Copyright 2014 Oracle and/or its affiliates. All rights reserved.
|
|
- Derrick Henry
- 8 years ago
- Views:
Transcription
1
2 Oracle Data Masking and Subsetting What s new & Best Practices Dinesh Rajasekharan Product Manager Oracle Data Masking and Subsetting Oct 02, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved.
3 Program Agenda Oracle Data Masking and Subsetting Security challenges due to data proliferation What s new and product overview Best practices Customer Case study Q&A 3
4 Proliferation of Sensitive Data Increases Security Risks Development Partners Demo Testing Research Cloud Analytics Training 4
5 Compliance Drivers PCI DSS v3.0 November Production data (live PANs) should not be used for testing or development purposes. European Data Protection Directive The data subject shall have the right to obtain from the controller the rectification of personal data relating to them which are inaccurate. The Health Insurance Portability and Accountability Act of 1996 HIPAA The removal of specified identifiers of the individual and of the individual s relatives, household members, and employers is required and more 5
6 Finding a Solution Objectives Replace sensitive with fictitious data before sharing Extract relevant data Discard unneeded sensitive data Meet compliance requirements Oracle Data Masking and Subsetting Challenges Discover sensitive data Preserve application integrity Provide common masking formats and goal-based subsetting Provide integrated solution 6
7 Program Agenda Oracle Data Masking and Subsetting Security challenges due to data proliferation What s new and product overview Best practices Customer Case study Q&A 7
8 Announcing Oracle Data Masking and Subsetting Data Masking Data Subsetting Data Modeling Copyright 2014, Oracle and/or its affiliates. All rights reserved. 8
9 Oracle Data Masking and Subsetting Pack Reduces Risk of Sharing by Obfuscating or Removing Sensitive Data Discover Sensitive Data NAME SALARY AGUILAR BENSON CHANDRA DONNER NAME SALARY AGUILAR CHANDRA Mask Data Using Format Library Subset Based on Goal/Condition Retain Application Integrity Mask/Subset in Export or on Staging 9
10 Application Data Modeling Sensitive Data Discovery Data Relationships Sensitive Columns Metadata Automated Discovery 10
11 Data Masking 11
12 Extensive Masking Format Library Provides common masking formats Supports custom masking formats Random numbers/strings/dates Substitute User defined PL/SQL function and more Templates for specific versions of E- Business Suite and Fusion Applications 12
13 Comprehensive Masking Transformations Mask Based on Condition Country Identifier CA US UK JX C Shuffle Records Country Identifier Health Health CA Records Records US UK AI D Emp ID First Name 324 Albert 986 Hussain Generate Deterministic Output HR FIN Emp ID First Name 324 Charlie 986 Murali Emp ID First Name 324 Charlie 986 Murali Generate Random Values Preserving Format Mask Operating System Files stored as Blobs Company Closing Price IBFG $36.92 XKJU Company Closing Price IBFG $89.57 XKJU BLOB Search : [0-9]{10} Replace : * BLOB ********** ********** and more 13
14 Comprehensive Masking Transformations (continued) Conditional masking Consistent masking Compound masking Format preserving Perturbation Shuffling Reversible masking Masks rows differently based on condition E.g. Mask national identifiers based on country Ensures the masked values is same across multiple databases E.g. Mask employee identifiers consistently across schemas and databases Reduces masking time by grouping related columns E.g. Mask related columns: address (street, state, country), or dates (birth, joining) Generates random values that maintain the original format E.g. Mask passport numbers or tax identifiers while keeping the format Generates random values within a user defined range E.g. Generate random dates within a specific range Shuffles the values within a column E.g. Shuffle clinical data or PII between electronic health records Encrypts and decrypts data based on a passphrase E.g. Outsourced data processing team can unmask data 14
15 Data Subsetting 15
16 Data Subsetting Use Cases Share relevant subset of data with internal and external teams Reduce storage cost for test/dev Extract subscriber data from SaaS Perform research and analysis on a subset of data Extract subset of data as part of e- discovery requests 16
17 Goal or Condition Based Subsetting Relative Database Size 100% 25% 10% 100M Rows Relative Table Size 20M Rows 2M Rows 1024 GB 256 GB 102 GB Condition Based Subset rows of department 10 17
18 Ease of Administration 18
19 Streamlined Management Pre-installed with Oracle Enterprise Manager(EM) Point Centrally managed using EM Unified interface for discovery, masking and subsetting Scheduling and reporting Command-line or scripting option 19
20 Masking and Subsetting Location Flexibility In-Database In-Export Production Staging Test/Dev Production Export Test/Dev Minimal impact on the production environment Sensitive data remains within the production perimeter 20
21 Data Masking and Subsetting Integrations Integration Point Database Lifecycle Management Pack Cloud Management Pack Real Application Testing Pack Oracle Data Integrator Oracle Database Gateways* Benefit Clone and mask Snap-clone and mask Mask in database workload captures Mask incrementally captured data Mask and subset non-oracle databases including SQL Server, DB2, Informix, Teradata (new), and more * Included in Oracle Data Masking and Subsetting license 21
22 Oracle Data Masking and Subsetting Summary Main Benefits Maximizes business value of data without compromising sensitive data Minimizes security risk by not proliferating sensitive data Narrows compliance boundary by masking sensitive data Reduces storage cost for test/dev by subsetting Key Features Automates sensitive data discovery, and maintains referential integrity Provides extensive masking format library and comprehensive transformations Supports goal and condition based subsetting Integrates with enterprise data management tools 22
23 Program Agenda Oracle Data Masking and Subsetting Security challenges due to data proliferation What s new and product overview Best practices Customer Case study Q&A 23
24 Data Masking and Subsetting Methodology Discover sensitive data Discover data relationships Create Data Model Select Formats & Criteria Masking formats and templates Goals & conditions for subsetting Preview masking algorithm results Preview subset reduction results Preview & Validate Execute Transformation In-Database or In- Export Rerun with same data model 24
25 Best Practices Implementation Test backup and restore procedures prior to masking Allocate the right amount of storage space Use preview option to ensure desired results before script generation Performance Tune I/O of target Oracle Databases Apply generic Performance enhancement patch in Oracle Enterprise Manager Apply encrypt masking format patch in Oracle Enterprise Manager Apply Database optimizer enhancement patch in Oracle Database 11gR2 or below Update target Oracle Database stats before discovery, masking, subsetting 25
26 Best Practices for Performance Tuning (continued) Check Use parallel execution when possible in masking definition Increase the parallel degree if necessary Run SQL Tuning Advisor on long running SQL during script generation and execution Create SQL profile recommended by SQL Tuning Advisor Disable the created SQL profiles after masking and subsetting is done When using the In-Export method (a.k.a. At-Source) : Increase maximum number of threads in masking and subsetting definition Reduce the size of each generated dump file in masking and subsetting definition 26
27 Program Agenda Oracle Data Masking and Subsetting Security challenges due to data proliferation What s new and product overview Best practices Customer Case study Q&A 27
28 Case Study: Data Masking for Security and Compliance About the Presenter Rama Kolli, Senior Director Information Architecture Company Background Financial services company Performs research and analysis of stocks and bonds Spanned across 25 countries with more than 10,000 employees Business Drivers Prevent exposure of Information assets in non-production environments Reduce the risk of accidental or intentional unauthorized access to context sensitive information in non-production environments Infrastructure 16 servers, 128 CPU Cores, 256 GB Memory per server, 22 Databases, Exadata Servers 28
29 Case Study: Benefits from Using Oracle Data Masking Automatic discovery of context sensitive information Deterministic masking to consistently mask values across multiple databases Preserves referential integrity of the database Ease of defining custom masking formats Ease of administration and maintenance Mask data in Oracle and SQL Server databases Acceptable masking time Masked 2TB database with 20 tables in 1 hour 29
30 What Other Customers Are Saying Name Sector Scenario Feedback on Oracle T-Mobile (Video) Wireless Telecommunications Mask sensitive data in nonproduction databases One of the main advantages of data masking is the ability to create entire sets of data and maintain referential integrity out of production without changing any applications. Alex Macknight, Principal Architect, Information Security, T-Mobile SquareTwo Financial (Video) Financial Services Replace slow performing legacy masking tool to achieve faster development and test cycles We achieved a 15 hour refresh time of 3TB database instead of 14 days refresh time. J.T.Gaieto, Manager, Information Security, SquareTwo Financial National Marrow Donor Program Healthcare Mask healthcare information in nonproduction environments We are able to consistently mask the data on all the non production databases. (Video) Kyle Nelson, Director, Business Engagement, Information Technology, National Marrow Donor Program Links to more customer stories are at the bottom of the Oracle Data Masking and Subsetting OTN page here. 30
31 Connect With Us /OracleDatabase /OracleSecurity blogs.oracle.com/ SecurityInsideOut blogs.oracle.com/ datamasking Oracle Database Insider /Oracle/database /OracleLearning oracle.com/database/security oracle.com/technetwork/database/security 31
32 Program Agenda Oracle Data Masking and Subsetting Security challenges due to data proliferation What s new and product overview Best Practices Customer Case study Q&A 32
33 Oracle Database Security at OpenWorld 2014 Time Session Title Location Monday 2:45 3:30 Oracle Database Security Innovations in the Year of Megabreaches (CON8204) Moscone South 303 Monday 5:15 6:00 Introducing Oracle Key Vault: Centralize Keys, Wallets, and Java Keystores (CON8189) Moscone South 305 Tuesday 10:45 11:30 Oracle Database 12c: Defense-in-Depth Security (CON8194) Moscone South 306 Tuesday 3:45 4:30 Oracle Audit Vault and Database Firewall: What s New and Best Practices (CON8180) Moscone South 306 Tues 5:00 5:45 Oracle Real Application Security Next Generation VPD Moscone South 308 Tuesday 5:15 6:15 Hands-On Lab #1: Oracle Key Vault (HOL9275) Hotel Nikko Golden Gate Wednesday 10:15 11:00 Oracle Advanced Security: Best Practices for Database Encryption and Redaction (CON8186) Moscone South 306 Wednesday 12:45 1:30 Oracle Database Security Strategy and Best Practices: Customer Case Study Panel (CON8192) Moscone South 310 Wednesday 3:30 4:15 Oracle Database Vault with Oracle Database 12c (CON8197) Moscone South 306 Thursday 9:30 10:15 What s New and Best Practices for Oracle Data Masking and Subsetting (CON8184) Moscone South 306 Thursday 11:30 12:30 Hands-On Lab #2: Oracle Key Vault (HOL9275) Hotel Nikko Golden Gate Plus: Visit the Oracle Database Security pods at the Demo Grounds for one-on-one discussions and demonstrations! Copyright 2014, Oracle and/or its affiliates. All rights reserved. 33
34 34
35
Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Copyright 2014 Oracle and/or its affiliates. All rights reserved. Oracle Data Masking and Subsetting Oracle Advanced Security Best Practices for Database Encryption and Redaction Todd Bottger Sr. Principal
More informationDatabase Security Questions HOUG 2016. Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.
Database Security Questions HOUG 2016 Fehér Lajos 1 How Data Gets Compromised? Source: Verizon Data Breach Investigations Report Copyright 2015, Oracle and/or 2its affiliates. All rights reserved. Where
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
More informationProtecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security Antonio.Mata.Gomez@oracle.com Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
More informationSecuring Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationOracle Database Security
Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches
More informationOracle Database Security. Paul Needham Senior Director, Product Management Database Security
Oracle Database Security Paul Needham Senior Director, Product Management Database Security Safe Harbor Statement The following is intended to outline our general product direction. It is intended for
More information<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager tammy.bednar@oracle.com Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
More informationOracle Identity Management Securing The New Digital Experience
Oracle Identity Management Securing The New Digital Experience Security: User Single Sign-On, Certifying User Access, and Masking Sensitive Data Henry Anzarouth Principal Sales Consultant, Security and
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside Out Latest Innovations in Oracle Database 12c Jukka Männistö Database Architect Oracle Nordic Coretech Presales The 1995-2014 Security Landscape Regulatory Landscape HIPAA, SOX (2002),
More informationSafe Harbor Statement
Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment
More informationWhy Add Data Masking to Your IBM DB2 Application Environment
Why Add Data Masking to Your IBM DB2 Application Environment dataguise inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., #260 Fremont, CA 94538 (510) 824-1036 www.dataguise.com dataguise
More informationComplete Database Security. Thomas Kyte http://asktom.oracle.com/
Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Solutions for securing and auditing Oracle database Edgars Ruņģis Technology Consultant Why Are Databases Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Enterprises
More informationOracle Enterprise Manager 12c New Capabilities for the DBA. Charlie Garry, Director, Product Management Oracle Server Technologies
Oracle Enterprise Manager 12c New Capabilities for the DBA Charlie Garry, Director, Product Management Oracle Server Technologies of DBAs admit doing nothing to address performance issues CHANGE AVOID
More informationData Security: Strategy and Tactics for Success
Data Security: Strategy and Tactics for Success DatabaseVisions,Inc. Fairfax, Va Oracle Gold Partner Solution Provider Oracle Security Specialized www.databasevisions.com Overview Cloud Computing presents
More informationKovaion Data Masking Solution
Kovaion Data Masking Solution Date Email Website : Apr-2016 : info@kovaion.com : www.kovaion.com Kovaion Consulting DATA MASKING SOLUTION OVERVIEW Obfuscation of Sensitive Data Prevent data theft from
More information1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
More information<Insert Picture Here> Application Change Management and Data Masking
Application Change Management and Data Masking Jagan R. Athreya (jagan.athreya@oracle.com) Director of Database Manageability Oracle Corporation 1 The following is intended to outline
More informationAn Oracle White Paper June 2013. Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security
An Oracle White Paper June 2013 Encryption and Redaction in Oracle Database 12c with Oracle Advanced Security Introduction... 1 Preventing Database Bypass with Encryption... 2 Oracle Advanced Security
More informationOracle Database 12c. Peter Schmidt Systemberater Oracle Deutschland BV & CO KG
Oracle Database 12c Peter Schmidt Systemberater Oracle Deutschland BV & CO KG Uptake of Oracle Database 12c compared with 11g 18,00% 16,00% 14,00% 12,00% 10,00% 8,00% 12.1 11.1 6,00% 4,00% 2,00% 0,00%
More informationSafeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking. Lucy Feng
Delivering Oracle Success Safeguard Sensitive Data in EBS: A Look at Oracle Database Vault, Transparent Data Encryption, and Data Masking Lucy Feng RMOUG Training Days February 2012 About DBAK Oracle Solution
More informationOracle Database 11g Security Essentials
Oracle 1z0-528 Oracle Database 11g Security Essentials Version: 4.2 QUESTION NO: 1 Oracle 1z0-528 Exam Which of the following tasks is the first task to perform when implementing Oracle Database Vault?
More informationHayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks
EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
More informationOracle Database Public Cloud Services
Oracle Database Public Cloud Services A Strategy and Technology Overview Bob Zeolla Principal Sales Consultant Oracle Education & Research November 23, 2015 Safe Harbor Statement The following is intended
More informationWhy Standardize on Oracle Database 11g Next Generation Database Management. Thomas Kyte http://asktom.oracle.com
Why Standardize on Oracle Database 11g Next Generation Database Management Thomas Kyte http://asktom.oracle.com Top Challenges Performance Management Change Management Ongoing Administration Storage Backup
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Seguridad en profundidad Jaime Briggs MSc CS, CISSP, CCSK Sales Manager Strategic accounts Agenda Los Controles ISO 27001 Defensa en Profundidad Productos que dan respuesta Roadmap a seguridad Q&A 3
More informationSafe Harbor Statement
Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment
More informationManaged Cloud Database Service
Managed Cloud Database Service Transform your Business with Managed Database Cloud On-premise Guru Shashikumar Director, Product Management Oracle Managed Cloud Services October 2014 Agenda 1 2 3 4 Oracle
More informationOracle 1Z0-528 Exam Questions & Answers
Oracle 1Z0-528 Exam Questions & Answers Number: 1Z0-528 Passing Score: 660 Time Limit: 120 min File Version: 21.1 http://www.gratisexam.com/ Oracle 1Z0-528 Exam Questions & Answers Exam Name: Oracle Database
More informationOracle EXAM - 1Z0-528. Oracle Database 11g Security Essentials. Buy Full Product. http://www.examskey.com/1z0-528.html
Oracle EXAM - 1Z0-528 Oracle Database 11g Security Essentials Buy Full Product http://www.examskey.com/1z0-528.html Examskey Oracle 1Z0-528 exam demo product is here for you to test the quality of the
More informationAn Oracle White Paper June 2013. Data Masking Best Practice
An Oracle White Paper June 2013 Data Masking Best Practice Executive Overview... 2 Introduction Why mask data?... 2 The Challenges of masking non-production environments... 4 Implementing Data Masking...
More information1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
More informationOracle Database 11g: Security Release 2. Course Topics. Introduction to Database Security. Choosing Security Solutions
Oracle Database 11g: Security Release 2 In this course, students learn how they can use Oracle Database features to meet the security, privacy and compliance requirements of their organization. The current
More information1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
1 Copyright 2011, Oracle and/or its affiliates. All rights Deduplication & Compression Options for Oracle Database Backups Donna Cooksey, Sridhar Ranganathan High Availability Product Management 2 Copyright
More informationOracle Database 11g: Security Release 2
Oracle University Contact Us: 1.800.529.0165 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features to meet the security,
More informationD50323GC20 Oracle Database 11g: Security Release 2
D50323GC20 Oracle Database 11g: Security Release 2 What you will learn In this course, you'll learn how to use Oracle Database features to meet the security, privacy and compliance requirements of their
More informationOracle Database Cloud Services OGh DBA & Middleware Day
Oracle Database Cloud Services OGh DBA & Middleware Day Jan van Tiggelen Principal Sales Consultant Oracle Core Technology June 4th, 2015 Safe Harbor Statement The following is intended to outline our
More informationDatabase Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security
Database Security & Compliance with Audit Vault and Database Firewall Pierre Leon Database Security 1 Topics Encryption Authentication Authorising highly privileged users Access control by data classification
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Introducing Oracle Audit Vault and Database Firewall Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with Basic Controls 98% records stolen from databases 84% records breached
More informationOracle Database - Engineered for Innovation. Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya
Oracle Database - Engineered for Innovation Sedat Zencirci Teknoloji Satış Danışmanlığı Direktörü Türkiye ve Orta Asya Oracle Database 11g Release 2 Shipping since September 2009 11.2.0.3 Patch Set now
More informationOracle Database 12c Plug In. Switch On. Get SMART.
Oracle Database 12c Plug In. Switch On. Get SMART. Duncan Harvey Head of Core Technology, Oracle EMEA March 2015 Safe Harbor Statement The following is intended to outline our general product direction.
More informationIntroduction to Database as a Service
Introduction to Database as a Service Exadata Platform Revised 8/1/13 Database as a Service (DBaaS) Starts With The Business Needs Establish an IT delivery model that reduces costs, meets demand, and fulfills
More informationOracle Database Security Solutions
Oracle Database Security Solutions Eric Cheung Senior Manager, Technology Sales Consulting Eric.cheung@oracle.com May 2008 Key Drivers for Data Security Privacy and Compliance Sarbanes-Oxley
More informationSecurity Compliance and Data Governance: Dual problems, single solution CON8015
Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology
More informationAn Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance
An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy
More informationOracle Cloud Update November 2, 2015. Eric Frank Oracle Sales Consultant. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Oracle Cloud Update November 2, 2015 Eric Frank Oracle Sales Consultant Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationOracle vs. SQL Server. Simon Pane & Steve Recsky First4 Database Partners Inc. September 20, 2012
Oracle vs. SQL Server Simon Pane & Steve Recsky First4 Database Partners Inc. September 20, 2012 Agenda Discussions on the various advantages and disadvantages of one platform vs. the other For each topic,
More informationSecurity It s an ecosystem thing
Security It s an ecosystem thing Joseph Alhadeff Vice President Global Public Policy, Chief Privacy Strategist The Security challenge in the before time. Today s Threat Environment
More informationAn Oracle White Paper July 2010. Data Masking Best Practices
An Oracle White Paper July 2010 Data Masking Best Practices Executive Overview... 1 Introduction... 1 The Challenges of Masking Data... 2 Implementing Data Masking... 2 Comprehensive Enterprise-wide Discovery
More informationwww.niit-tech.com Lalit Mittal NIIT Technologies White Paper
www.niit-tech.com Data Masking Techniques for Insurance Lalit Mittal NIIT Technologies White Paper CONTENTS Introduction 3 What is Data Masking? 3 Types of Data Masking 4 Techniques used for Data Masking
More informationOracle Database Security Services
Oracle Database Security Services BUSINESS CHALLENGES Public announcements of major IT security breaches have become an almost daily occurrence. The causes of publicized breaches are diverse and include
More informationWhat s New with Oracle Database 12c on Windows On-Premises and in the Cloud
What s New with Oracle Database 12c on Windows On-Premises and in the Cloud Santanu Datta Vice President Server Technologies Alex Keh Senior Principal Product Manager Server Technologies Oracle Database
More informationAn Oracle White Paper June 2013. Security and Compliance with Oracle Database 12c
An Oracle White Paper June 2013 Security and Compliance with Oracle Database 12c Introduction... 3 Oracle Database 12c Security... 4 Locating and Cataloging Your Sensitive Data... 4 Monitoring the Configuration
More informationTips and Tricks for Using Oracle TimesTen In-Memory Database in the Application Tier
Tips and Tricks for Using Oracle TimesTen In-Memory Database in the Application Tier Simon Law TimesTen Product Manager, Oracle Meet The Experts: Andy Yao TimesTen Product Manager, Oracle Gagan Singh Senior
More informationIntegrated Data Management: Discovering what you may not know
Integrated Data Management: Discovering what you may not know Eric Naiburg ericnaiburg@us.ibm.com Agenda Discovering existing data assets is hard What is Discovery Discovery and archiving Discovery, test
More informationSecure Data Across Application Landscapes: On Premise, Offsite & In the Cloud REINVENTING DATA MASKING WHITE PAPER
Secure Data Across Application Landscapes: On Premise, Offsite & In the Cloud REINVENTING DATA MASKING TABLE OF CONTENTS Data Protection Challenges Across Application Lifecycles... 3 Delphix Service-Based
More informationCON9488 The Enterprise Cloud Simplified with Oracle VM
CON9488 The Enterprise Cloud Simplified with Oracle VM Andy Herm, Senior Architect, Cloud Infrastructure, Oracle Conor Wentz, Senior Architect, Cloud Infrastructure, Oracle Honglin Su, Sr. Director of
More informationNews and trends in Data Warehouse Automation, Big Data and BI. Johan Hendrickx & Dirk Vermeiren
News and trends in Data Warehouse Automation, Big Data and BI Johan Hendrickx & Dirk Vermeiren Extreme Agility from Source to Analysis DWH Appliances & DWH Automation Typical Architecture 3 What Business
More informationGetting Started with Oracle Data Miner 11g R2. Brendan Tierney
Getting Started with Oracle Data Miner 11g R2 Brendan Tierney Scene Setting This is not about DB log mining This is an introduction to ODM And how ODM can be included in OBIEE (next presentation) Domain
More information<Insert Picture Here> Move to Oracle Database with Oracle SQL Developer Migrations
Move to Oracle Database with Oracle SQL Developer Migrations The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationDBKDA 2012 : The Fourth International Conference on Advances in Databases, Knowledge, and Data Applications
Evaluation of Data Anonymization Tools Sergey Vinogradov Corporate Technology Siemens LLC Saint-Petersburg, Russia sergey.vinogradov@siemens.com Alexander Pastsyak Corporate Technology Siemens LLC Saint-Petersburg,
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 Step-by-Step Cookbook for Identifying and Tuning SQL Problems Ashish
More informationEncrypting Sensitive Data in Oracle E-Business Suite
Encrypting Sensitive Data in Oracle E-Business Suite December 19, 2013 Stephen Kost Chief Technology Officer Integrigy Corporation About Integrigy ERP Applications Oracle E-Business Suite Databases Oracle
More informationForthcoming EU Data Protection Law
Forthcoming EU Data Protection Law How Oracle can Help Patrick McLaughlin Security Architect & Oracle Fellow EMEA Technology Solutions 22 October 2015, Riga Copyright 2014 Oracle and/or its affiliates.
More informationAgenda. Enterprise Manager: Introduction Enterprise Cloud: Our Perspective Cloud Management: High level features Customer and Partner References
Managing Clouds with Enterprise Manager 12c: Overview presentation Agenda Enterprise Manager: Introduction Enterprise Cloud: Our Perspective Cloud Management: High level features Customer and Partner References
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Cumplimiento de PMG SSI para sector Gobierno en Chile Jaime Briggs MSc CS, CISSP, CCSK Sales Manager Strategic accounts jaime.briggs@oracle.com Agenda Pilares Fundamentales de SSI Desafios de Seguridad
More informationTest Data Management for Security and Compliance
White Paper Test Data Management for Security and Compliance Reducing Risk in the Era of Big Data WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential
More informationOracle s Cloud Computing Strategy
Oracle s Cloud Computing Strategy Making IT Consumable Richard Garsthagen Director Cloud Business Development EMEA Copyright 2014, Oracle and/or its affiliates. All rights reserved. Trends Driving IT Innovation
More informationCopyright 2014, Oracle and/or its affiliates. All rights reserved. 2
2 CON8358 - Building a Private Cloud with OpenStack Oracle OpenStack for Oracle Linux Ronen Kofman Director of Product Development Oracle OpenStack September, 2014 Safe Harbor Statement The following is
More informationAn Oracle White Paper April 2014. Security and Compliance with Oracle Database 12c
An Oracle White Paper April 2014 Security and Compliance with Oracle Database 12c Introduction... 2 Oracle Database 12c Security... 3 Protecting Against Database Bypass Threats... 3 Limiting Sensitive
More informationMonitor Your Engineered Systems From a Single Pane Of Glass
Monitor Your Engineered Systems From a Single Pane Of Glass Oracle Enterprise Manager and Exadata, Exalogic & Exalytics Prepared By: Alfredo Krieg Sr. Oracle Enterprise Cloud Administrator The Sherwin-Williams
More informationKey Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
More informationIntroducing Oracle Exalytics In-Memory Machine
Introducing Oracle Exalytics In-Memory Machine Jon Ainsworth Director of Business Development Oracle EMEA Business Analytics 1 Copyright 2011, Oracle and/or its affiliates. All rights Agenda Topics Oracle
More informationOracle Public Cloud. Peter Schmidt Principal Sales Consultant Oracle Deutschland BV & CO KG
Oracle Public Peter Schmidt Principal Sales Consultant Oracle Deutschland BV & CO KG The Promise Of Computing For Developers, IT Operations And Line of Business Developers Agility & Quality Latest Technology
More informationSecure Test Data Management with ORACLE Data Masking
Secure Test Data Management with ORACLE Data Masking Michael Schellin Consultant, OCM DOAG Regio München, Dec 2009 Baden Basel Bern Brugg Lausanne Zürich Düsseldorf Frankfurt/M. Freiburg i. Br. Hamburg
More informationApplication Testing Suite Overview
Application Testing Suite Overview Steve Van Hall Principal Sales Consultant, Oracle Corporation Oracle Enterprise Manager Top-Down Application Management Application Operations Management
More informationDW & Big Data on your smartphone
DW & Big Data on your smartphone Smartphone app helping you get the most from this year s OpenWorld h7p://:nyurl.com/kmbsxbu Access to all the most important informaaon Presenter profiles Must- see sessions
More informationEmbarcadero DB Change Manager 6.0 and DB Change Manager XE2
Product Documentation Embarcadero DB Change Manager 6.0 and DB Change Manager XE2 User Guide Versions 6.0, XE2 Last Revised April 15, 2011 2011 Embarcadero Technologies, Inc. Embarcadero, the Embarcadero
More informationIBM InfoSphere Optim Data Masking solution
IBM InfoSphere Optim Data Masking solution Mask data on demand to protect privacy across the enterprise Highlights: Safeguard personally identifiable information, trade secrets, financials and other sensitive
More informationOracle Database 12c: Administration Workshop NEW
Oracle University Contact Us: 1.800.529.0165 Oracle Database 12c: Administration Workshop NEW Duration: 5 Days What you will learn The Oracle Database 12c: Administration Workshop will teach you about
More informationImplement & Manage IaaS and Self Service Portal with Enterprise Manager 12c
Implement & Manage IaaS and Self Service Portal with Enterprise Manager 12c Prepared by: Kai Yu Sr. Principal Engineer Dell Inc. Tariq Farooq CEO BrainSurface About Authors Kai Yu, Senior Principal Architect,
More informationOracle s Cloud Computing Strategy
Oracle s Cloud Computing Strategy Your Strategy, Your Cloud, Your Choice Sandra Cheevers Senior Principal Product Director Cloud Product Marketing Steve Lemme Director, Cloud Builder Specialization Oracle
More information2009 Oracle Corporation 1
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More informationData-Centric Security vs. Database-Level Security
TECHNICAL BRIEF Data-Centric Security vs. Database-Level Security Contrasting Voltage SecureData to solutions such as Oracle Advanced Security Transparent Data Encryption Introduction This document provides
More informationPlanning, Provisioning and Deploying Enterprise Clouds with Oracle Enterprise Manager 12c Kevin Patterson, Principal Sales Consultant, Enterprise
Planning, Provisioning and Deploying Enterprise Clouds with Oracle Enterprise Manager 12c Kevin Patterson, Principal Sales Consultant, Enterprise Manager Oracle NIST Definition of Cloud Computing Cloud
More informationDatabase as a Service (DaaS) Version 1.02
Database as a Service (DaaS) Version 1.02 Table of Contents Database as a Service (DaaS) Overview... 4 Database as a Service (DaaS) Benefit... 4 Feature Description... 4 Database Types / Supported Versions...
More informationOracle Data Masking. Bruce Elton. Master Principal Sales Consultant Information Security. 1 2012 Oracle Corporation
Oracle Data Masking Bruce Elton Master Principal Sales Consultant Information Security 1 2012 Oracle Corporation Oracle Data Masking Comprehensive and Extensible Mask Library Mask formats for common sensitive
More informationNew Oracle 12c Security Features Oracle E-Business Suite Perspective
New Oracle 12c Security Features Oracle E-Business Suite Perspective December 18, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
More informationOracle Cloud 25.09.14. Bjarte Drivenes Enterprise Architect. Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Oracle Cloud 25.09.14 Bjarte Drivenes Enterprise Architect Copyright 2014 Oracle and/or its affiliates. All rights reserved. Copyright 2014 Oracle and/or its affiliates. All rights reserved. Agenda Private
More informationFIFTH EDITION. Oracle Essentials. Rick Greenwald, Robert Stackowiak, and. Jonathan Stern O'REILLY" Tokyo. Koln Sebastopol. Cambridge Farnham.
FIFTH EDITION Oracle Essentials Rick Greenwald, Robert Stackowiak, and Jonathan Stern O'REILLY" Beijing Cambridge Farnham Koln Sebastopol Tokyo _ Table of Contents Preface xiii 1. Introducing Oracle 1
More informationOracle MulBtenant Customer Success Stories
Oracle MulBtenant Customer Success Stories Mul1tenant Customer Sessions at Customer Session Venue Title SAS Cigna CON6328 Mon 2:45pm SAS SoluBons OnDemand: A MulBtenant Cloud Offering CON6379 Mon 5:15pm
More informationOracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall Angelo Maria Bosis Sales Consulting Director Oracle Italia Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with
More information<Insert Picture Here> Oracle Secure Backup 10.3 Secure Your Data, Protect Your Budget
Oracle Secure Backup 10.3 Secure Your Data, Protect Your Budget Program Agenda Oracle Secure Backup Overview What s New in Oracle Secure Backup 10.3 Ease of Management Data Protection:
More informationOracle: Database and Data Management Innovations with CERN Public Day
Presented to Oracle: Database and Data Management Innovations with CERN Public Day Kevin Jernigan, Oracle Lorena Lobato Pardavila, CERN Manuel Martin Marquez, CERN June 10, 2015 Copyright 2015, Oracle
More informationIBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite
IBM InfoSphere Optim Test Data Management solution for Oracle E-Business Suite Streamline test-data management and deliver reliable application upgrades and enhancements Highlights Apply test-data management
More informationOracle Database 12c Security and Compliance O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5
Oracle Database 12c Security and Compliance O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Table of Contents Introduction 2 Oracle Database 12c Security 3 Preventing Database Bypass 3 Preventing
More informationOracle Database Cloud Service Rick Greenwald, Director, Product Management, Database Cloud
Oracle Database Cloud Service Rick Greenwald, Director, Product Management, Database Cloud Agenda Oracle Cloud Database Service Overview Cloud taxonomy What is the Database Cloud Service? Architecture
More information