How Secure Is Your Data Be Safe, or Be Sorry

Size: px
Start display at page:

Download "How Secure Is Your Data Be Safe, or Be Sorry"

Transcription

1

2 How Secure Is Your Data Be Safe, or Be Sorry John Szlendak Principal Product Manger Oracle ZFS Storage 29 October, 2015 Copyright 2015, Oracle and/or its affiliates. All rights reserved.

3 Focus on Security Copyright 2015, Copyright Oracle 2014, and/or Oracle its affiliates. and/or its All affiliates. rights reserved. All rights reserved. 3

4 Mega Breaches The Past 18 Months 200M Experian Mar M + Code Adobe Oct 13 53M Sony Dec 14 56M Home Depot Sep 14 98M Target Dec M ebay May 14 76M JPMC Oct 14 80M Anthem Feb 15 Attacks Malware SQL Injection 227M SA Banks OCT 13 Credit Cards Vulnerabilities No Encryption No Auditing/Monitoring 20M Credit Bureau 12M Telecom Jan 14 22M Education July 14 Immigration June 14 Personal Records Insider Access Password Theft Zero-day-attacks Poor Access Control No Configuration Control Poor Application Design/patching Copyright Copyright 2015, 2015, Oracle Oracle and/or and/or its its affiliates. All All rights reserved. 4

5 Why Data Security Alarming increases in cyber attacks, data breaches and their cost Over 1 billion records compromised from , now same in just 12 months (Verizon Data Breach Reports) Over 46 days to discover and resolve a data breach (Ponemon Institute Study, 2015) 97% preventable with basic controls & data encryption (Verizon Data Breach Reports) Average data breach cost $3.5M, and $201 per stolen record, and rising (Ponemon Institute, 2014) 45% of Senior Executives say their companies experience cyber attacks hourly or daily (Ponemon Institute, 2015) Cyber crime is $400B today, but could reach $3T in 10 years, if nothing is done (McKinsey Report) Copyright 2015, Oracle and/or its affiliates. All rights reserved.

6 Impact of Data Security Breaches #1 Direct Losses Customer Data Company Data Loss of Customers Employee Data Digital Assets Fines #2 Indirect Losses Loss of Sales/Market Share Negative Brand Impact Competitive Disadvantage Loss of Customer Trust #3 Ongoing Expenses Corruption of Data Recovery Costs Notification Costs Continuity Costs #4 Legal Exposure Regulations Violation Disclosure Requirements Executive Liabilities Lawsuits / Settlements Ever-increasing Risk and Cost! $3.5M avg. data breach cost (Ponemon Institute Study, 2014) Copyright 2015, Oracle and/or its affiliates. All rights reserved. 6

7 What Are You Doing To Secure Your Data Parameter/Network Security Alone is Not Enough Increasing Data Security Incidents and Risks in today s data driven hyper connected world Over 10,000 data breaches last year Over 1 Billion records compromised Billons of dollars in cost and brand damage Billions of new access points to worry about Remote, Mobile, IoT (40 billion by 2020) Copyright 2015, Oracle and/or its affiliates. All rights reserved. 7

8 Oracle Security Inside and Out Parameter Security Not Enough To Protect Your Data Built-in Security At Each Layer of the Stack Governance Risk & Compliance Access & Certification Review, Anomaly Detection, User Provisioning, Entitlements Management Mobile Security, Privileged Users Directory Services, Identity Governance Entitlements Management, Access Management Encryption, Masking, Redaction, Key Management Privileged User Control, Big Data Security, Secure Config Application + User Sandboxing, Delegated Admin Anti-malware system, Data + Network Protection Compliance Reporting, Secured App Lifecycle Secure Live Migration Immutable Zones Independent Control Plane Cryptographic Acceleration Silicon Secured Memory Application Data Integrity, Verified Boot Encryption, Access Controls, Enterprise Key Management, Secured Backup and DR Copyright 2015, Oracle and/or its affiliates. All rights reserved. Oracle Corporation - Confidential 8

9 Oracle Security Inside and Out Parameter Security Not Enough To Protect Your Data Built-in Security At Each Layer of the Stack Where Most Critical Data Resides Biggest data risk targets (IDC) Where Most Data Resides New SPARC M7 Governance Risk & Compliance Access & Certification Review, Anomaly Detection, User Provisioning, Entitlements Management Mobile Security, Privileged Users Directory Services, Identity Governance Entitlements Management, Access Management Encryption, Masking, Redaction, Key Management Privileged User Control, Big Data Security, Secure Config Application + User Sandboxing, Delegated Admin Anti-malware system, Data + Network Protection Compliance Reporting, Secured App Lifecycle Secure Live Migration Immutable Zones Independent Control Plane Cryptographic Acceleration Silicon Secured Memory Application Data Integrity, Verified Boot Encryption, Access Controls, Enterprise Key Management, Secured Backup and DR Copyright 2015, Oracle and/or its affiliates. All rights reserved. Oracle Corporation - Confidential 9

10 Oracle Database Security Maximizing Security for Critical Data Infrastructures PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Key Management Redaction, Masking and Subsetting DB and Privileged User Controls Database Firewall Auditing and Reporting Privilege & Data Discovery Configuration Management Oracle Database security provides Threat Anticipation, Mapping Controls, Data and User Classification Copyright 2015, Oracle and/or its affiliates. All rights reserved. Oracle Public 10

11 Transparent Data Encryption (TDE) Component of Oracle s Advanced Security Encrypted Data Disks Applications Clear Data Backups Exports Off-Site Facilities Encrypts columns or entire application tablespaces Protects the database files on disk, networks and backups* Transparent to applications, no changes required Tight Integration with Oracle DB Compression, RMAN, Data Pump, RAC, ASM, Active Data Guard and Golden Gate Centrally managed encryption keys (Key Vault) * Note: Encrypted data can not be de-duplicated or compressed Copyright 2015, Oracle and/or its affiliates. All rights reserved. 11

12 Preventive Database Security Controls Data Redaction Users ssn:xxx-xx-4321 dob:xx/xx/xxxx Applications DB Controls Dev/Test Partners, BI Access denied Insufficient Privilege Data Encryption Data Subsetting Data Masking Privileged Users Key Vault Region, Year Size-based ssn: dob: 11/11/1111 Copyright 2015, Oracle and/or its affiliates. All rights reserved. Oracle Public 12

13 Oracle ZFS Storage for On-Premise, Private and Public Clouds Copyright 2015, Oracle and/or its affiliates. All rights reserved. 13

14 4 Write SSDs per Tray (max) 2TB DRAM Oracle ZFS Storage Engineered for Extreme Performance, efficiency and security Most Horsepower Possible Dynamic Storage Tiering (HSP) WRITE FLASH 2TB DRAM 80 Cores Processing Power 12.8TB Read Flash 10.5TB Write Flash 10K SAS-2 2TB DRAM 12TB READ FLASH 7.2K SAS-2 10K SAS-2 Adaptive I/O Staging LRU LFU (Evicted) MRU MFU SLC NAND Sync I/O Only Adaptive Throttle Algorithm Determines Pipe Size READ FLASH MLC NAND L2ARC Automated, real-time data migration from DRAM to multi-class flash, to multi-class disk storage Software specifically engineered for multi-level flash and disk storage SAS-2 (15K, 10K, 7K) Copyright 2015, Oracle and/or its affiliates. All rights reserved.

15 ZFS Storage Data Security and Protection Data Integrity Access Security All access authenticated and conducted over secure networks and protocols Use of LDAP, NIS and Active Directory for user identification & authentication Encrypted network communication (SSL/TLS) for replication Access Controls Fine-grained file access and administrative controls based on authorizations and permissions Defined role based authorization controls for user access ACLs for setting access, permissions and limits on files and directories Data Encryption Highly secure two -tier AES 256-bit storage encryption Granular, scalable and highly efficient High availability local and remote key management End-to-End Data Integrity and Protection Advanced checksum protection throughout the data path to eliminate any silent data corruption. Automatic, self healing architecture Fast and efficient backup and DR (unlimited snapshots, intelligent replication) Copyright 2015, Oracle and/or its affiliates. All rights reserved.

16 ZFS Storage Encryption Storage-based Data-at-Rest Encryption for All Data Simple Granular encryption for better efficiency, controls and manageability Project level, Share level or LUN level Easy and flexible to use and manage vis BUI or CLI Allows Encrypted and Clear Text data in same system Secure Strong AES 256-bit encryption keys Integrated local key management Centralized key management (OKM) Two tier encryption key architecture Authorization and access controls Available High Availability architecture DR and Backup support Capacity and drive independent Minimal key latency Copyright 2015, Oracle and/or its affiliates. All rights reserved

17 Centralized Key Management (Oracle Key Manager) Oracle Key Manager T10000 LTO 5 T10000 Oracle DB SL 8500 Enterprise-class OKM 3 system Simple to Install and Operate Automated, policy driven system Server, OS, Application neutral Secure Strong encryption (AES-256-bit) end-to-end Strong key protection mechanisms FIPS compliant Scalable Supports multiple encryption devices Supports up to 1 million keys and 2000 devices (Disk, Tape, Java, Oracle DB, etc.) High Performance Key latency less than 250 milliseconds No storage server CPU cycles used High Availability Clustering up to 20 OKM appliances DR and Backup support for encryption keys Copyright 2015, Oracle and/or its affiliates. All rights reserved. 17

18 ZFS Storage Encryption Benefits Best Performance Data isolation decides which Share to encrypt to get best performance Granularity Storage Efficiency Share level encryption helps optimize storage efficiency Reduced Costs Reduced Risk Strong Authentication Access to encrypted data with LDAP authentication with policy adherence Security Effective Access Control Access Control protects your encrypted data from insider attacks "It is irresponsible for businesses not to encrypt the data," Trent Telford, Covata CEO quote after Anthem s 80M records breach Copyright 2015, Oracle and/or its affiliates. All rights reserved. 18

19 Just Announced: The Most Advanced Platform for Secure Computing First Ever Software in Silicon Architecture M7-16 M7-8 SuperCluster M7 Most Advanced Security World s Fastest Microprocessor T7-1 Wide key encryption and silicon secured memory T7-4 T7-2 Scalability from 32 to 512 cores Copyright 2015 Oracle and/or its affiliates. All rights reserved. 19

20 The Ultimate Software Optimization: Hardware Huge Leap in Security & Performance Over Traditional Processor Architectures Security Encryption Acceleration, Silicon Secured Memory Always-on Encryption Always-on Memory Intrusion Protection * * Stops malicious programs from accessing other application memory. Ex: HeartBleed, Venom Software in Silicon SPARC M7 Efficiency In-line Decompression Performance In-Memory Query Acceleration Revolution, Not Evolution! 10X faster Copyright 2015 Oracle and/or its affiliates. All rights reserved.

21 Designed for Security The Most Complete Set of Encryption Standards 15 Software-in-Silicon Crypto Algorithms With 25 user level crypto instructions 32 Crypto Accelerators per Processor To Accelerate: Asymmetric (Public Key Encryption) Symmetric Key (Bulk Encryption) Message Digest (Hash Functions) Clear Data In M7 Core AES Camillia CRC32c DES 3DES DH DSA ECC MD5 RSA SHA-1 SHA-244 SHA-256 SHA-384 SHA-512 Encrypted Data Out Copyright 2014, Oracle and/or its affiliates. All rights reserved. 21

22 Security in Silicon: Encryption Acceleration Secure Multi-Tier Enterprise Database and Java Performance Delivered Secure Nominal Performance Impact Zero Additional Hardware Cost Unprotected Near Zero Performance Difference Copyright 2014, Oracle and/or its affiliates. All rights reserved. 22

23 Cyber Attacks and Data Breaches Things you need to know 1. Cyber crime is accelerating, so is its cost and risk Bad guy are getting much more sophisticated and persistent 2. Don t assume it won t happen to you It will Even the CIA (US) got hacked and 20M personnel records compromised Most larger companies have already been hacked, many don t yet know (NSA) 3. Parameter/Network Security alone can not protect your data. It needs to be secured inside out Architected and built-in into every layer of the compute stack to protect your data inside, and not just the parameter outside Copyright 2015, Oracle and/or its affiliates. All rights reserved. 23

24 Data Security Is Critical.. On-Premise or In The Cloud Provides industry s most comprehensive and secure cloud offering Provides highest performance, most efficient and secure storage, architected for both on premise and the cloud Integrates end-to-end data security across ALL layers of the compute stack and the cloud SECURING THE COMPLETE STACK AND YOUR DATA INSIDE OUT SAVES TIME, MONEY AND REDUCES RISK Copyright 2015, Oracle and/or its affiliates. All rights reserved. 24

25 Thank You Copyright 2015 Oracle and/or its affiliates. All rights reserved. 25

26

Safe Harbor Statement

Safe Harbor Statement Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information

More information

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Protecting Sensitive Data Reducing Risk with Oracle Database Security Protecting Sensitive Data Reducing Risk with Oracle Database Security Antonio.Mata.Gomez@oracle.com Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Security Inside Out Latest Innovations in Oracle Database 12c Jukka Männistö Database Architect Oracle Nordic Coretech Presales The 1995-2014 Security Landscape Regulatory Landscape HIPAA, SOX (2002),

More information

Securing Data in Oracle Database 12c

Securing Data in Oracle Database 12c Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 Oracle Database Security Advanced Security Option Thanos Terentes Printzios DB & Options Specialist A&C Technology Adoption Office Oracle Partner Business Development, ECEMEA 2 What is a customers INFORMATION

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Solutions for securing and auditing Oracle database Edgars Ruņģis Technology Consultant Why Are Databases Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Enterprises

More information

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security Oracle Database Security Paul Needham Senior Director, Product Management Database Security Safe Harbor Statement The following is intended to outline our general product direction. It is intended for

More information

Oracle Database 12c Plug In. Switch On. Get SMART.

Oracle Database 12c Plug In. Switch On. Get SMART. Oracle Database 12c Plug In. Switch On. Get SMART. Duncan Harvey Head of Core Technology, Oracle EMEA March 2015 Safe Harbor Statement The following is intended to outline our general product direction.

More information

MySQL Security: Best Practices

MySQL Security: Best Practices MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

Oracle Database - Engineered for Innovation. Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya

Oracle Database - Engineered for Innovation. Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya Oracle Database - Engineered for Innovation Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya Oracle Database 11g Release 2 Shipping since September 2009 11.2.0.3 Patch Set now

More information

Forthcoming EU Data Protection Law

Forthcoming EU Data Protection Law Forthcoming EU Data Protection Law How Oracle can Help Patrick McLaughlin Security Architect & Oracle Fellow EMEA Technology Solutions 22 October 2015, Riga Copyright 2014 Oracle and/or its affiliates.

More information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Copyright 2014 Oracle and/or its affiliates. All rights reserved. Copyright 2014 Oracle and/or its affiliates. All rights reserved. Oracle Data Masking and Subsetting Oracle Advanced Security Best Practices for Database Encryption and Redaction Todd Bottger Sr. Principal

More information

Data-Centric Security vs. Database-Level Security

Data-Centric Security vs. Database-Level Security TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides

More information

Securing Your Data at Rest With Encryption

Securing Your Data at Rest With Encryption Securing Your Data at Rest With Encryption Session 15913 Steve Aaker Sr. Principal Product Strategy Manager Why encryption? Confidential Data Intellectual Property Personally Identifiable Information (PII)

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any

More information

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data

Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into 1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any

More information

Oracle Database Public Cloud Services

Oracle Database Public Cloud Services Oracle Database Public Cloud Services A Strategy and Technology Overview Bob Zeolla Principal Sales Consultant Oracle Education & Research November 23, 2015 Safe Harbor Statement The following is intended

More information

Oracle Solaris: Aktueller Stand und Ausblick

Oracle Solaris: Aktueller Stand und Ausblick Oracle Solaris: Aktueller Stand und Ausblick Detlef Drewanz Principal Sales Consultant, EMEA Server Presales The following is intended to outline our general product direction. It

More information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Preview of Oracle Database 12c In-Memory Option. Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Preview of Oracle Database 12c In-Memory Option. Copyright 2013, Oracle and/or its affiliates. All rights reserved. Preview of Oracle Database 12c In-Memory Option 1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any

More information

Oracle Maximum Availability Architecture with Exadata Database Machine. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Oracle Maximum Availability Architecture with Exadata Database Machine. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska Oracle Maximum Availability Architecture with Exadata Database Machine Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska MAA is Oracle s Availability Blueprint Oracle s MAA is a best practices

More information

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud

Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud 1 Contents The Obligation to Protect Patient Data in the Cloud................................................... Complying with the HIPAA

More information

An Oracle White Paper October 2013. Realizing the Superior Value and Performance of Oracle ZFS Storage Appliance

An Oracle White Paper October 2013. Realizing the Superior Value and Performance of Oracle ZFS Storage Appliance An Oracle White Paper October 2013 Realizing the Superior Value and Performance of Oracle ZFS Storage Appliance Executive Overview... 2 Introduction... 3 Delivering Superior Performance at a Lower Price...

More information

Security It s an ecosystem thing

Security It s an ecosystem thing Security It s an ecosystem thing Joseph Alhadeff Vice President Global Public Policy, Chief Privacy Strategist The Security challenge in the before time. Today s Threat Environment

More information

How To Encrypt On Anor Zfs Storage Appliance

How To Encrypt On Anor Zfs Storage Appliance An Oracle Technical White Paper November 2014 Best Practices for Deploying Encryption and Managing Its Keys on the Oracle ZFS Storage Appliance Table of Contents Introduction...4 Why Employing Encryption

More information

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such

More information

Database Security Questions HOUG 2016. Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

Database Security Questions HOUG 2016. Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved. Database Security Questions HOUG 2016 Fehér Lajos 1 How Data Gets Compromised? Source: Verizon Data Breach Investigations Report Copyright 2015, Oracle and/or 2its affiliates. All rights reserved. Where

More information

<Insert Picture Here>

<Insert Picture Here> 1 Database Technologies for Archiving Kevin Jernigan, Senior Director Product Management Advanced Compression, EHCC, DBFS, SecureFiles, ILM, Database Smart Flash Cache, Total Recall,

More information

Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution

Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution Jonathan Halstuch, COO, RackTop Systems JHalstuch@racktopsystems.com Big Data Invasion We hear so much on Big Data and

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant

Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File

More information

Maximize your Engineered Systems

Maximize your Engineered Systems Maximize your Engineered Systems Jan Poos Principal Sales Consultant EMEA Disk BU @JanStorage Safe Harbor Statement The following is intended to outline our general product direction. It is intended for

More information

Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Copyright 2014 Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment

More information

F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security

F5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security F5 and Oracle Database Solution Guide Solutions to optimize the network for database operations, replication, scalability, and security Features >> Improved operations and agility >> Global scaling Use

More information

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information

More information

Decrypting Enterprise Storage Security

Decrypting Enterprise Storage Security Industry Trends and Technology Perspective White Paper Trends and options for securing enterprise data and storage By Greg Schulz Founder and Senior Analyst, the StorageIO Group December 11 th, 2006 With

More information

INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT

INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT UNPRECEDENTED OBSERVABILITY, COST-SAVING PERFORMANCE ACCELERATION, AND SUPERIOR DATA PROTECTION KEY FEATURES Unprecedented observability

More information

An Oracle White Paper June 2013. Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security

An Oracle White Paper June 2013. Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security An Oracle White Paper June 2013 Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security Introduction... 1 Preventing Database Bypass with Encryption... 2 Oracle Advanced Security

More information

Agenda. Sedat Zencirci Technology Sales Consultancy Manager. Oracle Technology Stack. Business Requirements and Oracle offerings

Agenda. Sedat Zencirci Technology Sales Consultancy Manager. Oracle Technology Stack. Business Requirements and Oracle offerings Sedat Zencirci Technology Sales Consultancy Manager Agenda Oracle Technology Stack Oracle Database Oracle Fusion MiddleWare Oracle Applications Business Requirements and Oracle offerings High Availability

More information

IT SERVICE MANAGEMENT FAQ

IT SERVICE MANAGEMENT FAQ IT SERVICE MANAGEMENT FAQ Version: 1.3 Date: February 2011 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Data Stewardship... 4 2.1 Where is the data stored?... 4 2.2 Who controls the data?... 4 2.2

More information

Availability for the modern datacentre

Availability for the modern datacentre Availability for the modern datacentre Veeam Availability Suite v8 Mohamad Rizk Presales Consultant Middle East mohamad.rizk@veeam.com Veeam is built for virtualization Founded in 2006, Global company

More information

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com

Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com Cloud Security Case Study Amazon Web Services Ugo Piazzalunga Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com Agenda 1. Amazon Web Services challenge 2. Virtual Instances and Virtual Storage

More information

Data platform evolution

Data platform evolution 2 Data platform evolution Top Reasons Reasons to to upgrade 1) End of extended support 2) Enhanced SQL Server 2014 features and performance 3) Impact on security and compliance 4) Cloud strategy Top Blockers

More information

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets

Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets WHITE PAPER Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 Introduction... 3 The Solution... 3 The

More information

Complying with PCI Data Security

Complying with PCI Data Security Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring

More information

Dell Software. Jiří Svatuška

Dell Software. Jiří Svatuška Dell Software Jiří Svatuška Servers, storage and network Dell Software offerings Software is an important part of Dell solutions Services Client devices Dell Software portfolio - What we offer Transform

More information

Oracle Cloud Update November 2, 2015. Eric Frank Oracle Sales Consultant. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Oracle Cloud Update November 2, 2015. Eric Frank Oracle Sales Consultant. Copyright 2014 Oracle and/or its affiliates. All rights reserved. Oracle Cloud Update November 2, 2015 Eric Frank Oracle Sales Consultant Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes

More information

ORACLE DATABASE 10G ENTERPRISE EDITION

ORACLE DATABASE 10G ENTERPRISE EDITION ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.

More information

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption

Transparent Data Encryption: New Technologies and Best Practices for Database Encryption Sponsored by Oracle : New Technologies and Best Practices for Database Encryption A SANS Whitepaper April 2010 Written by Tanya Baccam, SANS senior instructor and course author for SEC509: Oracle Database

More information

FIFTH EDITION. Oracle Essentials. Rick Greenwald, Robert Stackowiak, and. Jonathan Stern O'REILLY" Tokyo. Koln Sebastopol. Cambridge Farnham.

FIFTH EDITION. Oracle Essentials. Rick Greenwald, Robert Stackowiak, and. Jonathan Stern O'REILLY Tokyo. Koln Sebastopol. Cambridge Farnham. FIFTH EDITION Oracle Essentials Rick Greenwald, Robert Stackowiak, and Jonathan Stern O'REILLY" Beijing Cambridge Farnham Koln Sebastopol Tokyo _ Table of Contents Preface xiii 1. Introducing Oracle 1

More information

With Great Power comes Great Responsibility: Managing Privileged Users

With Great Power comes Great Responsibility: Managing Privileged Users With Great Power comes Great Responsibility: Managing Privileged Users Darren Harmer Senior Systems Engineer Agenda What is a Privileged User Privileged User Why is it important? Security Intelligence

More information

REDUCE RISK WITH ORACLE SOLARIS 11

REDUCE RISK WITH ORACLE SOLARIS 11 REDUCE RISK WITH ORACLE SOLARIS 11 MITIGATE RISKS WITH INTELLIGENT SECURITY CONTROLS KEY FEATURES Security in Silicon: Hardware-integrated cryptographic acceleration to protect both data and network. Reduce

More information

An Oracle White Paper November 2010. Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager

An Oracle White Paper November 2010. Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager An Oracle White Paper November 2010 Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager Introduction...2 Oracle Backup and Recovery Solution Overview...3 Oracle Recovery

More information

WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression

WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA

More information

Oracle Cloud Computing Strategy

Oracle Cloud Computing Strategy Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended

More information

BM482E Introduction to Computer Security

BM482E Introduction to Computer Security BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based

More information

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved. MySQL Strategy Morten Andersen, MySQL Enterprise Sales Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not

More information

Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E 2 0 15

Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E 2 0 15 Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E 2 0 15 Table of Contents Fully Integrated Hardware and Software

More information

An Oracle White Paper July 2014. Oracle ACFS

An Oracle White Paper July 2014. Oracle ACFS An Oracle White Paper July 2014 Oracle ACFS 1 Executive Overview As storage requirements double every 18 months, Oracle customers continue to deal with complex storage management challenges in their data

More information

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector

More information

I ve been breached! Now what?

I ve been breached! Now what? I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have

More information

SQL Server Encryption Overview. September 2, 2015

SQL Server Encryption Overview. September 2, 2015 SQL Server Encryption Overview September 2, 2015 ABOUT ME Edmund Poillion Data Platform Systems Engineer Skyline Associate since 1999 Started in App Dev, changed focus to SQL Server in 2012 Email: epoillion@skylinetechnologies.com

More information

Introduction to Database as a Service

Introduction to Database as a Service Introduction to Database as a Service Exadata Platform Revised 8/1/13 Database as a Service (DBaaS) Starts With The Business Needs Establish an IT delivery model that reduces costs, meets demand, and fulfills

More information

Agio Managed Backup FLEXIBILITY RELIABILITY TRANSPARENCY SECURITY. CONTACT SALES (877) 780 2446 agio.com

Agio Managed Backup FLEXIBILITY RELIABILITY TRANSPARENCY SECURITY. CONTACT SALES (877) 780 2446 agio.com Agio Managed Backup Your data is the lifeblood of your business. Protecting it is priority #1. However rapid data growth, virtualization, and increasing cybersecurity threats have irrevocably changed the

More information

An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy

More information

Oracle Database Cloud Exadata Service

Oracle Database Cloud Exadata Service Oracle Database Cloud Exadata Service Exadata Performance, Cloud Simplicity The Oracle Database Cloud - Exadata Service (Exadata Service) delivers the world s best Cloud Database Platform by combining

More information

Crittografia e Enterprise Key Management una sfida possibile da affrontare

Crittografia e Enterprise Key Management una sfida possibile da affrontare Crittografia e Enterprise Key Management una sfida possibile da affrontare Giuseppe Russo Oracle Chief Technologist giuseppe.russo@oracle.com Simone Mola SafeNet Sales Engineer simone.mola@safenet-inc.com

More information

SafeNet DataSecure vs. Native Oracle Encryption

SafeNet DataSecure vs. Native Oracle Encryption SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises

More information

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions

EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...

More information

<Insert Picture Here> Oracle Database Security Overview

<Insert Picture Here> Oracle Database Security Overview Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager tammy.bednar@oracle.com Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory

More information

Availability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9

Availability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9 Veeam Summer School Availability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9 Jan van Leuken System Engineer Benelux, Veeam Software jan.vanleuken@veeam.com +31 (0)615 83 50

More information

Oracle Database Security

Oracle Database Security Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches

More information

Password Management Evaluation Guide for Businesses

Password Management Evaluation Guide for Businesses Password Management Evaluation Guide for Businesses White Paper 2016 Executive Summary Passwords and the need for effective password management are at the heart of the rise in costly data breaches. Various

More information

Data Security: Strategy and Tactics for Success

Data Security: Strategy and Tactics for Success Data Security: Strategy and Tactics for Success DatabaseVisions,Inc. Fairfax, Va Oracle Gold Partner Solution Provider Oracle Security Specialized www.databasevisions.com Overview Cloud Computing presents

More information

Safe Harbor Statement

Safe Harbor Statement Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Backup & Recovery: Time is Never an Ally

Backup & Recovery: Time is Never an Ally Backup & Recovery: Time is Never an Ally Chris Schin Zetta VP Products February 2012 Why do you do backups? Degree of difficulty Site disaster Frequency of Occurrence Server recovery Revert to older file

More information

Oracle Cloud Strategy. Sudip Datta Vice President of Product Management

Oracle Cloud Strategy. Sudip Datta Vice President of Product Management Oracle Cloud Strategy Sudip Datta Vice President of Product Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

<Insert Picture Here> Managing Storage in Private Clouds with Oracle Cloud File System OOW 2011 presentation

<Insert Picture Here> Managing Storage in Private Clouds with Oracle Cloud File System OOW 2011 presentation Managing Storage in Private Clouds with Oracle Cloud File System OOW 2011 presentation What We ll Cover Today Managing data growth Private Cloud definitions Oracle Cloud Storage architecture

More information

Intelligent Security Design, Development and Acquisition

Intelligent Security Design, Development and Acquisition PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New

More information

<Insert Picture Here> Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region

<Insert Picture Here> Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region 1977 Oracle Database 30 Years of Sustained Innovation Database Vault Transparent Data Encryption

More information

Securing Data on Microsoft SQL Server 2012

Securing Data on Microsoft SQL Server 2012 Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to

More information

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message

More information

Optimizing Storage for Better TCO in Oracle Environments. Part 1: Management INFOSTOR. Executive Brief

Optimizing Storage for Better TCO in Oracle Environments. Part 1: Management INFOSTOR. Executive Brief Optimizing Storage for Better TCO in Oracle Environments INFOSTOR Executive Brief a QuinStreet Excutive Brief. 2012 To the casual observer, and even to business decision makers who don t work in information

More information

PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.

PLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality. PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and

More information

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey

GoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With

More information

Veeam Summer School. Thomas Zaatman Veeam Software

Veeam Summer School. Thomas Zaatman Veeam Software Veeam Summer School Thomas Zaatman Veeam Software Availability for the your modern datacentre modern datacenter Veeam Availability Suite v8 Welcome to Veeam Veeam was founded in 2006 Exponential revenue

More information

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?

More information

<Insert Picture Here> Oracle Cloud Storage. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

<Insert Picture Here> Oracle Cloud Storage. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska Oracle Cloud Storage Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska Oracle Cloud Storage Automatic Storage Management (ASM) Oracle Cloud File System ASM Dynamic

More information

Addressing Cyber Security in Oracle Utilities Applications

Addressing Cyber Security in Oracle Utilities Applications Addressing Cyber Security in Oracle Utilities Applications Anthony Shorten Principal Product Manager Oracle Utilities Global Business Unit Sept, 2014 Safe Harbor Statement The following is intended to

More information

Oracle Database Backups and Disaster Recovery @ Autodesk

Oracle Database Backups and Disaster Recovery @ Autodesk Oracle Database Backups and Disaster Recovery @ Autodesk Alan Williams Database Design Engineer Who We Are Autodesk software, suites, and cloud technology help customers design, visualize, and simulate

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Availability for your modern datacenter

Availability for your modern datacenter Availability for your modern datacenter - Agentless backup and replication for VMware and Hyper-V - Scalable, powerful, easy-to-use, affordable Veeam Availability protection for the Always-On Business

More information

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules

Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g

More information