How Secure Is Your Data Be Safe, or Be Sorry
|
|
- Lesley White
- 8 years ago
- Views:
Transcription
1
2 How Secure Is Your Data Be Safe, or Be Sorry John Szlendak Principal Product Manger Oracle ZFS Storage 29 October, 2015 Copyright 2015, Oracle and/or its affiliates. All rights reserved.
3 Focus on Security Copyright 2015, Copyright Oracle 2014, and/or Oracle its affiliates. and/or its All affiliates. rights reserved. All rights reserved. 3
4 Mega Breaches The Past 18 Months 200M Experian Mar M + Code Adobe Oct 13 53M Sony Dec 14 56M Home Depot Sep 14 98M Target Dec M ebay May 14 76M JPMC Oct 14 80M Anthem Feb 15 Attacks Malware SQL Injection 227M SA Banks OCT 13 Credit Cards Vulnerabilities No Encryption No Auditing/Monitoring 20M Credit Bureau 12M Telecom Jan 14 22M Education July 14 Immigration June 14 Personal Records Insider Access Password Theft Zero-day-attacks Poor Access Control No Configuration Control Poor Application Design/patching Copyright Copyright 2015, 2015, Oracle Oracle and/or and/or its its affiliates. All All rights reserved. 4
5 Why Data Security Alarming increases in cyber attacks, data breaches and their cost Over 1 billion records compromised from , now same in just 12 months (Verizon Data Breach Reports) Over 46 days to discover and resolve a data breach (Ponemon Institute Study, 2015) 97% preventable with basic controls & data encryption (Verizon Data Breach Reports) Average data breach cost $3.5M, and $201 per stolen record, and rising (Ponemon Institute, 2014) 45% of Senior Executives say their companies experience cyber attacks hourly or daily (Ponemon Institute, 2015) Cyber crime is $400B today, but could reach $3T in 10 years, if nothing is done (McKinsey Report) Copyright 2015, Oracle and/or its affiliates. All rights reserved.
6 Impact of Data Security Breaches #1 Direct Losses Customer Data Company Data Loss of Customers Employee Data Digital Assets Fines #2 Indirect Losses Loss of Sales/Market Share Negative Brand Impact Competitive Disadvantage Loss of Customer Trust #3 Ongoing Expenses Corruption of Data Recovery Costs Notification Costs Continuity Costs #4 Legal Exposure Regulations Violation Disclosure Requirements Executive Liabilities Lawsuits / Settlements Ever-increasing Risk and Cost! $3.5M avg. data breach cost (Ponemon Institute Study, 2014) Copyright 2015, Oracle and/or its affiliates. All rights reserved. 6
7 What Are You Doing To Secure Your Data Parameter/Network Security Alone is Not Enough Increasing Data Security Incidents and Risks in today s data driven hyper connected world Over 10,000 data breaches last year Over 1 Billion records compromised Billons of dollars in cost and brand damage Billions of new access points to worry about Remote, Mobile, IoT (40 billion by 2020) Copyright 2015, Oracle and/or its affiliates. All rights reserved. 7
8 Oracle Security Inside and Out Parameter Security Not Enough To Protect Your Data Built-in Security At Each Layer of the Stack Governance Risk & Compliance Access & Certification Review, Anomaly Detection, User Provisioning, Entitlements Management Mobile Security, Privileged Users Directory Services, Identity Governance Entitlements Management, Access Management Encryption, Masking, Redaction, Key Management Privileged User Control, Big Data Security, Secure Config Application + User Sandboxing, Delegated Admin Anti-malware system, Data + Network Protection Compliance Reporting, Secured App Lifecycle Secure Live Migration Immutable Zones Independent Control Plane Cryptographic Acceleration Silicon Secured Memory Application Data Integrity, Verified Boot Encryption, Access Controls, Enterprise Key Management, Secured Backup and DR Copyright 2015, Oracle and/or its affiliates. All rights reserved. Oracle Corporation - Confidential 8
9 Oracle Security Inside and Out Parameter Security Not Enough To Protect Your Data Built-in Security At Each Layer of the Stack Where Most Critical Data Resides Biggest data risk targets (IDC) Where Most Data Resides New SPARC M7 Governance Risk & Compliance Access & Certification Review, Anomaly Detection, User Provisioning, Entitlements Management Mobile Security, Privileged Users Directory Services, Identity Governance Entitlements Management, Access Management Encryption, Masking, Redaction, Key Management Privileged User Control, Big Data Security, Secure Config Application + User Sandboxing, Delegated Admin Anti-malware system, Data + Network Protection Compliance Reporting, Secured App Lifecycle Secure Live Migration Immutable Zones Independent Control Plane Cryptographic Acceleration Silicon Secured Memory Application Data Integrity, Verified Boot Encryption, Access Controls, Enterprise Key Management, Secured Backup and DR Copyright 2015, Oracle and/or its affiliates. All rights reserved. Oracle Corporation - Confidential 9
10 Oracle Database Security Maximizing Security for Critical Data Infrastructures PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Key Management Redaction, Masking and Subsetting DB and Privileged User Controls Database Firewall Auditing and Reporting Privilege & Data Discovery Configuration Management Oracle Database security provides Threat Anticipation, Mapping Controls, Data and User Classification Copyright 2015, Oracle and/or its affiliates. All rights reserved. Oracle Public 10
11 Transparent Data Encryption (TDE) Component of Oracle s Advanced Security Encrypted Data Disks Applications Clear Data Backups Exports Off-Site Facilities Encrypts columns or entire application tablespaces Protects the database files on disk, networks and backups* Transparent to applications, no changes required Tight Integration with Oracle DB Compression, RMAN, Data Pump, RAC, ASM, Active Data Guard and Golden Gate Centrally managed encryption keys (Key Vault) * Note: Encrypted data can not be de-duplicated or compressed Copyright 2015, Oracle and/or its affiliates. All rights reserved. 11
12 Preventive Database Security Controls Data Redaction Users ssn:xxx-xx-4321 dob:xx/xx/xxxx Applications DB Controls Dev/Test Partners, BI Access denied Insufficient Privilege Data Encryption Data Subsetting Data Masking Privileged Users Key Vault Region, Year Size-based ssn: dob: 11/11/1111 Copyright 2015, Oracle and/or its affiliates. All rights reserved. Oracle Public 12
13 Oracle ZFS Storage for On-Premise, Private and Public Clouds Copyright 2015, Oracle and/or its affiliates. All rights reserved. 13
14 4 Write SSDs per Tray (max) 2TB DRAM Oracle ZFS Storage Engineered for Extreme Performance, efficiency and security Most Horsepower Possible Dynamic Storage Tiering (HSP) WRITE FLASH 2TB DRAM 80 Cores Processing Power 12.8TB Read Flash 10.5TB Write Flash 10K SAS-2 2TB DRAM 12TB READ FLASH 7.2K SAS-2 10K SAS-2 Adaptive I/O Staging LRU LFU (Evicted) MRU MFU SLC NAND Sync I/O Only Adaptive Throttle Algorithm Determines Pipe Size READ FLASH MLC NAND L2ARC Automated, real-time data migration from DRAM to multi-class flash, to multi-class disk storage Software specifically engineered for multi-level flash and disk storage SAS-2 (15K, 10K, 7K) Copyright 2015, Oracle and/or its affiliates. All rights reserved.
15 ZFS Storage Data Security and Protection Data Integrity Access Security All access authenticated and conducted over secure networks and protocols Use of LDAP, NIS and Active Directory for user identification & authentication Encrypted network communication (SSL/TLS) for replication Access Controls Fine-grained file access and administrative controls based on authorizations and permissions Defined role based authorization controls for user access ACLs for setting access, permissions and limits on files and directories Data Encryption Highly secure two -tier AES 256-bit storage encryption Granular, scalable and highly efficient High availability local and remote key management End-to-End Data Integrity and Protection Advanced checksum protection throughout the data path to eliminate any silent data corruption. Automatic, self healing architecture Fast and efficient backup and DR (unlimited snapshots, intelligent replication) Copyright 2015, Oracle and/or its affiliates. All rights reserved.
16 ZFS Storage Encryption Storage-based Data-at-Rest Encryption for All Data Simple Granular encryption for better efficiency, controls and manageability Project level, Share level or LUN level Easy and flexible to use and manage vis BUI or CLI Allows Encrypted and Clear Text data in same system Secure Strong AES 256-bit encryption keys Integrated local key management Centralized key management (OKM) Two tier encryption key architecture Authorization and access controls Available High Availability architecture DR and Backup support Capacity and drive independent Minimal key latency Copyright 2015, Oracle and/or its affiliates. All rights reserved
17 Centralized Key Management (Oracle Key Manager) Oracle Key Manager T10000 LTO 5 T10000 Oracle DB SL 8500 Enterprise-class OKM 3 system Simple to Install and Operate Automated, policy driven system Server, OS, Application neutral Secure Strong encryption (AES-256-bit) end-to-end Strong key protection mechanisms FIPS compliant Scalable Supports multiple encryption devices Supports up to 1 million keys and 2000 devices (Disk, Tape, Java, Oracle DB, etc.) High Performance Key latency less than 250 milliseconds No storage server CPU cycles used High Availability Clustering up to 20 OKM appliances DR and Backup support for encryption keys Copyright 2015, Oracle and/or its affiliates. All rights reserved. 17
18 ZFS Storage Encryption Benefits Best Performance Data isolation decides which Share to encrypt to get best performance Granularity Storage Efficiency Share level encryption helps optimize storage efficiency Reduced Costs Reduced Risk Strong Authentication Access to encrypted data with LDAP authentication with policy adherence Security Effective Access Control Access Control protects your encrypted data from insider attacks "It is irresponsible for businesses not to encrypt the data," Trent Telford, Covata CEO quote after Anthem s 80M records breach Copyright 2015, Oracle and/or its affiliates. All rights reserved. 18
19 Just Announced: The Most Advanced Platform for Secure Computing First Ever Software in Silicon Architecture M7-16 M7-8 SuperCluster M7 Most Advanced Security World s Fastest Microprocessor T7-1 Wide key encryption and silicon secured memory T7-4 T7-2 Scalability from 32 to 512 cores Copyright 2015 Oracle and/or its affiliates. All rights reserved. 19
20 The Ultimate Software Optimization: Hardware Huge Leap in Security & Performance Over Traditional Processor Architectures Security Encryption Acceleration, Silicon Secured Memory Always-on Encryption Always-on Memory Intrusion Protection * * Stops malicious programs from accessing other application memory. Ex: HeartBleed, Venom Software in Silicon SPARC M7 Efficiency In-line Decompression Performance In-Memory Query Acceleration Revolution, Not Evolution! 10X faster Copyright 2015 Oracle and/or its affiliates. All rights reserved.
21 Designed for Security The Most Complete Set of Encryption Standards 15 Software-in-Silicon Crypto Algorithms With 25 user level crypto instructions 32 Crypto Accelerators per Processor To Accelerate: Asymmetric (Public Key Encryption) Symmetric Key (Bulk Encryption) Message Digest (Hash Functions) Clear Data In M7 Core AES Camillia CRC32c DES 3DES DH DSA ECC MD5 RSA SHA-1 SHA-244 SHA-256 SHA-384 SHA-512 Encrypted Data Out Copyright 2014, Oracle and/or its affiliates. All rights reserved. 21
22 Security in Silicon: Encryption Acceleration Secure Multi-Tier Enterprise Database and Java Performance Delivered Secure Nominal Performance Impact Zero Additional Hardware Cost Unprotected Near Zero Performance Difference Copyright 2014, Oracle and/or its affiliates. All rights reserved. 22
23 Cyber Attacks and Data Breaches Things you need to know 1. Cyber crime is accelerating, so is its cost and risk Bad guy are getting much more sophisticated and persistent 2. Don t assume it won t happen to you It will Even the CIA (US) got hacked and 20M personnel records compromised Most larger companies have already been hacked, many don t yet know (NSA) 3. Parameter/Network Security alone can not protect your data. It needs to be secured inside out Architected and built-in into every layer of the compute stack to protect your data inside, and not just the parameter outside Copyright 2015, Oracle and/or its affiliates. All rights reserved. 23
24 Data Security Is Critical.. On-Premise or In The Cloud Provides industry s most comprehensive and secure cloud offering Provides highest performance, most efficient and secure storage, architected for both on premise and the cloud Integrates end-to-end data security across ALL layers of the compute stack and the cloud SECURING THE COMPLETE STACK AND YOUR DATA INSIDE OUT SAVES TIME, MONEY AND REDUCES RISK Copyright 2015, Oracle and/or its affiliates. All rights reserved. 24
25 Thank You Copyright 2015 Oracle and/or its affiliates. All rights reserved. 25
26
Safe Harbor Statement
Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
More informationProtecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security Antonio.Mata.Gomez@oracle.com Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside Out Latest Innovations in Oracle Database 12c Jukka Männistö Database Architect Oracle Nordic Coretech Presales The 1995-2014 Security Landscape Regulatory Landscape HIPAA, SOX (2002),
More informationSecuring Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Oracle Database Security Advanced Security Option Thanos Terentes Printzios DB & Options Specialist A&C Technology Adoption Office Oracle Partner Business Development, ECEMEA 2 What is a customers INFORMATION
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Solutions for securing and auditing Oracle database Edgars Ruņģis Technology Consultant Why Are Databases Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Enterprises
More informationOracle Database Security. Paul Needham Senior Director, Product Management Database Security
Oracle Database Security Paul Needham Senior Director, Product Management Database Security Safe Harbor Statement The following is intended to outline our general product direction. It is intended for
More informationOracle Database 12c Plug In. Switch On. Get SMART.
Oracle Database 12c Plug In. Switch On. Get SMART. Duncan Harvey Head of Core Technology, Oracle EMEA March 2015 Safe Harbor Statement The following is intended to outline our general product direction.
More informationMySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationOracle Database - Engineered for Innovation. Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya
Oracle Database - Engineered for Innovation Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya Oracle Database 11g Release 2 Shipping since September 2009 11.2.0.3 Patch Set now
More informationForthcoming EU Data Protection Law
Forthcoming EU Data Protection Law How Oracle can Help Patrick McLaughlin Security Architect & Oracle Fellow EMEA Technology Solutions 22 October 2015, Riga Copyright 2014 Oracle and/or its affiliates.
More information1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
More informationCopyright 2014 Oracle and/or its affiliates. All rights reserved.
Copyright 2014 Oracle and/or its affiliates. All rights reserved. Oracle Data Masking and Subsetting Oracle Advanced Security Best Practices for Database Encryption and Redaction Todd Bottger Sr. Principal
More informationData-Centric Security vs. Database-Level Security
TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides
More informationSecuring Your Data at Rest With Encryption
Securing Your Data at Rest With Encryption Session 15913 Steve Aaker Sr. Principal Product Strategy Manager Why encryption? Confidential Data Intellectual Property Personally Identifiable Information (PII)
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
More informationOracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data
Oracle Solaris Security: Mitigate Risk by Isolating Users, Applications, and Data Will Fiveash presenter, Darren Moffat author Staff Engineer Solaris Kerberos Development Safe Harbor Statement The following
More informationThe following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
More informationOracle Database Public Cloud Services
Oracle Database Public Cloud Services A Strategy and Technology Overview Bob Zeolla Principal Sales Consultant Oracle Education & Research November 23, 2015 Safe Harbor Statement The following is intended
More informationOracle Solaris: Aktueller Stand und Ausblick
Oracle Solaris: Aktueller Stand und Ausblick Detlef Drewanz Principal Sales Consultant, EMEA Server Presales The following is intended to outline our general product direction. It
More information1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
More informationHost Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
More informationPreview of Oracle Database 12c In-Memory Option. Copyright 2013, Oracle and/or its affiliates. All rights reserved.
Preview of Oracle Database 12c In-Memory Option 1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
More informationOracle Maximum Availability Architecture with Exadata Database Machine. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska
Oracle Maximum Availability Architecture with Exadata Database Machine Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska MAA is Oracle s Availability Blueprint Oracle s MAA is a best practices
More informationUsing Data Encryption to Achieve HIPAA Safe Harbor in the Cloud
Using Data Encryption to Achieve HIPAA Safe Harbor in the Cloud 1 Contents The Obligation to Protect Patient Data in the Cloud................................................... Complying with the HIPAA
More informationAn Oracle White Paper October 2013. Realizing the Superior Value and Performance of Oracle ZFS Storage Appliance
An Oracle White Paper October 2013 Realizing the Superior Value and Performance of Oracle ZFS Storage Appliance Executive Overview... 2 Introduction... 3 Delivering Superior Performance at a Lower Price...
More informationSecurity It s an ecosystem thing
Security It s an ecosystem thing Joseph Alhadeff Vice President Global Public Policy, Chief Privacy Strategist The Security challenge in the before time. Today s Threat Environment
More informationHow To Encrypt On Anor Zfs Storage Appliance
An Oracle Technical White Paper November 2014 Best Practices for Deploying Encryption and Managing Its Keys on the Oracle ZFS Storage Appliance Table of Contents Introduction...4 Why Employing Encryption
More informationnwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.
CONTENTS 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4. Conclusion 1. EXECUTIVE SUMMARY The advantages of networked data storage technologies such
More informationDatabase Security Questions HOUG 2016. Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.
Database Security Questions HOUG 2016 Fehér Lajos 1 How Data Gets Compromised? Source: Verizon Data Breach Investigations Report Copyright 2015, Oracle and/or 2its affiliates. All rights reserved. Where
More information<Insert Picture Here>
1 Database Technologies for Archiving Kevin Jernigan, Senior Director Product Management Advanced Compression, EHCC, DBFS, SecureFiles, ILM, Database Smart Flash Cache, Total Recall,
More informationAnalyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution
Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution Jonathan Halstuch, COO, RackTop Systems JHalstuch@racktopsystems.com Big Data Invasion We hear so much on Big Data and
More informationWhite Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
More informationSecuring sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File
More informationMaximize your Engineered Systems
Maximize your Engineered Systems Jan Poos Principal Sales Consultant EMEA Disk BU @JanStorage Safe Harbor Statement The following is intended to outline our general product direction. It is intended for
More informationCopyright 2014 Oracle and/or its affiliates. All rights reserved.
Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment
More informationF5 and Oracle Database Solution Guide. Solutions to optimize the network for database operations, replication, scalability, and security
F5 and Oracle Database Solution Guide Solutions to optimize the network for database operations, replication, scalability, and security Features >> Improved operations and agility >> Global scaling Use
More informationRSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief
RSA Encryption and Key Management Suite The threat of experiencing a data breach has never been greater. According to the Identity Theft Resource Center, since the beginning of 2008, the personal information
More informationDecrypting Enterprise Storage Security
Industry Trends and Technology Perspective White Paper Trends and options for securing enterprise data and storage By Greg Schulz Founder and Senior Analyst, the StorageIO Group December 11 th, 2006 With
More informationINCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT
INCREASING EFFICIENCY WITH EASY AND COMPREHENSIVE STORAGE MANAGEMENT UNPRECEDENTED OBSERVABILITY, COST-SAVING PERFORMANCE ACCELERATION, AND SUPERIOR DATA PROTECTION KEY FEATURES Unprecedented observability
More informationAn Oracle White Paper June 2013. Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security
An Oracle White Paper June 2013 Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security Introduction... 1 Preventing Database Bypass with Encryption... 2 Oracle Advanced Security
More informationAgenda. Sedat Zencirci Technology Sales Consultancy Manager. Oracle Technology Stack. Business Requirements and Oracle offerings
Sedat Zencirci Technology Sales Consultancy Manager Agenda Oracle Technology Stack Oracle Database Oracle Fusion MiddleWare Oracle Applications Business Requirements and Oracle offerings High Availability
More informationIT SERVICE MANAGEMENT FAQ
IT SERVICE MANAGEMENT FAQ Version: 1.3 Date: February 2011 Page 1 Table of Contents 1.0 Introduction... 3 2.0 Data Stewardship... 4 2.1 Where is the data stored?... 4 2.2 Who controls the data?... 4 2.2
More informationAvailability for the modern datacentre
Availability for the modern datacentre Veeam Availability Suite v8 Mohamad Rizk Presales Consultant Middle East mohamad.rizk@veeam.com Veeam is built for virtualization Founded in 2006, Global company
More informationCloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com
Cloud Security Case Study Amazon Web Services Ugo Piazzalunga Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com Agenda 1. Amazon Web Services challenge 2. Virtual Instances and Virtual Storage
More informationData platform evolution
2 Data platform evolution Top Reasons Reasons to to upgrade 1) End of extended support 2) Enhanced SQL Server 2014 features and performance 3) Impact on security and compliance 4) Cloud strategy Top Blockers
More informationVormetric and SanDisk : Encryption-at-Rest for Active Data Sets
WHITE PAPER Vormetric and SanDisk : Encryption-at-Rest for Active Data Sets 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 Introduction... 3 The Solution... 3 The
More informationComplying with PCI Data Security
Complying with PCI Data Security Solution BRIEF Retailers, financial institutions, data processors, and any other vendors that manage credit card holder data today must adhere to strict policies for ensuring
More informationDell Software. Jiří Svatuška
Dell Software Jiří Svatuška Servers, storage and network Dell Software offerings Software is an important part of Dell solutions Services Client devices Dell Software portfolio - What we offer Transform
More informationOracle Cloud Update November 2, 2015. Eric Frank Oracle Sales Consultant. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Oracle Cloud Update November 2, 2015 Eric Frank Oracle Sales Consultant Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationORACLE DATABASE 10G ENTERPRISE EDITION
ORACLE DATABASE 10G ENTERPRISE EDITION OVERVIEW Oracle Database 10g Enterprise Edition is ideal for enterprises that ENTERPRISE EDITION For enterprises of any size For databases up to 8 Exabytes in size.
More informationTransparent Data Encryption: New Technologies and Best Practices for Database Encryption
Sponsored by Oracle : New Technologies and Best Practices for Database Encryption A SANS Whitepaper April 2010 Written by Tanya Baccam, SANS senior instructor and course author for SEC509: Oracle Database
More informationFIFTH EDITION. Oracle Essentials. Rick Greenwald, Robert Stackowiak, and. Jonathan Stern O'REILLY" Tokyo. Koln Sebastopol. Cambridge Farnham.
FIFTH EDITION Oracle Essentials Rick Greenwald, Robert Stackowiak, and Jonathan Stern O'REILLY" Beijing Cambridge Farnham Koln Sebastopol Tokyo _ Table of Contents Preface xiii 1. Introducing Oracle 1
More informationWith Great Power comes Great Responsibility: Managing Privileged Users
With Great Power comes Great Responsibility: Managing Privileged Users Darren Harmer Senior Systems Engineer Agenda What is a Privileged User Privileged User Why is it important? Security Intelligence
More informationREDUCE RISK WITH ORACLE SOLARIS 11
REDUCE RISK WITH ORACLE SOLARIS 11 MITIGATE RISKS WITH INTELLIGENT SECURITY CONTROLS KEY FEATURES Security in Silicon: Hardware-integrated cryptographic acceleration to protect both data and network. Reduce
More informationAn Oracle White Paper November 2010. Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager
An Oracle White Paper November 2010 Backup and Recovery with Oracle s Sun ZFS Storage Appliances and Oracle Recovery Manager Introduction...2 Oracle Backup and Recovery Solution Overview...3 Oracle Recovery
More informationWHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression
WHITE PAPER Improving Storage Efficiencies with Data Deduplication and Compression Sponsored by: Oracle Steven Scully May 2010 Benjamin Woo IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA
More informationOracle Cloud Computing Strategy
Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Safe Harbor Statement The following is intended
More informationBM482E Introduction to Computer Security
BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based
More informationMySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
MySQL Strategy Morten Andersen, MySQL Enterprise Sales Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not
More informationRunning Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E 2 0 15
Running Oracle s PeopleSoft Human Capital Management on Oracle SuperCluster T5-8 O R A C L E W H I T E P A P E R L A S T U P D A T E D J U N E 2 0 15 Table of Contents Fully Integrated Hardware and Software
More informationAn Oracle White Paper July 2014. Oracle ACFS
An Oracle White Paper July 2014 Oracle ACFS 1 Executive Overview As storage requirements double every 18 months, Oracle customers continue to deal with complex storage management challenges in their data
More informationHayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks
EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector
More informationI ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
More informationSQL Server Encryption Overview. September 2, 2015
SQL Server Encryption Overview September 2, 2015 ABOUT ME Edmund Poillion Data Platform Systems Engineer Skyline Associate since 1999 Started in App Dev, changed focus to SQL Server in 2012 Email: epoillion@skylinetechnologies.com
More informationIntroduction to Database as a Service
Introduction to Database as a Service Exadata Platform Revised 8/1/13 Database as a Service (DBaaS) Starts With The Business Needs Establish an IT delivery model that reduces costs, meets demand, and fulfills
More informationAgio Managed Backup FLEXIBILITY RELIABILITY TRANSPARENCY SECURITY. CONTACT SALES (877) 780 2446 agio.com
Agio Managed Backup Your data is the lifeblood of your business. Protecting it is priority #1. However rapid data growth, virtualization, and increasing cybersecurity threats have irrevocably changed the
More informationAn Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance
An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy
More informationOracle Database Cloud Exadata Service
Oracle Database Cloud Exadata Service Exadata Performance, Cloud Simplicity The Oracle Database Cloud - Exadata Service (Exadata Service) delivers the world s best Cloud Database Platform by combining
More informationCrittografia e Enterprise Key Management una sfida possibile da affrontare
Crittografia e Enterprise Key Management una sfida possibile da affrontare Giuseppe Russo Oracle Chief Technologist giuseppe.russo@oracle.com Simone Mola SafeNet Sales Engineer simone.mola@safenet-inc.com
More informationSafeNet DataSecure vs. Native Oracle Encryption
SafeNet vs. Native Encryption Executive Summary Given the vital records databases hold, these systems often represent one of the most critical areas of exposure for an enterprise. Consequently, as enterprises
More informationEmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions
EmulexSecure 8Gb/s HBA Architecture Frequently Asked Questions Security and Encryption Overview... 2 1. What is encryption?... 2 2. What is the AES encryption standard?... 2 3. What is key management?...
More information<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager tammy.bednar@oracle.com Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
More informationAvailability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9
Veeam Summer School Availability for the modern datacentre Veeam Availability Suite v8 & Sneakpreview v9 Jan van Leuken System Engineer Benelux, Veeam Software jan.vanleuken@veeam.com +31 (0)615 83 50
More informationOracle Database Security
Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches
More informationPassword Management Evaluation Guide for Businesses
Password Management Evaluation Guide for Businesses White Paper 2016 Executive Summary Passwords and the need for effective password management are at the heart of the rise in costly data breaches. Various
More informationData Security: Strategy and Tactics for Success
Data Security: Strategy and Tactics for Success DatabaseVisions,Inc. Fairfax, Va Oracle Gold Partner Solution Provider Oracle Security Specialized www.databasevisions.com Overview Cloud Computing presents
More informationSafe Harbor Statement
Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment
More informationBlackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security
Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document
More informationFileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
More informationBackup & Recovery: Time is Never an Ally
Backup & Recovery: Time is Never an Ally Chris Schin Zetta VP Products February 2012 Why do you do backups? Degree of difficulty Site disaster Frequency of Occurrence Server recovery Revert to older file
More informationOracle Cloud Strategy. Sudip Datta Vice President of Product Management
Oracle Cloud Strategy Sudip Datta Vice President of Product Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More information<Insert Picture Here> Managing Storage in Private Clouds with Oracle Cloud File System OOW 2011 presentation
Managing Storage in Private Clouds with Oracle Cloud File System OOW 2011 presentation What We ll Cover Today Managing data growth Private Cloud definitions Oracle Cloud Storage architecture
More informationIntelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
More information<Insert Picture Here> Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region
Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region 1977 Oracle Database 30 Years of Sustained Innovation Database Vault Transparent Data Encryption
More informationSecuring Data on Microsoft SQL Server 2012
Securing Data on Microsoft SQL Server 2012 Course 55096 The goal of this two-day instructor-led course is to provide students with the database and SQL server security knowledge and skills necessary to
More informationUNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description
UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message
More informationOptimizing Storage for Better TCO in Oracle Environments. Part 1: Management INFOSTOR. Executive Brief
Optimizing Storage for Better TCO in Oracle Environments INFOSTOR Executive Brief a QuinStreet Excutive Brief. 2012 To the casual observer, and even to business decision makers who don t work in information
More informationPLATFORM ENCRYPTlON ARCHlTECTURE. How to protect sensitive data without locking up business functionality.
PLATFORM ENCRYPTlON ARCHlTECTURE How to protect sensitive data without locking up business functionality. 1 Contents 03 The need for encryption Balancing data security with business needs Principles and
More informationGoldKey Product Info. Do not leave your Information Assets at risk Read On... Detailed Product Catalogue for GoldKey
GoldKey Product Info Detailed Product Catalogue for GoldKey Do not leave your Information Assets at risk Read On... GoldKey: Reinventing the Security Strategy The Changing Landscape of Data Security With
More informationVeeam Summer School. Thomas Zaatman Veeam Software
Veeam Summer School Thomas Zaatman Veeam Software Availability for the your modern datacentre modern datacenter Veeam Availability Suite v8 Welcome to Veeam Veeam was founded in 2006 Exponential revenue
More informationSeven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
More information<Insert Picture Here> Oracle Cloud Storage. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska
Oracle Cloud Storage Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska Oracle Cloud Storage Automatic Storage Management (ASM) Oracle Cloud File System ASM Dynamic
More informationAddressing Cyber Security in Oracle Utilities Applications
Addressing Cyber Security in Oracle Utilities Applications Anthony Shorten Principal Product Manager Oracle Utilities Global Business Unit Sept, 2014 Safe Harbor Statement The following is intended to
More informationOracle Database Backups and Disaster Recovery @ Autodesk
Oracle Database Backups and Disaster Recovery @ Autodesk Alan Williams Database Design Engineer Who We Are Autodesk software, suites, and cloud technology help customers design, visualize, and simulate
More informationCS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
More informationAvailability for your modern datacenter
Availability for your modern datacenter - Agentless backup and replication for VMware and Hyper-V - Scalable, powerful, easy-to-use, affordable Veeam Availability protection for the Always-On Business
More informationEfficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules
Efficient Key Management for Oracle Database 11g Release 2 Using Hardware Security Modules WHITE PAPER Thales e-security www.thalesesec.com/oracle TABLE OF CONTENT Introduction...3 Oracle Database 11g
More information