EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks
Agenda Oracle and F5 Partnership Oracle Access Manager and F5 BIG-IP Access Policy Manager Oracle Audit Vault and Database Firewall and F5 BIG-IP Application Security Manager Demo References and Resources Question and Answer
ORACLE AND F5 PARTNERSHIP
Oracle Stack User User User Web Server Virtualization Web Server Web Server Web Server Application Server Virtualization App. Server App. Server App. Server Database Server Virtualization Database Server Database Server Database Server
F5 occupies strategic points of control in the Oracle stack User User User Web Server Virtualization BIG-IP Web Server Web Server Web Server Application Server Virtualization BIG-IP App. Server App. Server App. Server Database Server Virtualization BIG-IP Database Server Database Server Database Server
F5 and Oracle are Engineered to Perform Together
Oracle and F5 Partnership Ten year global partnership with continuous engagement across teams in product management, product development, sales, marketing, and support F5 solutions fill the white space in the comprehensive Oracle technology stack F5.com/Oracle F5 and Oracle go-to-market together in trade shows, field marketing events, and customer webinars F5 and Oracle have established a field engagement office to help respective field teams get connected and deliver joint solutions to customers F5 runs its business on Oracle. Oracle On Demand, and Oracle Cloud with F5. 47 of the Fortune 50 run Oracle with F5
ORACLE ACCESS MANAGER AND F5 BIG-IP ACCESS POLICY MANAGER
Oracle Access Manager 11gR2 Key Features Oracle Access Manager Simplified Web Single Sign On (SSO) Authentication and Authorization Central Policy Administration Advanced Session Management Windows Native Authentication Comprehensive Auditing and Logging Mobile and Social integration 10 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
F5 BIG-IP Access Policy Manager BIG-IP Access Policy Manager (APM) SSL-VPN End point inspection, remediation Clients for Windows, Mac, ios, and Android Policy engine for access control Single sign-on IPv6 support Integration with Oracle Access Manager
Oracle and F5 Integrated Solution
ORACLE AUDIT VAULT AND DATABASE FIREWALL AND F5 BIG-IP APPLICATION SECURITY MANAGER
Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management 14 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
Oracle Database Security Solutions Detect and Block Threats, Alert, Audit and Report PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management 15 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
Database Activity Monitoring and Firewall Detective Control for Oracle and non-oracle Databases Oracle Audit Vault and Database Firewall Monitors network traffic, detect and block unauthorized activity Highly accurate SQL grammar analysis Can detect/stop SQL injection attacks Whitelist approach to enforce activity Blacklists for managing high risk activity Scalable secure software appliance Users Apps SQL Analysis Whitelist Blacklist Allow Log Alert Substitute Block Policy Factors 16 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
Audit, Report, and Alert in Real-Time Detective Control for Oracle and non-oracle Databases Oracle Audit Vault and Database Firewall Centralized secure repository delivered as secure, scalable software appliance Powerful alerting - thresholds, group-by Out-of-the box and custom reports Consolidated multi-source reporting Built-in fine grain segregation of duties Audit Data & Event Logs Oracle Database Firewall OS & Storage Directories Databases Custom! Alerts Built-in Reports Custom Reports Policies SOC Auditor Security Analyst 17 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
Oracle Audit Vault and Database Firewall New Solution for Oracle and Non-Oracle Databases Users Applications Database Firewall Allow Log Alert Substitute Block Firewall Events SOC Alerts! Auditor Security Analyst Built-in Reports Custom Reports Policies Audit Vault Audit Data OS, Directory, File System & Custom Audit Logs 18 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
Oracle Audit Vault and Database Firewall Comprehensive Enterprise Audit and Log Consolidation Databases: Oracle, SQL Server, DB2 LUW, Sybase ASE New Audit Sources Operating Systems: Microsoft Windows, Solaris Directory Services: Active Directory File Systems: Oracle ACFS Audit Collection Plugins for Custom Audit Sources XML file maps custom audit elements to canonical audit elements Collect and map data from XML audit file and database tables 19 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
F5 BIG-IP Application Security Manager Provides comprehensive protection for all web application vulnerabilities, such as (D)DoS, cross-site scripting, cookie tampering, and web scraping Allows the security team to secure a website without changing the application code Logs and reports all application traffic, attacks and usernames PCI compliance Integration with Oracle Audit Vault and Database Firewall
Oracle and F5 Integrated Solution When WAF detects a SQL injection pattern, the user s metadata is logged to the Oracle Database Firewall Oracle Database Firewall analyzes the SQL and applies the policy rule Logged events can then be correlated in the reports
DEMO
References and Resources Solution Overview: Providing High-Performance Access Management for Oracle http://www.f5.com/pdf/solution-center/f5-oracle-solution-overview.pdf White Paper: Streamlining Oracle Web Application Access Control http://www.f5.com/pdf/white-papers/oracle-access-management-apm-wp.pdf Technical Guide: Deploying the BIG-IP Access Policy Manager with Oracle Access Manager http://www.f5.com/pdf/deployment-guides/f5-oracle-oam-apm-dg.pdf Learning Video: F5 Access Policy Manager and Oracle Access Manager http://www.f5.com/news-press-events/web-media/webcasts/f5-apm-andoam.html
References and Resources Solution Profile: Protecting Web Applications with Oracle Database Firewall and BIG-IP ASM http://www.f5.com/pdf/solution-profiles/oracle-asm-database-sp.pdf White Paper: Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall http://www.f5.com/pdf/white-papers/oracle-application-data-security-wp.pdf Technical Guide: Deploying the BIG-IP Application Security Manager with Oracle Database Firewall http://www.f5.com/pdf/deployment-guides/oracle-database-firewall-dg.pdf Video: Oracle Database Firewall with F5 Application Security Manager http://www.f5.com/news-press-events/web-media/webcasts/integrationdemo-oracle-database-firewall-with-f5-asm.html
QUESTIONS?
THANK YOU!