SlideShare a Scribd company logo
Deliver Secure Cloud Computing with Oracle

Solaris and SPARC M7 Software in Silicon
A Secure
Path to the Cloud
Oracle's SPARC M7 processor, with Oracle's Software in Silicon technology, is the
industry's most advanced multithread, multi-core processor with unique capabilities for
information security. It sets the foundation for mission-critical cloud-based server
infrastructure with unprecedented levels of security, efficiency, and performance.
MARKET FORCES DRIVING CHANGE
Managing and Securing Data is Crucial.
Massive Growth1
Based on 2014-2018 IDC Oracle
Briefing, Jan 2015
3.8Billion devices
40
77

Billion
datacenter
cores of data
created
Billion mobile
users
24
Zettabytes
Increased Vulnerability
100%

Attacks that target username
and password credentials2
99.9%

Data breaches caused by
un-patched systems3
$194

Average cost per record
stolen in a data breach4
DESIGNED FOR SECURITY

Oracle SPARC M7 systems with built in security features enable “Encryption by default”- making it
possible for you to encrypt everything on the wire, everything on disk, everything you're doing.
El formancenate the perimi
and cost barriers typically
Crypto instruction
accelerators integrated
directly into each processor
Broadest set of ciphers for
all your application needs
associated with secure
computing core
BREAKTHROUGH SECURITY FEATURES

Technology that delivers.

Silicon Secured Memory
First hardware based memory protection preventing
unauthorized access
Simple Compliance Reporting
Only platform with PCI-DSS built-in
Hardware Enabled Secure Live Migration
VM encrypted for transmission over network
ORACLE SOLARIS SECURITY FEATURES
Helps to mitigate credential abuse or misuse.
Activity Based User Access Control when users
can perform actions remote auditing and
logging
Tamper resistant true
FULLY INTEGRATED SECURITY
End to end security is now possible.
Encrypt The Entire
Information Lifecycle Without
Performance Penalties
Enable “Encryption By
Default” Anywhere
and Everywhere.
Protect All Your
Databases, All The Time
The World’s First Software in Silicon for
Database and Applications
Oracle’s software in silicon technology is truly revolutionary for providing
security and workload performance increases beyond the scale of traditional
new processor technology improvements. It was the vision of Oracle over 4
years ago to integrate application acceleration and security capabilities at the
processor level, which enables the highest levels of security and the highest
application performance levels.
Software in Silicon technology is an example why Oracle software runs best on
Oracle systems and will be incorporated across Oracle systems and software
products including engineered systems and operating systems.
LEARN MORE
DELIVERING SECURE CLOUD SOLUTIONS
[1]
Massive Growth: Market Forces: 2014-2018- IDC Oracle Briefing, Jan 2015
[2]
MandiantThreat Landscape Report
[3]
http://www.verizonenterprise.com/resources/infograph­
ics/ig_understanding-the-real-risk-of-data-breach_en_xg.pdf
[4]
http://public.dhe.ibm.com/common/ssi/ecm/se/en/sew03074usen/SEW03074USEN.PDF
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks
of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
151123

More Related Content

What's hot

McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
Iftikhar Ali Iqbal
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elasticsearch
 
Azure Sentinel
Azure SentinelAzure Sentinel
Azure Sentinel
Cheah Eng Soon
 
Building secure cloud apps – lessons learned from Microsoft’s internal securi...
Building secure cloud apps – lessons learned from Microsoft’s internal securi...Building secure cloud apps – lessons learned from Microsoft’s internal securi...
Building secure cloud apps – lessons learned from Microsoft’s internal securi...
Microsoft Tech Community
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elasticsearch
 
Top 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 seriesTop 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 seriesIT Tech
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
DevOps.com
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
Bitglass
 
Lacework slides from AWS Meetups
Lacework slides from AWS MeetupsLacework slides from AWS Meetups
Lacework slides from AWS Meetups
John Varghese
 
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Tripwire
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogue
Vijayananda Mohire
 
Security at the Speed of Software - Twistlock
Security at the Speed of Software - TwistlockSecurity at the Speed of Software - Twistlock
Security at the Speed of Software - Twistlock
Amazon Web Services
 
Palestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic SecurityPalestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic Security
Elasticsearch
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
CloudWALL Italia
 
Lacework Overview: Security Redefined for Cloud Scale
Lacework Overview: Security Redefined for Cloud ScaleLacework Overview: Security Redefined for Cloud Scale
Lacework Overview: Security Redefined for Cloud Scale
Lacework
 
Cloud Security Demo
Cloud Security DemoCloud Security Demo
Cloud Security Demo
Cheah Eng Soon
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
Bitglass
 
IT & Security opportunities 2015
IT & Security opportunities 2015IT & Security opportunities 2015
IT & Security opportunities 2015
Sumeer Sharma
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
Netskope
 
Microsoft Azure News - April 2021
Microsoft Azure News - April 2021Microsoft Azure News - April 2021
Microsoft Azure News - April 2021
Daniel Toomey
 

What's hot (20)

McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
McAfee - McAfee Active Response (MAR) - Endpoint Detection & Response (EDR)
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
 
Azure Sentinel
Azure SentinelAzure Sentinel
Azure Sentinel
 
Building secure cloud apps – lessons learned from Microsoft’s internal securi...
Building secure cloud apps – lessons learned from Microsoft’s internal securi...Building secure cloud apps – lessons learned from Microsoft’s internal securi...
Building secure cloud apps – lessons learned from Microsoft’s internal securi...
 
Elastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic StackElastic Security: Enterprise Protection Built on the Elastic Stack
Elastic Security: Enterprise Protection Built on the Elastic Stack
 
Top 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 seriesTop 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 series
 
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
Hotels, Hookups and Video Conferencing: A Top 10 Countdown to 2020's Worst Da...
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
Lacework slides from AWS Meetups
Lacework slides from AWS MeetupsLacework slides from AWS Meetups
Lacework slides from AWS Meetups
 
Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?Simplicity in Hybrid IT Environments – A Security Oxymoron?
Simplicity in Hybrid IT Environments – A Security Oxymoron?
 
Bhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogueBhadale group of companies it cloud security catalogue
Bhadale group of companies it cloud security catalogue
 
Security at the Speed of Software - Twistlock
Security at the Speed of Software - TwistlockSecurity at the Speed of Software - Twistlock
Security at the Speed of Software - Twistlock
 
Palestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic SecurityPalestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic Security
 
CloudWALL Profile ENG
CloudWALL Profile ENGCloudWALL Profile ENG
CloudWALL Profile ENG
 
Lacework Overview: Security Redefined for Cloud Scale
Lacework Overview: Security Redefined for Cloud ScaleLacework Overview: Security Redefined for Cloud Scale
Lacework Overview: Security Redefined for Cloud Scale
 
Cloud Security Demo
Cloud Security DemoCloud Security Demo
Cloud Security Demo
 
Webinar Express: What is a CASB?
Webinar Express: What is a CASB?Webinar Express: What is a CASB?
Webinar Express: What is a CASB?
 
IT & Security opportunities 2015
IT & Security opportunities 2015IT & Security opportunities 2015
IT & Security opportunities 2015
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 
Microsoft Azure News - April 2021
Microsoft Azure News - April 2021Microsoft Azure News - April 2021
Microsoft Azure News - April 2021
 

Similar to Oracle Sparc Cloud

Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security Products
Estuate, Inc.
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
Government Technology and Services Coalition
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
Alert Logic
 
Oracle Sparc M7-8 Servers
Oracle Sparc M7-8 ServersOracle Sparc M7-8 Servers
Oracle Sparc M7-8 Servers
Ilham Amir
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Alert Logic
 
Lucw lsec-securit-20110907-4-final-5
Lucw lsec-securit-20110907-4-final-5Lucw lsec-securit-20110907-4-final-5
Lucw lsec-securit-20110907-4-final-5
Luc Wijns
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
Dell EMC World
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
Frederik Lawson
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
International Communications Corporation
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
Partner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingPartner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud Computing
Amazon Web Services
 
federal reserve.
federal reserve.federal reserve.
federal reserve.
Sandro Suzart
 
Data center Trends with Oracle
Data center Trends with OracleData center Trends with Oracle
Data center Trends with Oracle
Fran Navarro
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
Teguh Febrianto Setiawan
 
Prevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty Integri Datasheet
Prevoty Integri Datasheet
Prevoty
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research Challenges
Dr. Rajesh P Barnwal
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
terrencebarr
 

Similar to Oracle Sparc Cloud (20)

Best Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security ProductsBest Practices in Implementing Oracle Database Security Products
Best Practices in Implementing Oracle Database Security Products
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Oracle Sparc M7-8 Servers
Oracle Sparc M7-8 ServersOracle Sparc M7-8 Servers
Oracle Sparc M7-8 Servers
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
Lucw lsec-securit-20110907-4-final-5
Lucw lsec-securit-20110907-4-final-5Lucw lsec-securit-20110907-4-final-5
Lucw lsec-securit-20110907-4-final-5
 
MT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT InitiativesMT81 Keys to Successful Enterprise IoT Initiatives
MT81 Keys to Successful Enterprise IoT Initiatives
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Streamline and Secure Your Network and Users
Streamline and Secure Your Network and UsersStreamline and Secure Your Network and Users
Streamline and Secure Your Network and Users
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
ICC Networking Data Security
ICC Networking Data SecurityICC Networking Data Security
ICC Networking Data Security
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Partner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud ComputingPartner Keynote: Intel - The New Frontier of Cloud Computing
Partner Keynote: Intel - The New Frontier of Cloud Computing
 
federal reserve.
federal reserve.federal reserve.
federal reserve.
 
Data center Trends with Oracle
Data center Trends with OracleData center Trends with Oracle
Data center Trends with Oracle
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
1. Investasi (1).ppt untuk masa depan dan pelajarannya bagi generasi muda
 
Prevoty Integri Datasheet
Prevoty Integri DatasheetPrevoty Integri Datasheet
Prevoty Integri Datasheet
 
Cloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research ChallengesCloud security: Industry Trends and Research Challenges
Cloud security: Industry Trends and Research Challenges
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 

Oracle Sparc Cloud

  • 1. Deliver Secure Cloud Computing with Oracle Solaris and SPARC M7 Software in Silicon A Secure Path to the Cloud Oracle's SPARC M7 processor, with Oracle's Software in Silicon technology, is the industry's most advanced multithread, multi-core processor with unique capabilities for information security. It sets the foundation for mission-critical cloud-based server infrastructure with unprecedented levels of security, efficiency, and performance. MARKET FORCES DRIVING CHANGE Managing and Securing Data is Crucial. Massive Growth1 Based on 2014-2018 IDC Oracle Briefing, Jan 2015 3.8Billion devices 40 77 Billion datacenter cores of data created Billion mobile users 24 Zettabytes Increased Vulnerability 100% Attacks that target username and password credentials2 99.9% Data breaches caused by un-patched systems3 $194 Average cost per record stolen in a data breach4 DESIGNED FOR SECURITY Oracle SPARC M7 systems with built in security features enable “Encryption by default”- making it possible for you to encrypt everything on the wire, everything on disk, everything you're doing. El formancenate the perimi and cost barriers typically Crypto instruction accelerators integrated directly into each processor Broadest set of ciphers for all your application needs associated with secure computing core BREAKTHROUGH SECURITY FEATURES Technology that delivers. Silicon Secured Memory First hardware based memory protection preventing unauthorized access Simple Compliance Reporting Only platform with PCI-DSS built-in Hardware Enabled Secure Live Migration VM encrypted for transmission over network ORACLE SOLARIS SECURITY FEATURES Helps to mitigate credential abuse or misuse. Activity Based User Access Control when users can perform actions remote auditing and logging Tamper resistant true FULLY INTEGRATED SECURITY End to end security is now possible. Encrypt The Entire Information Lifecycle Without Performance Penalties Enable “Encryption By Default” Anywhere and Everywhere. Protect All Your Databases, All The Time The World’s First Software in Silicon for Database and Applications Oracle’s software in silicon technology is truly revolutionary for providing security and workload performance increases beyond the scale of traditional new processor technology improvements. It was the vision of Oracle over 4 years ago to integrate application acceleration and security capabilities at the processor level, which enables the highest levels of security and the highest application performance levels. Software in Silicon technology is an example why Oracle software runs best on Oracle systems and will be incorporated across Oracle systems and software products including engineered systems and operating systems. LEARN MORE DELIVERING SECURE CLOUD SOLUTIONS [1] Massive Growth: Market Forces: 2014-2018- IDC Oracle Briefing, Jan 2015 [2] MandiantThreat Landscape Report [3] http://www.verizonenterprise.com/resources/infograph­ ics/ig_understanding-the-real-risk-of-data-breach_en_xg.pdf [4] http://public.dhe.ibm.com/common/ssi/ecm/se/en/sew03074usen/SEW03074USEN.PDF Copyright © 2015, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. 151123