Database Security Questions HOUG Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.
|
|
- Ambrose Lindsey
- 7 years ago
- Views:
Transcription
1 Database Security Questions HOUG 2016 Fehér Lajos 1
2 How Data Gets Compromised? Source: Verizon Data Breach Investigations Report Copyright 2015, Oracle and/or 2its affiliates. All rights reserved.
3 Where Losses Come From? 92% of Records from Compromised Databases Source: Verizon Data Breach Investigations Report
4 Top Attack Techniques % Breaches and % Records Most records lost through Stolen Credentials & SQL Injection Source: Verizon Data Breach Investigations Report
5 Database Security Defense-In-Depth Approach Monitor and block threats before they reach databases Control access to data within the databases Track changes and audit database activity Encrypt data to prevent direct access Implement with Transparency no changes to existing applications High Performance no measurable impact on applications Accuracy minimal false positives and negatives
6 Existing Security Solutions Not Enough Key Loggers Phishing Malware Botware SQL Injection Social Engineering Espionage Web Users Application Users Application Database Administrators Data Must Be Protected in depth
7 Simplified Application Model Exploit Application Bypass Application Exploit Database Users Apps Bypass Database Test/Dev Copy Abuse Privileged Accounts Access Exported Data Administrators Storage 7
8 Opportunities for Attack Exploit Application Bypass Application Exploit Database Users Apps Bypass Database Test/Dev Copy Abuse Privileged Accounts Access Exported Data Administrators Storage 8
9 Oracle Database Maximum Security Architecture Advanced Security Data Redaction Access Control (VPD and RAS) Database Vault Users Apps Database Firewall Data Masking Advanced Security TDE Test/Dev Copy Database Vault Privilege Analysis Administrators Storage Key Vault Audit Vault 9
10 Defense-in-Depth Security Controls EVALUATE PROTECT DETECT Security Configuration Encryption & Redaction Auditing Sensitive Data Discovery Masking & Subsetting Activity Monitoring Least Privilege Use DBA & Operational Controls Alerting & Reporting 10
11 Oracle Real Application Security (RAS) Next Generation Database Enforced Application Security Field Batch Jobs, Adhoc Highlights End-to-end uniform security across mid-tier and database Declarative security (no handcoded checks) Joe Application Data security based upon application users and roles Audit of end-user activity Analytics Audit Simplified administration Supports new/legacy apps 11
12 Attack #1: Exploit the Application Get the application to reveal information that wasn t intended How can this happen? Bug in the application s access control logic SQL injection Exploits the application s privileges to read and write the database Defenses Data Redaction limits sensitive data handled by the application Database Firewall examines SQL from the application and blocks abnormal statements 12
13 Oracle Advanced Security Redaction Authorized Display Redacted Display Policy Credit Card # Application Identify sensitive data, possibly using Enterprise Manager Best for data that is displayed but not interpreted by application Prevents compromise due to application bugs and protects all applications that use the same data Cardholder data National identifiers Personally Identifiable Info Medical Record Data And more Business apps including display screens, reports, dashboards, panels New and legacy applications 13
14 Oracle Database Firewall Differentiates normal SQL statements used by application vs abnormal SQL from attacker Uses SQL parser, not just regular expressions, to recognize statements Start by monitoring unexpected SQL Later move to blocking Whitelist of expected statements for maximum security Also supports blacklist policies Users Apps Alerts Reports Policies Database Firewall Events Audit Vault 14
15 Attack #2: Bypass the Application / Exploit the Database Connect to the database and access the data directly Bypasses any controls enforced by the application Defenses Harden and monitor the database configuration Implement access control in the database Virtual Private Database uses policy functions to filter data rows Real Application Security uses declarative policies based on ACLs Database Vault limits privileged access to data 15
16 Oracle Database Vault Use realms to protect against access using system privileges Enforce separation of duty among administrators Use command rules with multiple factors to tightly control routine administration Training mode helps to fine-tune policies Privileged User HR App SELECT ANY HR HR Realm Fin App Fin Fin Realm 16
17 Attack #3: Bypass the Database Access data storage directly Bypasses any controls enforced by the database Defenses Transparent Data Encryption automatically encrypts and decrypts stored data Key Vault manages encryption keys for TDE (and other uses) 17
18 Oracle Advanced Security Data Redaction Transparent Data Encryption Encrypted Storage Redacted Applications Disks Backups Exports 18
19 Transparent Data Encryption Applications For best performance Clear Data Take advantage of x86 or SPARC hardware acceleration Use tablespace encryption in most cases Protects backups as well as database files on disk Critical issue is key management Encrypted Data d$f8#;!90wz Yg#3R R+%K# *HH$7 #9Vlka Disks Backups Exports Off-Site Facilities 19
20 TDE Integration with Oracle Database Database Products and Technologies Engineered Systems Data Compression Backup and Restore Export and Import High-Availability Clusters Storage Management Pluggable Databases Database Replication Example Points of Integration Oracle Exadata Smart Scans Oracle Advanced Compression Oracle Recovery Manager (RMAN), Oracle Secure Backup Oracle Data Pump Export and Import Oracle Real Application Clusters (RAC), Active Data Guard Oracle Automatic Storage Management (ASM) Oracle Multitenant Option Oracle Golden Gate TDE Support * Integration with TDE tablespace encryption and/or key management as of Oracle Database 12c 20
21 TDE Advancements in Oracle Database 12c Release 1 Oracle Wallet Storage in ASM, automatic backup TDE Master Key New SQL commands for key management Movement of individual keys Improved S.O.D. (SYSKM) U.S. FIPS mode DBFIPS_140 parameter in init.ora FIPS
22 Managing Master Keys in Oracle Wallet CRITICAL: Remember wallet password CRITICAL: Do not delete wallet. Retain copy of password-based wallet even if using auto-login CRITICAL: Do not have multiple databases share same wallet Set strong wallet password using numbers, capitalization, length >= 12 characters Rotate master encryption key and wallet password approximately every six months Backup wallet before and after each rotation operation Keep wallet backup separate from encrypted data backup Restrict wallet directory and file permissions Keep wallet read-only for daily use, set immutable bit where available For RAC, consider storing wallet in ACFS (DB 11gR2) or ASM (DB 12cR1) For DB 12cR1, separate duties using SYSKM
23 Transparent Data Encryption Main Takeaways Transparently encrypts with no impact on applications Delivers fast performance on modern hardware Manages keys with Oracle Wallet or Oracle Key Vault Directly integrates with popular Oracle Database technologies It just works! 23
24 Oracle Key Vault High-Level Architecture Middleware Standby Databases Administration Console, Alerts, Reports Servers Secure Backups = Oracle Wallet = Java Keystore = Certificate = Server Password = Credential File 24
25 Key Management with Oracle Key Vault Use Key Vault to centrally manage keys for TDE and more Share keys with related endpoints (RAC nodes, high availability standby systems) Audit all accesses and management operations 25
26 Oracle Advanced Security Transparent Data Encryption (TDE) Oracle Wallet Upload/Download Scenarios RAC Data Guard Multiple DBs Same Machine GoldenGate Single Instance 26
27 Attack #4: Abuse Privileged Accounts Improper access by administrators or by an attacker who impersonates them Defenses Database Vault realms limit privileged access Privilege Analysis helps reduce unnecessary privilege grants 27
28 Oracle Database Vault Privilege Analysis DBA_DEBRA Custom Applications Select Update Drop DBA role. Runtime Capture Unused/Used Reports Helps implement the Principle of Least Privilege Perform privilege capture on a realistic example of application workload Revoke unnecessary privileges or audit their use 28
29 Oracle Database Vault Database Vault Realms and Command Rules Protect Sensitive Schemas and Objects Protect sensitive data from privileged accounts Enforce a trusted path to prevent application by-pass Control database changes for security and compliance Privileged User HR App SELECT ANY TABLE IP: HR HR Realm Fin Fin App IP: ALTER SYSTEM Fin Realm DBA 29
30 Oracle Database Vault Privilege Analysis Privileges not used during capture 30
31 Unused Privileges Report 31
32 Used Privileges Report 32
33 Oracle Database Vault Manageability Installed with 12c Oracle Database Enterprise Edition Configure, enable using two PL/SQL calls Manage with Oracle Enterprise Manager or API Protection travels with PDB and backups Integrated with Oracle High Availability options (Data Guard, RAC ) Less than 2% performance overhead 33
34 Attack #5: Access Exported Data Copies of data may be exported for many reasons Exported data copies may not be protected as carefully Defenses Data Masking replaces sensitive data with other content Data Subsettinglimits exported data to a representative sample 34
35 Oracle Data Masking and Subsetting Pack Reduces Risk in Sharing by Obfuscating or Removing Sensitive Data Production Test/Dev Discover Sensitive Data Modeling Application Data SSN Credit Card SSN Credit Card Mask Data using Format Library Subset Based on Goal/Condition Mask/Subset in Export or on Staging Mask in Workload Captures & Clones Pre-installed in Enterprise Manager 35
36 Application Data Modeling Sensitive Data Discovery Data Relationships Sensitive Columns Metadata Automated Discovery 36
37 Extensive Masking Format Library Provides common masking formats Supports custom masking formats Random numbers/strings/dates Substitute User defined PL/SQL function and more Generates sample masked values Templates for specific versions of E- Business Suite and Fusion Applications 37
38 Masking Examples Mask Based on Condition Country Identifier CA US UK JX C Shuffle Records Country Identifier Health Health CA Records Records US UK AI D Emp ID First Name 324 Albert 986 Hussain Generate Deterministic Output HR FIN Emp ID First Name 324 Charlie 986 Murali Emp ID First Name 324 Charlie 986 Murali Generate Random Values Preserving Format Mask Operating System Files stored as Blobs Company Closing Price IBFG $36.92 XKJU Company Closing Price IBFG $89.57 XKJU BLOB Search : [0-9]{10} Replace : * BLOB ********** ********** and more 38
39 Goal or Condition Based Subsetting Relative Database Size 100% 25% 10% 100M Rows Relative Table Size 20M Rows 2M Rows 1024 GB 256 GB 102 GB Condition Based Extract ASIA Sales
40 Deployment Options In-Database In-Export Production Staging Test/Dev Production Export Test/Dev Minimal impact on the production environment Sensitive data remains within the production perimeter 40
41 Final Defense: Monitor Activity Monitoring activity is an overall defense Catches unknown attacks Detects tampering with defenses When monitoring is known, it can have a deterrent effect Defenses Database Auditing records significant security events as they occur Audit Vault collects audit data and provides reports and real-time alerts 41
42 Database Auditing Goal is to record the most important events without generating overwhelming amounts of data For example, record updates to sensitive table but not every SELECT Record security-relevant events that are expected to be infrequent Database audit policies are highly customizable Access to particular objects Use of roles or privileges Based on runtime conditions Beginning in 12.1, Unified Audit combines multiple audit mechanisms 42
43 Oracle Audit Vault Alerts Reports Policies Audit Data & Event Logs Databases OS & Storage Directories Custom Audit Vault Collects and consolidates audit data from multiple sources Protects tampering by removing audit data from subject systems Can collect additional detail from database redo logs such as values before and after update New reports show trends and anomalous activity 43
44 Security Guide Day Security Guide
45 Q & A HOUG 2016 Fehér Lajos 45
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationCopyright 2014 Oracle and/or its affiliates. All rights reserved.
Copyright 2014 Oracle and/or its affiliates. All rights reserved. Oracle Data Masking and Subsetting Oracle Advanced Security Best Practices for Database Encryption and Redaction Todd Bottger Sr. Principal
More informationCopyright 2014 Oracle and/or its affiliates. All rights reserved.
Oracle Data Masking and Subsetting What s new & Best Practices Dinesh Rajasekharan Product Manager Oracle Data Masking and Subsetting Oct 02, 2014 Copyright 2014, Oracle and/or its affiliates. All rights
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
More informationOracle Database Security. Paul Needham Senior Director, Product Management Database Security
Oracle Database Security Paul Needham Senior Director, Product Management Database Security Safe Harbor Statement The following is intended to outline our general product direction. It is intended for
More informationProtecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security Antonio.Mata.Gomez@oracle.com Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Solutions for securing and auditing Oracle database Edgars Ruņģis Technology Consultant Why Are Databases Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Enterprises
More informationOracle Database Security
Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches
More informationAn Oracle White Paper June 2013. Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security
An Oracle White Paper June 2013 Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security Introduction... 1 Preventing Database Bypass with Encryption... 2 Oracle Advanced Security
More information1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
More informationComplete Database Security. Thomas Kyte http://asktom.oracle.com/
Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside Out Latest Innovations in Oracle Database 12c Jukka Männistö Database Architect Oracle Nordic Coretech Presales The 1995-2014 Security Landscape Regulatory Landscape HIPAA, SOX (2002),
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Oracle Database Security Advanced Security Option Thanos Terentes Printzios DB & Options Specialist A&C Technology Adoption Office Oracle Partner Business Development, ECEMEA 2 What is a customers INFORMATION
More information1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
More information<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager tammy.bednar@oracle.com Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
More informationOracle Database 12c Plug In. Switch On. Get SMART.
Oracle Database 12c Plug In. Switch On. Get SMART. Duncan Harvey Head of Core Technology, Oracle EMEA March 2015 Safe Harbor Statement The following is intended to outline our general product direction.
More informationOracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
More informationOracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
More informationOracle Identity Management Securing The New Digital Experience
Oracle Identity Management Securing The New Digital Experience Security: User Single Sign-On, Certifying User Access, and Masking Sensitive Data Henry Anzarouth Principal Sales Consultant, Security and
More informationDatabase Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security
Database Security & Compliance with Audit Vault and Database Firewall Pierre Leon Database Security 1 Topics Encryption Authentication Authorising highly privileged users Access control by data classification
More informationOracle 1Z0-528 Exam Questions & Answers
Oracle 1Z0-528 Exam Questions & Answers Number: 1Z0-528 Passing Score: 660 Time Limit: 120 min File Version: 21.1 http://www.gratisexam.com/ Oracle 1Z0-528 Exam Questions & Answers Exam Name: Oracle Database
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Introducing Oracle Audit Vault and Database Firewall Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with Basic Controls 98% records stolen from databases 84% records breached
More informationOracle Database Security Services
Oracle Database Security Services BUSINESS CHALLENGES Public announcements of major IT security breaches have become an almost daily occurrence. The causes of publicized breaches are diverse and include
More informationAn Oracle White Paper June 2013. Security and Compliance with Oracle Database 12c
An Oracle White Paper June 2013 Security and Compliance with Oracle Database 12c Introduction... 3 Oracle Database 12c Security... 4 Locating and Cataloging Your Sensitive Data... 4 Monitoring the Configuration
More informationSafeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng
Delivering Oracle Success Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking Lucy Feng RMOUG Training Days February 2012 About DBAK Oracle Solution
More information<Insert Picture Here> Oracle Database Vault
Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
More informationD50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
More informationAn Oracle White Paper April 2014. Security and Compliance with Oracle Database 12c
An Oracle White Paper April 2014 Security and Compliance with Oracle Database 12c Introduction... 2 Oracle Database 12c Security... 3 Protecting Against Database Bypass Threats... 3 Limiting Sensitive
More informationAn Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance
An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy
More informationSecurity It s an ecosystem thing
Security It s an ecosystem thing Joseph Alhadeff Vice President Global Public Policy, Chief Privacy Strategist The Security challenge in the before time. Today s Threat Environment
More informationOracle EXAM - 1Z0-528. Oracle Database 11g Security Essentials. Buy Full Product. http://www.examskey.com/1z0-528.html
Oracle EXAM - 1Z0-528 Oracle Database 11g Security Essentials Buy Full Product http://www.examskey.com/1z0-528.html Examskey Oracle 1Z0-528 exam demo product is here for you to test the quality of the
More informationOracle Database 11g Security Essentials
Oracle 1z0-528 Oracle Database 11g Security Essentials Version: 4.2 QUESTION NO: 1 Oracle 1z0-528 Exam Which of the following tasks is the first task to perform when implementing Oracle Database Vault?
More informationHayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks
EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector
More informationOracle Database Cloud Services OGh DBA & Middleware Day
Oracle Database Cloud Services OGh DBA & Middleware Day Jan van Tiggelen Principal Sales Consultant Oracle Core Technology June 4th, 2015 Safe Harbor Statement The following is intended to outline our
More informationOracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall Angelo Maria Bosis Sales Consulting Director Oracle Italia Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with
More informationData Security: Strategy and Tactics for Success
Data Security: Strategy and Tactics for Success DatabaseVisions,Inc. Fairfax, Va Oracle Gold Partner Solution Provider Oracle Security Specialized www.databasevisions.com Overview Cloud Computing presents
More informationOracle Database 12c. Peter Schmidt Systemberater Oracle Deutschland BV & CO KG
Oracle Database 12c Peter Schmidt Systemberater Oracle Deutschland BV & CO KG Uptake of Oracle Database 12c compared with 11g 18,00% 16,00% 14,00% 12,00% 10,00% 8,00% 12.1 11.1 6,00% 4,00% 2,00% 0,00%
More informationOracle Database Public Cloud Services
Oracle Database Public Cloud Services A Strategy and Technology Overview Bob Zeolla Principal Sales Consultant Oracle Education & Research November 23, 2015 Safe Harbor Statement The following is intended
More information2015 Jože Senegačnik Oracle ACE Director
Transparent Data Encryption and Data Redaction in Oracle 12c Jože Senegačnik www.dbprof. - joze.senegacnik@dbprof. 2015 Jože Senegačnik About the Speaker DbProf. Jože Senegačnik First experience with Oracle
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Seguridad en profundidad Jaime Briggs MSc CS, CISSP, CCSK Sales Manager Strategic accounts Agenda Los Controles ISO 27001 Defensa en Profundidad Productos que dan respuesta Roadmap a seguridad Q&A 3
More informationOracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska
Oracle Audit Vault and Database Firewall Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska The following is intended to outline our general product direction. It is intended for information
More information1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
More informationWhy Standardize on Oracle Database 11g Next Generation Database Management. Thomas Kyte http://asktom.oracle.com
Why Standardize on Oracle Database 11g Next Generation Database Management Thomas Kyte http://asktom.oracle.com Top Challenges Performance Management Change Management Ongoing Administration Storage Backup
More informationMySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationOracle Database Security Solutions
Oracle Database Security Solutions Eric Cheung Senior Manager, Technology Sales Consulting Eric.cheung@oracle.com May 2008 Key Drivers for Data Security Privacy and Compliance Sarbanes-Oxley
More informationOracle: Database and Data Management Innovations with CERN Public Day
Presented to Oracle: Database and Data Management Innovations with CERN Public Day Kevin Jernigan, Oracle Lorena Lobato Pardavila, CERN Manuel Martin Marquez, CERN June 10, 2015 Copyright 2015, Oracle
More informationOracle Database 12c: New Features for Administrators
Oracle University Contact Us: 67 52 67 24 Oracle Database 12c: New Features for Administrators Duration: 5 Days What you will learn In the Oracle Database 12c: New Features for Administrators course, you
More informationLarry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
More informationOracle 12c Multitenant and Encryption in Real Life. Christian Pfundtner
Oracle 12c Multitenant and Encryption in Real Life Christian Pfundtner Christian Pfundtner, DB Masters GmbH Over 20 years of Oracle Database OCA, OCP, OCE, OCM, ACE Our Credo: Databases are our world 4
More informationSafe Harbor Statement
Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment
More information<Insert Picture Here> Oracle Cloud Storage. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska
Oracle Cloud Storage Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska Oracle Cloud Storage Automatic Storage Management (ASM) Oracle Cloud File System ASM Dynamic
More informationOracle Database 12c Security and Compliance O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5
Oracle Database 12c Security and Compliance O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Table of Contents Introduction 2 Oracle Database 12c Security 3 Preventing Database Bypass 3 Preventing
More informationAn Oracle White Paper July 2014. Oracle ACFS
An Oracle White Paper July 2014 Oracle ACFS 1 Executive Overview As storage requirements double every 18 months, Oracle customers continue to deal with complex storage management challenges in their data
More informationOracle Database 11g: Security. What you will learn:
Oracle Database 11g: Security What you will learn: In Oracle Database 11g: Security course students learn how they can use Oracle database features to meet the security, privacy and compliance requirements
More informationOracle Database 11g: Security
Oracle University Contact Us: +27 (0)11 319-4111 Oracle Database 11g: Security Duration: 5 Days What you will learn In Oracle Database 11g: Security course students learn how to use Oracle database features
More informationNew Oracle 12c Security Features Oracle E-Business Suite Perspective
New Oracle 12c Security Features Oracle E-Business Suite Perspective December 18, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
More informationOracle vs. SQL Server. Simon Pane & Steve Recsky First4 Database Partners Inc. September 20, 2012
Oracle vs. SQL Server Simon Pane & Steve Recsky First4 Database Partners Inc. September 20, 2012 Agenda Discussions on the various advantages and disadvantages of one platform vs. the other For each topic,
More informationOracle Database 10g: New Features for Administrators
Oracle Database 10g: New Features for Administrators Course ON10G 5 Day(s) 30:00 Hours Introduction This course introduces students to the new features in Oracle Database 10g Release 2 - the database for
More informationSecuring and Accelerating Databases In Minutes using GreenSQL
Securing and Accelerating Databases In Minutes using GreenSQL Unified Database Security All-in-one database security and acceleration solution Simplified management, maintenance, renewals and threat update
More informationProtecting Data Assets and Reducing Risk
Protecting Data Assets and Reducing Risk Michelle Malcher Enterprise Database Security Oracle Open World 2014 2014 Wells Fargo Bank, N.A. All rights reserved. For public use. 1 Introduction Michelle Malcher
More informationOracle Cloud Update November 2, 2015. Eric Frank Oracle Sales Consultant. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Oracle Cloud Update November 2, 2015 Eric Frank Oracle Sales Consultant Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationManaging Oracle E-Business Suite Security
Managing Oracle E-Business Suite Security Erik Graversen, Senior Principal Software Developer Elke Phelps, Senior Principal Product Manager Oracle E-Business Suite Applications Technology Oracle Open World,
More informationAn Oracle White Paper May 2012. Oracle Database Cloud Service
An Oracle White Paper May 2012 Oracle Database Cloud Service Executive Overview The Oracle Database Cloud Service provides a unique combination of the simplicity and ease of use promised by Cloud computing
More informationORACLE DATABASE 12C: NEW FEATURES FOR ADMINISTRATORS GRADE CURRICULAR. Enterprise Manager Express home page versus Enterprise Manager Database Control
FACULDADE DE EDUCAÇÃO SUPERIOR DO PARANÁ CURSO DE EXTENSÃO UNIVERSITÁRIA ORACLE DATABASE 12C: NEW FEATURES FOR ADMINISTRATORS GRADE CURRICULAR Enterprise Manager and Other Tools Enterprise Manager (EM)
More informationAn Oracle White Paper April 2014. Oracle Audit Vault and Database Firewall
An Oracle White Paper April 2014 Oracle Audit Vault and Database Firewall Introduction... 2 Oracle Audit Vault and Database Firewall Overview... 3 Auditing and Monitoring Overview... 3 Audit Vault... 4
More informationExpert Oracle Application. Express Security. Scott Spendolini. Apress"
Expert Oracle Application Express Security Scott Spendolini Apress" Contents Foreword About the Author About the Technical Reviewer Acknowledgments Introduction xv xvii xix xxi xxiii BChapter 1: Threat
More information<Insert Picture Here> PCI DSS-Payment Card Industry. Security Summit 2010. Master Principal Sales Consultant - Alfredo Valenza - Oracle Italia
PCI DSS-Payment Card Industry Data Security Standard Security Summit 2010 Master Principal Sales Consultant - Alfredo Valenza - Oracle Italia This document is for informational purposes.
More informationVormetric Data Security
Vormetric Data Security Next Steps for Product Evaluation and Adoption Albert Dolan Systems Engineer EMEA In Depth Architecture Demonstration POC Data Transformation Deployment Use Cases Defense in Depth
More informationORACLE CLOUD MANAGEMENT PACK FOR ORACLE DATABASE
ORACLE CLOUD MANAGEMENT PACK FOR ORACLE DATABASE Oracle Enterprise Manager is Oracle s integrated enterprise IT management product line, and provides the industry s first complete cloud lifecycle management
More informationOracle Database Cloud Exadata Service
Oracle Database Cloud Exadata Service Exadata Performance, Cloud Simplicity The Oracle Database Cloud - Exadata Service (Exadata Service) delivers the world s best Cloud Database Platform by combining
More informationFIFTH EDITION. Oracle Essentials. Rick Greenwald, Robert Stackowiak, and. Jonathan Stern O'REILLY" Tokyo. Koln Sebastopol. Cambridge Farnham.
FIFTH EDITION Oracle Essentials Rick Greenwald, Robert Stackowiak, and Jonathan Stern O'REILLY" Beijing Cambridge Farnham Koln Sebastopol Tokyo _ Table of Contents Preface xiii 1. Introducing Oracle 1
More informationPreview of Oracle Database 12c In-Memory Option. Copyright 2013, Oracle and/or its affiliates. All rights reserved.
Preview of Oracle Database 12c In-Memory Option 1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
More informationThese requirements led to several challenges in deploying identity related applications within the enterprise:
2 3 Directory services are key building blocks for secure identity-enabled business applications and the underlying enterprise identity management (IdM) architecture. Well-structured and organized directory
More informationAn Oracle White Paper January 2014. Oracle Database 12c: Full Transportable Export/Import
An Oracle White Paper January 2014 Oracle Database 12c: Full Transportable Export/Import Introduction... 3 Benefits of Using Full Transportable Export/Import... 4 Full Transportable Export/Import Support
More informationAn Oracle White Paper October 2013. Oracle Data Integrator 12c New Features Overview
An Oracle White Paper October 2013 Oracle Data Integrator 12c Disclaimer This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should
More informationOracle Database 12c: Admin, Install and Upgrade Accelerated
Oracle University Contact Us: + 38516306373 Oracle Database 12c: Admin, Install and Upgrade Accelerated Duration: 5 Days What you will learn This Oracle Database 12c: Admin, Install and Upgrade Accelerated
More informationHands-on practices and available demonstrations help you Database 12c to secure your data center. Develop an under Manager Cloud Control and other too
Oracle University Contact Us: 080 219 Oracle Database 12c: Security Duration: 5 Days What you will learn This Oracle Database 12c: Security training teaches you h the security, privacy and compliance requirements
More informationMaking Database Security an IT Security Priority
Sponsored by Oracle Making Database Security an IT Security Priority A SANS Whitepaper November 2009 Written by Tanya Baccam Security Strategy Overview Why a Database Security Strategy? Making Databases
More informationOracle Database - Engineered for Innovation. Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya
Oracle Database - Engineered for Innovation Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya Oracle Database 11g Release 2 Shipping since September 2009 11.2.0.3 Patch Set now
More informationOracle Enterprise Manager 12c New Capabilities for the DBA. Charlie Garry, Director, Product Management Oracle Server Technologies
Oracle Enterprise Manager 12c New Capabilities for the DBA Charlie Garry, Director, Product Management Oracle Server Technologies of DBAs admit doing nothing to address performance issues CHANGE AVOID
More information<Insert Picture Here> Managing Storage in Private Clouds with Oracle Cloud File System OOW 2011 presentation
Managing Storage in Private Clouds with Oracle Cloud File System OOW 2011 presentation What We ll Cover Today Managing data growth Private Cloud definitions Oracle Cloud Storage architecture
More informationForthcoming EU Data Protection Law
Forthcoming EU Data Protection Law How Oracle can Help Patrick McLaughlin Security Architect & Oracle Fellow EMEA Technology Solutions 22 October 2015, Riga Copyright 2014 Oracle and/or its affiliates.
More informationEncrypting Sensitive Data in Oracle E-Business Suite
Encrypting Sensitive Data in Oracle E-Business Suite December 19, 2013 Stephen Kost Chief Technology Officer Integrigy Corporation About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle
More informationAgenda. Sedat Zencirci Technology Sales Consultancy Manager. Oracle Technology Stack. Business Requirements and Oracle offerings
Sedat Zencirci Technology Sales Consultancy Manager Agenda Oracle Technology Stack Oracle Database Oracle Fusion MiddleWare Oracle Applications Business Requirements and Oracle offerings High Availability
More informationdefending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
More informationAll Things Oracle Database Encryption
All Things Oracle Database Encryption January 21, 2016 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda Database Encryption
More informationOracle Database 11g: Administration Workshop I Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Administration Workshop I Release 2 Duration: 5 Days What you will learn This Oracle Database 11g: Administration Workshop I Release 2
More informationNext Generation Solutions for Indian Railways. Sundar Ram VP, Technology Sales Consulting
Next Generation Solutions for Indian Railways Sundar Ram VP, Technology Sales Consulting Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information
More informationOracle Privileged Account Manager 11gR2. Karsten Müller-Corbach karsten.mueller-corbach@oracle.com
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach karsten.mueller-corbach@oracle.com The following is intended to outline our general product direction. It is intended for information purposes
More informationWhat s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
More informationKaseya IT Automation Framework
Kaseya Kaseya IT Automation Framework An Integrated solution designed for reducing complexity while increasing productivity for IT Professionals and Managed Service Providers. The powerful, web-based automation
More informationMaximize Availability With Oracle Database 12c
Maximize Availability With Oracle Database 12c Darl Kuhn DBA darl.kuhn@oracle.com 1 Copyright 2013, Oracle and/or its affiliates. All rights reserved. HA? 2 Copyright 2013, Oracle and/or its affiliates.
More informationOracle Database. Advanced Security Guide 12c Release 1 (12.1) E17729-14
Oracle Database Advanced Security Guide 12c Release 1 (12.1) E17729-14 May 2013 Oracle Database Advanced Security Guide, 12c Release 1 (12.1) E17729-14 Copyright 1996, 2013, Oracle and/or its affiliates.
More informationProviding Self-Service, Life-cycle Management for Databases with VMware vfabric Data Director
Providing Self-Service, Life-cycle Management for Databases with VMware vfabric Data Director Graeme Gordon Senior Systems Engineer, VMware 2013 VMware Inc. All rights reserved Traditional IT Application
More information<Insert Picture Here>
1 Database Technologies for Archiving Kevin Jernigan, Senior Director Product Management Advanced Compression, EHCC, DBFS, SecureFiles, ILM, Database Smart Flash Cache, Total Recall,
More informationHow To Use An Orgs.Org Database With An Orgorora Cloud Management Pack For Database (For Cloud)
ORACLE CLOUD MANAGEMENT PACK FOR ORACLE DATABASE THE INDUSTRY S ONLY COMPLETE SOLUTION FOR DATABASE CLOUD MANAGEMENT. KEY FEATURES Consolidation Planning Out-of-the-box Self Service Portal Enterprise Service
More informationOracle Database: SQL and PL/SQL Fundamentals NEW
Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database: SQL and PL/SQL Fundamentals NEW Duration: 5 Days What you will learn This Oracle Database: SQL and PL/SQL Fundamentals
More informationData-Centric Security vs. Database-Level Security
TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides
More information