Submit Search
Upload
The “Security” in Oracle’s Secure Cloud Infrastructure
•
0 likes
•
163 views
MarketingArrowECS_CZ
Follow
Prezentace z akce "Oracle Data Protection" Prezentoval Jaroslav Malina, Oracle, 19.4.2016
Read less
Read more
Technology
Report
Share
Report
Share
1 of 19
Download now
Download to read offline
Recommended
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
Domenico Catalano
Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learn
Ivanti
Cs a multi-national oil and gas company
Cs a multi-national oil and gas company
Liora R. Herman
Appsecurity, win or loose
Appsecurity, win or loose
Bjørn Sloth
Cisco Security Presentation
Cisco Security Presentation
Simplex
Blind spots in the network.pdf
Blind spots in the network.pdf
DivyeshMDesai
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
Symantec
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
DevOps.com
Recommended
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
Domenico Catalano
Ivanti neurons - lunch and learn
Ivanti neurons - lunch and learn
Ivanti
Cs a multi-national oil and gas company
Cs a multi-national oil and gas company
Liora R. Herman
Appsecurity, win or loose
Appsecurity, win or loose
Bjørn Sloth
Cisco Security Presentation
Cisco Security Presentation
Simplex
Blind spots in the network.pdf
Blind spots in the network.pdf
DivyeshMDesai
Stop Attacks and Mitigate Risk with Application and Device Control
Stop Attacks and Mitigate Risk with Application and Device Control
Symantec
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
DevOps.com
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Erin Sweeney
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
CSA Argentina
Presentation cisco cloud security strategy
Presentation cisco cloud security strategy
xKinAnx
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco Canada
Selex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security Forum
Leonardo
Presentacion Palo Alto Networks
Presentacion Palo Alto Networks
Laurent Daudré-Vignier
SourceFire IPS Overview
SourceFire IPS Overview
GuardEra Access Solutions, Inc.
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
Imperva
Crafting Your Oracle License, Contract and Vendor Management Strategy
Crafting Your Oracle License, Contract and Vendor Management Strategy
Flexera
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
Imperva
Next Generation Security
Next Generation Security
Cisco Canada
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
Mundo Contact
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction
Global Knowledge Training
Cisco Security Architecture
Cisco Security Architecture
Cisco Canada
Application Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
Harry Gunns
IPS Best Practices
IPS Best Practices
Heather Axworthy
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
Global Knowledge Training
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
Zernike College
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Skycure
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
MarketingArrowECS_CZ
AV/DF Advanced Security Option
AV/DF Advanced Security Option
DLT Solutions
More Related Content
What's hot
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Erin Sweeney
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
CSA Argentina
Presentation cisco cloud security strategy
Presentation cisco cloud security strategy
xKinAnx
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco Canada
Selex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security Forum
Leonardo
Presentacion Palo Alto Networks
Presentacion Palo Alto Networks
Laurent Daudré-Vignier
SourceFire IPS Overview
SourceFire IPS Overview
GuardEra Access Solutions, Inc.
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
IBM Security
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
Imperva
Crafting Your Oracle License, Contract and Vendor Management Strategy
Crafting Your Oracle License, Contract and Vendor Management Strategy
Flexera
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
Imperva
Next Generation Security
Next Generation Security
Cisco Canada
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
Mundo Contact
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction
Global Knowledge Training
Cisco Security Architecture
Cisco Security Architecture
Cisco Canada
Application Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
Harry Gunns
IPS Best Practices
IPS Best Practices
Heather Axworthy
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
Global Knowledge Training
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
Zernike College
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Skycure
What's hot
(20)
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Segurdad de red para la generacion de la nube symantec
Segurdad de red para la generacion de la nube symantec
Presentation cisco cloud security strategy
Presentation cisco cloud security strategy
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Cisco ThreatGrid: Malware Analysis and Threat Intelligence
Selex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security Forum
Presentacion Palo Alto Networks
Presentacion Palo Alto Networks
SourceFire IPS Overview
SourceFire IPS Overview
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Don’t Drown in a Sea of Cyberthreats: Mitigate Attacks with IBM BigFix & QRadar
Stop Account Takeover Attacks, Right in their Tracks
Stop Account Takeover Attacks, Right in their Tracks
Crafting Your Oracle License, Contract and Vendor Management Strategy
Crafting Your Oracle License, Contract and Vendor Management Strategy
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
Next Generation Security
Next Generation Security
Palo Alto Networks y la tecnología de Next Generation Firewall
Palo Alto Networks y la tecnología de Next Generation Firewall
Building Up Network Security: An Introduction
Building Up Network Security: An Introduction
Cisco Security Architecture
Cisco Security Architecture
Application Framework - Palo Alto Networks
Application Framework - Palo Alto Networks
IPS Best Practices
IPS Best Practices
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
Palo Alto Networks Soc Ent Okt2009
Palo Alto Networks Soc Ent Okt2009
How to Predict, Detect and Protect Against Mobile Cyber Attacks
How to Predict, Detect and Protect Against Mobile Cyber Attacks
Similar to The “Security” in Oracle’s Secure Cloud Infrastructure
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
MarketingArrowECS_CZ
AV/DF Advanced Security Option
AV/DF Advanced Security Option
DLT Solutions
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
Eric Vétillard
Cybersecurity update 12
Cybersecurity update 12
Jim Kaplan CIA CFE
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Delivery Centric
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
CloudPassage
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Indus Khaitan
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
Adrian Sanabria
CIS14: Network-Aware IAM
CIS14: Network-Aware IAM
CloudIDSummit
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
terrencebarr
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Cisco Canada
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
Rik Ferguson
Rik Ferguson
CloudExpoEurope
Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017
Sohaib Mahmood
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
Government Technology and Services Coalition
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
Tunde Ogunkoya
The Inconvenient Truth About API Security
The Inconvenient Truth About API Security
Distil Networks
ERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, Solutions
ERPScan
Oracle here. now. your choice.
Oracle here. now. your choice.
CIOEastAfrica
mcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdf
AndreBolo1
Similar to The “Security” in Oracle’s Secure Cloud Infrastructure
(20)
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
AV/DF Advanced Security Option
AV/DF Advanced Security Option
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
Cybersecurity update 12
Cybersecurity update 12
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
CIS14: Network-Aware IAM
CIS14: Network-Aware IAM
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Rik Ferguson
Rik Ferguson
Securing Data in the Cloud - GISEC2017
Securing Data in the Cloud - GISEC2017
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
ISACA 2016 Annual Conference SA_State of Risk_Tunde Ogunkoya_DeltaGRiC_Consul...
The Inconvenient Truth About API Security
The Inconvenient Truth About API Security
ERP Security. Myths, Problems, Solutions
ERP Security. Myths, Problems, Solutions
Oracle here. now. your choice.
Oracle here. now. your choice.
mcafee-cloud-acceleration-and-risks.pdf
mcafee-cloud-acceleration-and-risks.pdf
More from MarketingArrowECS_CZ
INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
MarketingArrowECS_CZ
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
MarketingArrowECS_CZ
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
MarketingArrowECS_CZ
Chráníte správně svoje data?
Chráníte správně svoje data?
MarketingArrowECS_CZ
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
MarketingArrowECS_CZ
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
MarketingArrowECS_CZ
Infinidat InfiniGuard
Infinidat InfiniGuard
MarketingArrowECS_CZ
Infinidat InfiniBox
Infinidat InfiniBox
MarketingArrowECS_CZ
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
MarketingArrowECS_CZ
Základy licencování Oracle software
Základy licencování Oracle software
MarketingArrowECS_CZ
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
MarketingArrowECS_CZ
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
MarketingArrowECS_CZ
Oracle Data Protection - 2. část
Oracle Data Protection - 2. část
MarketingArrowECS_CZ
Oracle Data Protection - 1. část
Oracle Data Protection - 1. část
MarketingArrowECS_CZ
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
MarketingArrowECS_CZ
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
MarketingArrowECS_CZ
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
MarketingArrowECS_CZ
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
MarketingArrowECS_CZ
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
MarketingArrowECS_CZ
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
MarketingArrowECS_CZ
More from MarketingArrowECS_CZ
(20)
INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Chráníte správně svoje data?
Chráníte správně svoje data?
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
Infinidat InfiniGuard
Infinidat InfiniGuard
Infinidat InfiniBox
Infinidat InfiniBox
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
Základy licencování Oracle software
Základy licencování Oracle software
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
Oracle Data Protection - 2. část
Oracle Data Protection - 2. část
Oracle Data Protection - 1. část
Oracle Data Protection - 1. část
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
Recently uploaded
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
2toLead Limited
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Alan Dix
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
costume and set research powerpoint presentation
costume and set research powerpoint presentation
phoebematthew05
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Deakin University
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
ngoud9212
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Scott Keck-Warren
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
Neo4j
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
null - The Open Security Community
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Wonjun Hwang
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Competition Advisory Services (India) LLP
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
BookNet Canada
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
jimielynbastida
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
BookNet Canada
Recently uploaded
(20)
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
costume and set research powerpoint presentation
costume and set research powerpoint presentation
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
The transition to renewables in India.pdf
The transition to renewables in India.pdf
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
The “Security” in Oracle’s Secure Cloud Infrastructure
1.
2.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | Note to presenters The focus of this presentaBon is the security provided by SPARC/Solaris servers for private cloud deployments. Security is of paramount importance for any deployment and certainly for private cloud deployments. This presentaBon does not detail all of Oracle’s security features as that would take a much longer presentaBon but focuses on the SPARC and Solaris parts of the Oracle red stack. You need to point out that Oracle has a layered security story but this presentaBon focuses on just a couple of those layers. The presentaBon tries to educate the the customer as to the nature of many threats and follows that up with how Solaris on SPARC can fix many of those threats. The goal isto show that securing the network is not enough, you much secure every layer. Abuse of credenBals is a vector of aPack and the access control of Solaris can dramaBcally reduce the thread of stolen credenBals. Another major aPack vector is aPacking servers that are mis-‐configured or clearly out of date with regards to patches. Poor patching leaves many fixed vulnerabiliBes un-‐fixed. The level of the presentaBon is designed for sales reps. Hopefully, this presentaBon will generate follow up discussions to drill down to specific security capabiliBes of SPARC/Solaris and the other layers of the stack.
3.
Copyright © 2014
Oracle and/or its affiliates. All rights reserved. | The “Security” in Oracle’s Secure Cloud Infrastructure Why is security on the rise ? Jaroslav Malina Senior Channel Sales Manager Oracle Systems CEE North
4.
Copyright © 2015,
Oracle and/or its affiliates. All rights reserved. | 4 Market Forces Are Driving Change Managing and Securing Data is Crucial 40 Billion Devices 3.8 Billion Mobile Users 24 ZeJabytes of Data 77 Billion Datacenter Cores Market Forces: 2014 -‐2018 -‐ IDC Oracle Briefing Jan 2015 Security Threat #1: Stolen Privileged User CredenUals Security Threat #2: Unpatched and misconfigured Systems Security Threat #3: Direct Data Access
5.
Copyright © 2015,
Oracle and/or its affiliates. All rights reserved. | 5 Has Changed Everything
6.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | Journey to Private Cloud Private Cloud • Security • Self-‐service • Auto-‐scaling • Metering & chargeback Consolidated TradiUonal Silos • Physical • Dedicated • Heterogeneous • Virtual • Shared • Standardized Start with consolidation • Extend to private cloud • Secure the environment
7.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | NEJSTE DOST PARANOIDNÍ ? hPps://www.privacyrights.org/data-‐breach 7
8.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | 200M Experian Mar ‘14 150M eBay May ‘14 22M EducaBon July ‘14 SA Banks OCT ‘13 Credit Cards 150M + Code Adobe Oct ‘13 98M Target Dec‘13 20M Credit Bureau 12M Telecom Jan ‘14 56M Home Depot Sep ‘14 ImmigraUon June’14 Personal Records 76M JPMC Oct ‘14 The Age of Mega Breaches 8 Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | 53M Sony Dec ‘14 227M 80M Anthem Feb ‘15
9.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | 82% of APacks Are User, System, or Database VulnerabiliBes 9 Abuse and misuse of credenBals Poorly configured systems Un-‐patched systems Unprotected Data 50% 19% 13% 82% Source: 2014 Verizon DBIR • Many 2014 aPacks used old vulnerabiliBes • Fixes published many years prior to 2014 • Fixes not deployed due to patching difficulBes
10.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | Risks are Outside; VulnerabiliBes Within 10
11.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | How the Sony Breach Changed Security Not once but twice! 11
12.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | Threat #1: Stolen Privileged User CredenBals 12 100% Of invesBgated data breaches involved stolen credenBals
13.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | Threat #2:Unpatched and Misconfigured Systems 13 99.9% Of the exploited vulnerabiliBes were compromised more than a year aker the fix was published
14.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | 14 Fixes are not being applied Fixed VulnerabiliBes SBll Exposed 74% OF ORGANIZATIONS TAKE 3 MONTHS+ TO PATCH Source: Verizon Data Breach InvesBgaBons Report, 2015; IIOUG Data Security Survey, 2014 Breaches in 2014 and Year Fixed
15.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | Threat #3: Direct Data Access 15 $194 The average cost per record stolen in a data breach
16.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | 0% 10% 20% 30% 40% 50% 60% 70% 80% Database Network ApplicaBon Middleware 52% 34% 11% 4% 15% 67% 15% 3% Source: CSO Online MarketPulse, 2013 IT Execs Consider Most vulnerable IT OrganizaBons Are Over-‐InvesBng in Technologies that Don’t Directly Protect Databases Resource allocaBon Only 24% of breaches are stopped by network security
17.
Copyright © 2015
Oracle and/or its affiliates. All rights reserved. | 17 SECURING THE COMPLETE STACK INSIDE OUT SAVES TIME, MONEY AND REDUCES RISK MiUgates credenUal abuse/ misuse Patching done right End-‐to-‐End, always on cryptography
18.
Copyright © 2014
Oracle and/or its affiliates. All rights reserved. | 18
Download now