Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks



Similar documents
Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Oracle Audit Vault and Database Firewall

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Oracle Database Security. Paul Needham Senior Director, Product Management Database Security

Securing Data in Oracle Database 12c

Oracle Identity Management Securing The New Digital Experience

Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security

Oracle Database Security

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Complete Database Security. Thomas Kyte

An Oracle White Paper April Oracle Audit Vault and Database Firewall

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Application and Database Security with F5 BIG-IP ASM and IBM InfoSphere Guardium

MySQL Security: Best Practices

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

<Insert Picture Here> Oracle Database Security Overview

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Security Compliance and Data Governance: Dual problems, single solution CON8015

An Oracle White Paper January Oracle Database Firewall

Quest InTrust. Version 8.0. What's New. Active Directory Exchange Windows

An Oracle White Paper January Oracle Database Firewall

<Insert Picture Here> Oracle Database Vault

Where every interaction matters.

Secret Server Qualys Integration Guide

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Database Auditing & Security. Brian Flasck - IBM Louise Joosse - BPSolutions

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

F5 Silverline Web Application Firewall Onboarding: Technical Note

<Insert Picture Here> Oracle Identity And Access Management

Obtaining Value from Your Database Activity Monitoring (DAM) Solution

Real-Time Database Protection and. Overview IBM Corporation

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Post-TMG: Securely Delivering Microsoft Applications

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

An Oracle White Paper May Oracle Audit Vault and Database Firewall 12.1 Sizing Best Practices

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

An Oracle White Paper April Security and Compliance with Oracle Database 12c

Administrator s Guide Release

An Oracle White Paper June Oracle Database 11g: Cost-Effective Solutions for Security and Compliance

Multi-Layer Security for Multi-Layer Attacks. Preston Hogue Dir, Cloud and Security Marketing Architectures

Enforcive /Cross-Platform Audit

Intelligent Security Design, Development and Acquisition

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

CON9488 The Enterprise Cloud Simplified with Oracle VM

Managing Oracle E-Business Suite Security

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

An Oracle White Paper June Security and Compliance with Oracle Database 12c

REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL

How To Manage A Privileged Account Management

Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals

Symantec Mobile Management Suite

8 Steps to Holistic Database Security

How To Manage Security On A Networked Computer System

Powered by. Incapsula Cloud WAF

Security F5 SECURITY SOLUTION GUIDE

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Guardium Change Auditing System (CAS)

Integrigy Corporate Overview

PCI Requirements Coverage Summary Table

Oracle Information Security Visioni

MySQL Strategy. Morten Andersen, MySQL Enterprise Sales. Copyright 2014 Oracle and/or its affiliates. All rights reserved.

Application Security Manager ASM. David Perodin F5 Engineer

<Insert Picture Here> Managing Storage in Private Clouds with Oracle Cloud File System OOW 2011 presentation

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

F5 and Microsoft Exchange Security Solutions

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Application Monitoring for SAP

Securely maintaining sensitive financial and

Datacenter Transformation

Oracle Audit Vault Administrator s Guide Oracle Audit Vault Auditor s Guide Oracle Enterprise Manager Cloud Control Administrator s Guide

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Auditing the Security of an SAP HANA Implementation

Windows Least Privilege Management and Beyond

<Insert Picture Here> Oracle Cloud Storage. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska

Trust but Verify: Best Practices for Monitoring Privileged Users

Securing and protecting the organization s most sensitive data

Symantec Mobile Security

QuickBooks Online: Security & Infrastructure

Threat Center. Real-time multi-level threat detection, analysis, and automated remediation

Vormetric Data Security

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Oracle Database 11g: Security

CounterACT Plugin Configuration Guide for ForeScout Mobile Integration Module MaaS360 Version ForeScout Mobile

Transcription:

EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks

Agenda Oracle and F5 Partnership Oracle Access Manager and F5 BIG-IP Access Policy Manager Oracle Audit Vault and Database Firewall and F5 BIG-IP Application Security Manager Demo References and Resources Question and Answer

ORACLE AND F5 PARTNERSHIP

Oracle Stack User User User Web Server Virtualization Web Server Web Server Web Server Application Server Virtualization App. Server App. Server App. Server Database Server Virtualization Database Server Database Server Database Server

F5 occupies strategic points of control in the Oracle stack User User User Web Server Virtualization BIG-IP Web Server Web Server Web Server Application Server Virtualization BIG-IP App. Server App. Server App. Server Database Server Virtualization BIG-IP Database Server Database Server Database Server

F5 and Oracle are Engineered to Perform Together

Oracle and F5 Partnership Ten year global partnership with continuous engagement across teams in product management, product development, sales, marketing, and support F5 solutions fill the white space in the comprehensive Oracle technology stack F5.com/Oracle F5 and Oracle go-to-market together in trade shows, field marketing events, and customer webinars F5 and Oracle have established a field engagement office to help respective field teams get connected and deliver joint solutions to customers F5 runs its business on Oracle. Oracle On Demand, and Oracle Cloud with F5. 47 of the Fortune 50 run Oracle with F5

ORACLE ACCESS MANAGER AND F5 BIG-IP ACCESS POLICY MANAGER

Oracle Access Manager 11gR2 Key Features Oracle Access Manager Simplified Web Single Sign On (SSO) Authentication and Authorization Central Policy Administration Advanced Session Management Windows Native Authentication Comprehensive Auditing and Logging Mobile and Social integration 10 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12

F5 BIG-IP Access Policy Manager BIG-IP Access Policy Manager (APM) SSL-VPN End point inspection, remediation Clients for Windows, Mac, ios, and Android Policy engine for access control Single sign-on IPv6 support Integration with Oracle Access Manager

Oracle and F5 Integrated Solution

ORACLE AUDIT VAULT AND DATABASE FIREWALL AND F5 BIG-IP APPLICATION SECURITY MANAGER

Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management 14 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Oracle Database Security Solutions Detect and Block Threats, Alert, Audit and Report PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management 15 Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Database Activity Monitoring and Firewall Detective Control for Oracle and non-oracle Databases Oracle Audit Vault and Database Firewall Monitors network traffic, detect and block unauthorized activity Highly accurate SQL grammar analysis Can detect/stop SQL injection attacks Whitelist approach to enforce activity Blacklists for managing high risk activity Scalable secure software appliance Users Apps SQL Analysis Whitelist Blacklist Allow Log Alert Substitute Block Policy Factors 16 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12

Audit, Report, and Alert in Real-Time Detective Control for Oracle and non-oracle Databases Oracle Audit Vault and Database Firewall Centralized secure repository delivered as secure, scalable software appliance Powerful alerting - thresholds, group-by Out-of-the box and custom reports Consolidated multi-source reporting Built-in fine grain segregation of duties Audit Data & Event Logs Oracle Database Firewall OS & Storage Directories Databases Custom! Alerts Built-in Reports Custom Reports Policies SOC Auditor Security Analyst 17 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12

Oracle Audit Vault and Database Firewall New Solution for Oracle and Non-Oracle Databases Users Applications Database Firewall Allow Log Alert Substitute Block Firewall Events SOC Alerts! Auditor Security Analyst Built-in Reports Custom Reports Policies Audit Vault Audit Data OS, Directory, File System & Custom Audit Logs 18 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12

Oracle Audit Vault and Database Firewall Comprehensive Enterprise Audit and Log Consolidation Databases: Oracle, SQL Server, DB2 LUW, Sybase ASE New Audit Sources Operating Systems: Microsoft Windows, Solaris Directory Services: Active Directory File Systems: Oracle ACFS Audit Collection Plugins for Custom Audit Sources XML file maps custom audit elements to canonical audit elements Collect and map data from XML audit file and database tables 19 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12

F5 BIG-IP Application Security Manager Provides comprehensive protection for all web application vulnerabilities, such as (D)DoS, cross-site scripting, cookie tampering, and web scraping Allows the security team to secure a website without changing the application code Logs and reports all application traffic, attacks and usernames PCI compliance Integration with Oracle Audit Vault and Database Firewall

Oracle and F5 Integrated Solution When WAF detects a SQL injection pattern, the user s metadata is logged to the Oracle Database Firewall Oracle Database Firewall analyzes the SQL and applies the policy rule Logged events can then be correlated in the reports

DEMO

References and Resources Solution Overview: Providing High-Performance Access Management for Oracle http://www.f5.com/pdf/solution-center/f5-oracle-solution-overview.pdf White Paper: Streamlining Oracle Web Application Access Control http://www.f5.com/pdf/white-papers/oracle-access-management-apm-wp.pdf Technical Guide: Deploying the BIG-IP Access Policy Manager with Oracle Access Manager http://www.f5.com/pdf/deployment-guides/f5-oracle-oam-apm-dg.pdf Learning Video: F5 Access Policy Manager and Oracle Access Manager http://www.f5.com/news-press-events/web-media/webcasts/f5-apm-andoam.html

References and Resources Solution Profile: Protecting Web Applications with Oracle Database Firewall and BIG-IP ASM http://www.f5.com/pdf/solution-profiles/oracle-asm-database-sp.pdf White Paper: Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall http://www.f5.com/pdf/white-papers/oracle-application-data-security-wp.pdf Technical Guide: Deploying the BIG-IP Application Security Manager with Oracle Database Firewall http://www.f5.com/pdf/deployment-guides/oracle-database-firewall-dg.pdf Video: Oracle Database Firewall with F5 Application Security Manager http://www.f5.com/news-press-events/web-media/webcasts/integrationdemo-oracle-database-firewall-with-f5-asm.html

QUESTIONS?

THANK YOU!