Alto NetworksApplication Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
 
IPS Best Practices
IPS Best PracticesIPS Best Practices
IPS Best Practices
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
 
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber AttacksHow to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
 

Similar to The “Security” in Oracle’s Secure Cloud Infrastructure

Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudMarketingArrowECS_CZ
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security OptionDLT Solutions
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsEric Vétillard
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation Delivery Centric
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessCloudPassage
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Indus Khaitan
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
CIS14: Network-Aware IAM
CIS14: Network-Aware IAMCIS14: Network-Aware IAM
CIS14: Network-Aware IAMCloudIDSummit
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Javaterrencebarr
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017Sohaib Mahmood
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...Tunde Ogunkoya
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityDistil Networks
 
ERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, SolutionsERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, SolutionsERPScan
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.CIOEastAfrica
 
mcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdfmcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdfAndreBolo1
 

Similar to The “Security” in Oracle’s Secure Cloud Infrastructure (20)

Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security Option
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
CIS14: Network-Aware IAM
CIS14: Network-Aware IAMCIS14: Network-Aware IAM
CIS14: Network-Aware IAM
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
 
The Inconvenient Truth About API Security
The Inconvenient Truth About API SecurityThe Inconvenient Truth About API Security
The Inconvenient Truth About API Security
 
ERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, SolutionsERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, Solutions
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.
 
mcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdfmcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdf
 

More from MarketingArrowECS_CZ

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfMarketingArrowECS_CZ
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?MarketingArrowECS_CZ
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaMarketingArrowECS_CZ
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceMarketingArrowECS_CZ
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeMarketingArrowECS_CZ
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle softwareMarketingArrowECS_CZ
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?MarketingArrowECS_CZ
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoMarketingArrowECS_CZ
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. částMarketingArrowECS_CZ
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. částMarketingArrowECS_CZ
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageMarketingArrowECS_CZ
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeMarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částMarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částMarketingArrowECS_CZ
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyMarketingArrowECS_CZ
 

More from MarketingArrowECS_CZ (20)

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
 
Chráníte správně svoje data?
Chráníte správně svoje data?Chráníte správně svoje data?
Chráníte správně svoje data?
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 
Infinidat InfiniBox
Infinidat InfiniBoxInfinidat InfiniBox
Infinidat InfiniBox
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle software
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
 
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníkaInfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

The “Security” in Oracle’s Secure Cloud Infrastructure

  • 1.
  • 2. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   Note  to  presenters   The  focus  of  this  presentaBon  is  the  security  provided  by  SPARC/Solaris  servers  for  private  cloud   deployments.  Security  is  of  paramount  importance  for  any  deployment  and  certainly  for  private  cloud   deployments.    This  presentaBon  does  not  detail  all  of  Oracle’s  security  features  as  that  would  take  a  much   longer  presentaBon  but  focuses  on  the  SPARC  and  Solaris  parts  of  the  Oracle  red  stack.  You  need  to  point   out  that  Oracle  has  a  layered  security  story  but  this  presentaBon  focuses  on  just  a  couple  of  those  layers.     The  presentaBon  tries  to  educate  the  the  customer  as  to  the  nature  of  many  threats  and  follows  that  up   with  how  Solaris  on  SPARC  can  fix  many  of  those  threats.    The  goal  isto    show  that  securing  the  network  is   not  enough,  you  much  secure  every  layer.    Abuse  of  credenBals  is  a  vector  of  aPack  and  the  access  control   of  Solaris  can  dramaBcally  reduce  the  thread  of  stolen  credenBals.  Another  major  aPack  vector  is   aPacking  servers  that  are  mis-­‐configured  or  clearly  out  of  date  with  regards  to  patches.    Poor  patching   leaves  many  fixed  vulnerabiliBes  un-­‐fixed.    The  level  of  the  presentaBon  is  designed  for  sales  reps.   Hopefully,  this  presentaBon  will  generate  follow  up  discussions  to  drill  down  to  specific  security   capabiliBes  of  SPARC/Solaris  and  the  other  layers  of  the  stack.  
  • 3. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   The  “Security”  in  Oracle’s   Secure  Cloud  Infrastructure   Why  is  security  on  the  rise  ?     Jaroslav  Malina   Senior  Channel  Sales  Manager   Oracle  Systems  CEE  North  
  • 4. Copyright  ©  2015,  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   4   Market  Forces  Are  Driving  Change   Managing  and  Securing  Data  is  Crucial       40  Billion   Devices     3.8  Billion   Mobile  Users   24  ZeJabytes   of  Data   77  Billion   Datacenter  Cores   Market  Forces:  2014  -­‐2018  -­‐  IDC  Oracle  Briefing  Jan  2015   Security  Threat  #1:     Stolen  Privileged  User  CredenUals     Security  Threat  #2:   Unpatched  and  misconfigured   Systems   Security  Threat  #3:     Direct  Data  Access    
  • 5. Copyright  ©  2015,  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   5   Has  Changed  Everything  
  • 6. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   Journey  to  Private  Cloud   Private  Cloud   • Security   • Self-­‐service   • Auto-­‐scaling   • Metering  &  chargeback   Consolidated  TradiUonal  Silos   •  Physical   •  Dedicated   •  Heterogeneous   •  Virtual   •  Shared   •  Standardized   Start with consolidation • Extend to private cloud • Secure the environment  
  • 7. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |       NEJSTE  DOST  PARANOIDNÍ  ?       hPps://www.privacyrights.org/data-­‐breach     7  
  • 8. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   200M     Experian   Mar  ‘14         150M   eBay   May  ‘14   22M   EducaBon   July  ‘14   SA  Banks   OCT  ‘13   Credit     Cards   150M  +  Code   Adobe  Oct  ‘13   98M   Target   Dec‘13   20M   Credit  Bureau   12M   Telecom   Jan  ‘14   56M   Home  Depot   Sep  ‘14   ImmigraUon   June’14     Personal   Records   76M   JPMC   Oct  ‘14   The  Age  of  Mega  Breaches   8  Copyright  ©  2015,  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   53M   Sony   Dec  ‘14   227M   80M   Anthem   Feb  ‘15  
  • 9. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   82%  of  APacks  Are  User,  System,  or  Database  VulnerabiliBes   9   Abuse  and  misuse  of  credenBals   Poorly  configured  systems   Un-­‐patched  systems   Unprotected   Data     50%   19%   13%   82%   Source:  2014  Verizon  DBIR   •  Many  2014  aPacks  used  old  vulnerabiliBes   •  Fixes  published  many  years  prior  to  2014   •  Fixes  not  deployed  due  to  patching  difficulBes  
  • 10. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   Risks  are  Outside;  VulnerabiliBes  Within   10  
  • 11. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   How  the  Sony  Breach  Changed  Security   Not  once  but  twice!   11  
  • 12. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   Threat  #1:  Stolen  Privileged  User  CredenBals     12   100%   Of  invesBgated  data  breaches   involved  stolen  credenBals  
  • 13. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   Threat  #2:Unpatched  and  Misconfigured  Systems   13   99.9%   Of  the  exploited  vulnerabiliBes  were   compromised  more  than  a  year  aker   the  fix  was  published  
  • 14. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   14   Fixes  are  not  being  applied   Fixed  VulnerabiliBes  SBll  Exposed   74%   OF  ORGANIZATIONS   TAKE  3  MONTHS+   TO  PATCH   Source:  Verizon  Data  Breach  InvesBgaBons  Report,  2015;  IIOUG  Data  Security   Survey,  2014   Breaches  in  2014  and  Year  Fixed  
  • 15. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   Threat  #3:  Direct  Data  Access     15   $194   The  average  cost  per  record   stolen  in  a  data  breach  
  • 16. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   0%   10%   20%   30%   40%   50%   60%   70%   80%   Database   Network   ApplicaBon   Middleware   52%   34%   11%   4%   15%   67%   15%   3%   Source:  CSO  Online  MarketPulse,  2013     IT  Execs  Consider   Most  vulnerable   IT  OrganizaBons  Are  Over-­‐InvesBng  in  Technologies  that   Don’t  Directly  Protect  Databases   Resource  allocaBon   Only  24%  of  breaches  are   stopped  by  network  security    
  • 17. Copyright  ©  2015  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   17     SECURING THE COMPLETE STACK INSIDE OUT SAVES TIME, MONEY AND REDUCES RISK MiUgates  credenUal  abuse/ misuse   Patching  done  right   End-­‐to-­‐End,  always  on   cryptography  
  • 18. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    |   18