GSMK. Cryptography Network Security. GSMK Oversight SS7 Firewall and Intrusion Detection System
|
|
- Darren Hood
- 6 years ago
- Views:
Transcription
1 Cryptography Network Security GSMK Firewall and Intrusion Detection System
2 GSMK Firewall and intrusion detection system to prevent attacks via interconnect. Protect your Network s Achilles Heel. With the technical foundation of the protocol going back to the 70s, today's increasing network complexity requires strict policies and new tools to prevent fraud, hijacking or service disruption and espionage. The original system definition for was never meant to offer authentication or access control. The protocol designers had a closed network in mind, with only trusted parties being connected. Those inherent system vulnerabilities have recently been publicly exposed, opening the door for systematic violation on a global scale. The tremendous growth of independent entities with access, including MVNOs and certain micro-operators, has made it easier for malicious actors to purposefully exploit the protocol's weaknesses. Investigations commissioned by major network operators have shown a rapid increase in -based attacks. Basic filtering of messages to counteract intruders is neither sufficient for protecting operators from the financial impacts nor can it guarantee the network's integrity in terms of data security (see page 4). Without dedicated detection and protection beyond basic filtering, the existing core infrastructure can no longer be trusted: Subscriber privacy violations and data theft Subscribers can be located down to street level and the location can be continuously tracked. IMEI serial numbers can be read out, including call status and hardware information. Illegal interception of calls and messages Messages can be read and calls can be forwarded to unauthorized third parties using a number of alternative methods, including manipulation of subscriber data and crypto key exfiltration. Billing fraud The financial impact on billing fraud is highly relevant. Possible -based manipulations of subscriber data include unauthorized pre-paid to post-paid conversion and USSD-based attacks on credit transfers. Denial of service (DoS) Targeted attacks via ISD/DSD or general overloading of signaling links have recently gained in popularity. System Key Features Carrier-grade intrusion protection Scalable system architecture Compatible with redundancy requirements Centralized remote management Graphical UI - intuitive system handling Nodes based on Erlang/OTP Support for queries to enable plausibility checks (double check on subscriber location) 1, alternative provisioning of shadow database Support for velocity checks 1 Element profiling Rate limiting function 1 TAC (Tracking Area Code) blocking 1 Resilience % uptime Carrier grade SLA, CARE, Incidents Full M3UA support to allow integration in M2PA support Anonymised reports High flexibility in rules and actions Full OSS and cloud orchestration support 1 available with GSMK Protect 02
3 The Solution As a renowned industry leader in the field of strong encryption and network security, GSMK developed the system to enable comprehensive detection of network anomalies and reliable protection of interconnections, finally transcending old-style filtering. The system architecture provides seamless integration into existing signaling structures and complies with redundancy requirements within load balanced setups. Detection and Protection Network operators can choose between two implementation variants: The non-invasive Detect solution with real-time inspection, alarming and logging, or the Protect solution with active stateful packet inspection firewalling, alarming and logging. System Design The network security system, building on a modular and scalable approach, consists of the Manager, which constitutes the centralized backend, as well as a number of a number of Detector or Protector nodes according to the number of interconnect nodes to be secured. Advanced Features The system allows TCAP transaction tracking, rate limiting 1, velocity checks and TAC blocking 1 Active Countermeasures Firewall operations, filter language with pre-defined templates and network element profiling. Installation and Architecture See the following pages for an overview of the overall system architecture. Nodes are being placed in proximity to existing s and are connected via SIGTRAN. Depending on the selected system setup, signaling traffic runs through the nodes or is just being analyzed (by-passing). The system is flexible in terms of local or geo redundancy and allows multi-site setups as well as cloud orchestration support. Deployment GSMK supports its customers before, during and after deployment with an advanced requirement analysis, full deployment support, training, system swing-in calibration and tailor-made SLAs. Lab Version Lab versions are available for testing and maintenance purposes. Software The Erlang/OTP-based software and runtime environment enable a highly parallel, fault-tolerant, real-time non-stop system with maximum availability and scalability for reliable attack detection and parametrization. Hardware Collector nodes ( Protector and Detector) and the backend ( Manager) are based on high-performance industrial appliances. Analysis and visualization A major step into state-of-the-art analysis is the right graphical representation of raw data. Only then data becomes information and complex systems can be handled without time-consuming trainings. The backend system provides a state-of-the-art HTML5-based user interface ( Frontend) enabling intuitive and centralized system management. Visualizations allow different levels of operation, e.g. filter configuration, filter grouping, graphing, logs, reports and system administration. 1 available with GSMK Protect 03
4 Protect versus Filtering and SMS Home Routing Standard tools and their effectiveness compared with Filtering SMS Home Routing GSMK 1 Retrieving IMSI / Address Subscriber tracking Billing Fraud detection (pre-paid changed to post-paid) Call and SMS interception via CAMEL DoS via ISD/DSD (Disable calls / SMS / data) Supplementary Services 2 Stealing subscribers via updatelocation Block network-internal messages Detect and block brute force and/or flooding attacks 1 available with Protect 2 E.g. setting call forwarding, executing USSD 3 E.g. Stealing Encryption keys, subscriber de-anonymisation 4 limited protection 5 not available 04
5 System Architecture Detect vs. Protect A Detection Setup S S Detector Node Detector Node Manager HTML Frontend Operator A Core Network S Operator B B Protection Setup Frontend Protector Node Manager S S Protector Node Core Network Operator C 05
6 User Interface Information visualization and system management 06
7 Hardware Information visualization and system management Detector or Protector Node High-grade applicance M2M Interface, Managed Code, 1RU rack mount, dual PSU, Raid 1, 4x ETH payload, 2x ETH control, dual firmware Manager Backend System Multi-Raid Setup, Databases, Storage, Shadow and Analyzer 07
8 - Gesellschaft für Sichere Mobile Kommunikation mbh Marienstrasse Berlin Germany Phone Telefax This document is provided for information purposes only, and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document, and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. The product names and logos mentioned in this document are trademarks or registered trademarks of their respective owners. V1.6_ _MSF This document is GSMK Classified Information and not for general circulation. Regional Representative / Distributor
VISUAL APPLICATION CREATION AND PUBLISHING FOR ANYONE
Oracle Autonomous Visual Builder Cloud Service provides an easy way to create and host web and mobile applications in a secure cloud environment. An intuitive visual development experience on top of a
More informationORACLE ENTERPRISE COMMUNICATIONS BROKER
ORACLE ENTERPRISE COMMUNICATIONS BROKER A CORE COMMUNICATIONS CONTROLLER KEY FEATURES Centralized dial plan management Centralized session routing and forking Multivendor UC protocol normalization SIP
More informationAchieving High Availability with Oracle Cloud Infrastructure Ravello Service O R A C L E W H I T E P A P E R J U N E
Achieving High Availability with Oracle Cloud Infrastructure Ravello Service O R A C L E W H I T E P A P E R J U N E 2 0 1 8 Revision History The following revisions have been made to this white paper
More informationOracle Database Vault
An Oracle White Paper July 2009 Oracle Database Vault Introduction... 3 Oracle Database Vault... 3 Oracle Database Vault and Regulations... 4 Oracle Database Vault Realms... 5 Oracle Database Vault Command
More informationMySQL CLOUD SERVICE. Propel Innovation and Time-to-Market
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
More informationNOSQL DATABASE CLOUD SERVICE. Flexible Data Models. Zero Administration. Automatic Scaling.
NOSQL DATABASE CLOUD SERVICE Flexible Data Models. Zero Administration. Automatic Scaling. Application development with no hassle... Oracle NoSQL Cloud Service is a fully managed NoSQL database cloud service
More informationOracle Learn Cloud. Taleo Release 16B.1. Release Content Document
Oracle Learn Cloud Taleo Release 16B.1 Release Content Document August 2016 TABLE OF CONTENTS REVISION HISTORY... 3 ORACLE LEARN CLOUD... 4 Widget Portability... 4 Updated Transcript Widget Credit Value
More informationOracle Communications Diameter Signaling Router
Oracle Communications Diameter Signaling Router Centralizing Diameter routing with cloud deployable Oracle Communications Diameter Signaling Router creates a secure signaling architecture that reduces
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationOracle Solaris 11: No-Compromise Virtualization
Oracle Solaris 11: No-Compromise Virtualization Oracle Solaris 11 is a complete, integrated, and open platform engineered for large-scale enterprise environments. Its built-in virtualization provides a
More informationAn Oracle White Paper October The New Oracle Enterprise Manager Database Control 11g Release 2 Now Managing Oracle Clusterware
An Oracle White Paper October 2009 The New Oracle Enterprise Manager Database Control 11g Release 2 Now Managing Oracle Clusterware Introduction Oracle Enterprise Manager provides a single, integrated
More informationOracle CIoud Infrastructure Load Balancing Connectivity with Ravello O R A C L E W H I T E P A P E R M A R C H
Oracle CIoud Infrastructure Load Balancing Connectivity with Ravello O R A C L E W H I T E P A P E R M A R C H 2 0 1 8 Oracle Cloud Infrastructure Ravello Cloud Service Oracle Cloud Infrastructure Ravello
More informationOracle Database Security Assessment Tool
Oracle Database Security Assessment Tool With data breaches growing every day along with the evolving set of data protection and privacy regulations, protecting business sensitive and regulated data is
More informationOracle Clusterware 18c Technical Overview O R A C L E W H I T E P A P E R F E B R U A R Y
Oracle Clusterware 18c Technical Overview O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 8 Table of Contents Introduction 1 Cluster Domains 3 Conversions 3 Oracle ACFS Remote Service 5 Single Network
More informationApplication Container Cloud
APPLICATION CONTAINER CLOUD Application Container Cloud with Java SE and Node The Best Java SE and Node Cloud. Get the choice of either Oracle Java SE Advanced, including Flight Recorder for production
More informationOracle API Platform Cloud Service
Oracle API Platform Cloud Service Oracle API Platform Cloud Service provides a foundation for Digital Transformation through the first API Management offering that comprises the Full API Lifecycle. Encompassing
More informationSecurity Guide SAP Supplier InfoNet
SAP Supplier InfoNet Table of Contents 1 About this document....3 2 Network and communication security....4 2.1 Network security....4 2.2 Communication channel security....4 2.3 Network resource security....4
More informationAn Oracle White Paper June Enterprise Database Cloud Deployment with Oracle SuperCluster T5-8
An Oracle White Paper June 2013 Enterprise Database Cloud Deployment with Oracle SuperCluster T5-8 Introduction Databases form the underlying foundation for most business applications by storing, organizing,
More informationOracle Mobile Application Framework
Oracle Mobile Application Framework Oracle Mobile Application Framework (Oracle MAF) is a hybrid-mobile development framework that enables development teams to rapidly develop single-source applications
More informationSun Fire X4170 M2 Server Frequently Asked Questions
Overview Faced with ever increasing computing needs and budget constraints, companies today want to set up infrastructures that offer optimal value, can easily be re-purposed, and have reduced complexity.
More informationORACLE FABRIC MANAGER
ORACLE FABRIC MANAGER MANAGE CONNECTIVITY IN REAL TIME KEY BENEFITS Control connectivity across servers from a single screen. Instantly replicate connectivity configurations across a group of servers with
More informationAn Oracle Technical White Paper October Sizing Guide for Single Click Configurations of Oracle s MySQL on Sun Fire x86 Servers
An Oracle Technical White Paper October 2011 Sizing Guide for Single Click Configurations of Oracle s MySQL on Sun Fire x86 Servers Introduction... 1 Foundation for an Enterprise Infrastructure... 2 Sun
More informationSee What's Coming in Oracle CPQ Cloud
See What's Coming in Oracle CPQ Cloud Release 2015 R1 Release Content Document 1 TABLE OF CONTENTS ORACLE CPQ CLOUD... 3 End User Enhancements... 3 Desktop Performance Enhancements... 3 Easy Administration...
More informationAchieving End-to-End Security in the Internet of Things (IoT)
Achieving End-to-End Security in the Internet of Things (IoT) Optimize Your IoT Services with Carrier-Grade Cellular IoT June 2016 Achieving End-to-End Security in the Internet of Things (IoT) Table of
More informationPositive Technologies Telecom Attack Discovery DATA SHEET
Positive Technologies Telecom Attack Discovery DATA SHEET PT TELECOM ATTACK DISCOVERY DATA SHEET CELLULAR NETWORK SECURITY COMPLICATIONS As is shown in the network analysis performed by Positive Technologies
More informationCorente Cloud Services Exchange
Corente Cloud Services Exchange Oracle s Corente Cloud Services Exchange (Corente CSX) is a cloud-based service that enables distributed enterprises to deliver trusted IPSec VPN connectivity services to
More informationOracle Service Cloud Agent Browser UI. November What s New
Oracle Service Cloud Agent Browser UI November 2017 What s New TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 3 WORKSPACES... 3 Rowspan Workspace Designer Configuration Option... 3 Best Answer Incident
More informationOracle Financial Consolidation and Close Cloud. What s New in the November Update (16.11)
Oracle Financial Consolidation and Close Cloud What s New in the November Update (16.11) November 2016 TABLE OF CONTENTS REVISION HISTORY... 3 ORACLE FINANCIAL CONSOLIDATION AND CLOSE CLOUD, NOVEMBER UPDATE...
More informationCreate Individual Membership. This step-by-step guide takes you through the process to create an Individual Membership.
Create Individual Membership This step-by-step guide takes you through the process to create an Individual Membership. Before you start Have you checked the Oracle Academy New Membership Reference Guide
More informationOracle Mobile Hub. Complete Mobile Platform
Oracle Mobile Hub Mobile is everywhere and has changed nearly every facet of our lives. The way we work, play, socialize and interact with one another have all been revolutionized by mobile devices. More
More informationIncreasing Network Agility through Intelligent Orchestration
Increasing Network Agility through Intelligent Orchestration The Oracle Communications Application Orchestrator advantage ORACLE WHITE PAPER OCTOBER 2015 Table of Contents Introduction 1 Network Virtualization
More informationMission-Critical Databases in the Cloud. Oracle RAC in Microsoft Azure Enabled by FlashGrid Software.
Mission-Critical Databases in the Cloud. Oracle RAC in Microsoft Azure Enabled by FlashGrid Software. White Paper rev. 2017-10-16 2017 FlashGrid Inc. 1 www.flashgrid.io Abstract Ensuring high availability
More informationYour New Autonomous Data Warehouse
AUTONOMOUS DATA WAREHOUSE CLOUD Your New Autonomous Data Warehouse What is Autonomous Data Warehouse Autonomous Data Warehouse is a fully managed database tuned and optimized for data warehouse workloads
More informationExtreme Performance Platform for Real-Time Streaming Analytics
Extreme Performance Platform for Real-Time Streaming Analytics Achieve Massive Scalability on SPARC T7 with Oracle Stream Analytics O R A C L E W H I T E P A P E R A P R I L 2 0 1 6 Disclaimer The following
More informationAn Oracle White Paper September Security and the Oracle Database Cloud Service
An Oracle White Paper September 2012 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database
More informationCONTAINER CLOUD SERVICE. Managing Containers Easily on Oracle Public Cloud
CONTAINER CLOUD SERVICE Managing on Why Container Service? The cloud application development and deployment paradigm is changing. Docker containers make your operations teams and development teams more
More informationOracle Utilities CC&B V2.3.1 and MDM V2.0.1 Integrations. Utility Reference Model Synchronize Master Data
Oracle Utilities CC&B V2.3.1 and MDM V2.0.1 Integrations Utility Reference Model 5.6.4 Synchronize Master Data October 2011 Oracle Utilities CC&B V2.3.1 to MDM V2.0.1 Integration Utility Reference Model
More information1-7 Attacks on Cryptosystems
1-7 Attacks on Cryptosystems In the present era, not only business but almost all the aspects of human life are driven by information. Hence, it has become imperative to protect useful information from
More informationAUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE
AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated
More informationAn Oracle White Paper November Primavera Unifier Integration Overview: A Web Services Integration Approach
An Oracle White Paper November 2012 Primavera Unifier Integration Overview: A Web Services Integration Approach Introduction Oracle s Primavera Unifier offers an extensible interface platform based on
More informationINTEGRATION CLOUD SERVICE. Accelerate Your Application Integration Across the Cloud and On Premises
INTEGRATION CLOUD SERVICE Accelerate Your Application Across the Cloud and On Premises With Oracle Cloud Service you can innovate at a faster pace. Oracle Cloud Service gives you a powerful and intuitive
More informationAn Oracle White Paper October Minimizing Planned Downtime of SAP Systems with the Virtualization Technologies in Oracle Solaris 10
An Oracle White Paper October 2010 Minimizing Planned Downtime of SAP Systems with the Virtualization Technologies in Oracle Solaris 10 Introduction When business-critical systems are down for a variety
More informationRepairing the Broken State of Data Protection
Repairing the Broken State of Data Protection April 2016 Oracle s modern data protection solutions address both business continuity and disaster recovery, reducing IT costs and simplifying data protection
More informationORACLE DATABASE LIFECYCLE MANAGEMENT PACK
ORACLE DATABASE LIFECYCLE MANAGEMENT PACK ORACLE DATABASE LIFECYCLE MANAGEMENT PACK KEY FEATURES Auto Discovery of hosts Inventory tracking and reporting Database provisioning Schema and data change management
More informationMigrating VMs from VMware vsphere to Oracle Private Cloud Appliance O R A C L E W H I T E P A P E R O C T O B E R
Migrating VMs from VMware vsphere to Oracle Private Cloud Appliance 2.3.1 O R A C L E W H I T E P A P E R O C T O B E R 2 0 1 7 Table of Contents Introduction 2 Environment 3 Install Coriolis VM on Oracle
More informationSecurity for SIP-based VoIP Communications Solutions
Tomorrow Starts Today Security for SIP-based VoIP Communications Solutions Enterprises and small to medium-sized businesses (SMBs) are exposed to potentially debilitating cyber attacks and exploitation
More informationAn Oracle White Paper September, Oracle Real User Experience Insight Server Requirements
An Oracle White Paper September, 2011 Oracle Real User Experience Insight Server Requirements Executive Overview Oracle Enterprise Manager is Oracle s integrated enterprise IT management product line and
More informationTABLE OF CONTENTS DOCUMENT HISTORY 3
TABLE OF CONTENTS DOCUMENT HISTORY 3 UPDATE 18A 3 Revision History 3 Overview 3 Order Management 4 Test to Production Rule Migration 4 Pricing 4 Improve Price List Import 4 Manage Pricing Rules and Pricing
More informationOracle Data Masking and Subsetting
Oracle Data Masking and Subsetting Frequently Asked Questions (FAQ) S E P T E M B E R 2 0 1 6 Product Overview Q: What is Data Masking and Subsetting? A: Data Masking or Static Data Masking is the process
More informationOracle Financial Consolidation and Close Cloud. What s New in the December Update (16.12)
Oracle Financial Consolidation and Close Cloud What s New in the December Update (16.12) December 2016 TABLE OF CONTENTS REVISION HISTORY... 3 ORACLE FINANCIAL CONSOLIDATION AND CLOSE CLOUD, DECEMBER UPDATE...
More informationOracle Big Data SQL. Release 3.2. Rich SQL Processing on All Data
Oracle Big Data SQL Release 3.2 The unprecedented explosion in data that can be made useful to enterprises from the Internet of Things, to the social streams of global customer bases has created a tremendous
More informationExpress Monitoring 2019
Express Monitoring 2019 WHY CHOOSE PT EXPRESS MONITORING PT Express Monitoring provides a quick evaluation of the current signaling network protection level. This service helps to discover critical vulnerabilities
More informationOracle Enterprise Performance Reporting Cloud. What s New in September 2016 Release (16.09)
Oracle Enterprise Performance Reporting Cloud What s New in September 2016 Release (16.09) August 2016 TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 4 Give Us Feedback... 4 RELEASE FEATURE SUMMARY...
More informationStorageTek ACSLS Manager Software
StorageTek ACSLS Manager Software Management of distributed tape libraries is both time-consuming and costly involving multiple libraries, multiple backup applications, multiple administrators, and poor
More informationJD EDWARDS ENTERPRISEONE USER EXPERIENCE
JD EDWARDS ENTERPRISEONE USER EXPERIENCE KEY FEATURES AND BENEFITS Highly interactive interface that leverages Dynamic HTML provides immediate feedback to the user. EnterpriseOne Pages provide a single
More informationDeploy VPN IPSec Tunnels on Oracle Cloud Infrastructure. White Paper September 2017 Version 1.0
Deploy VPN IPSec Tunnels on Oracle Cloud Infrastructure White Paper September 2017 Version 1.0 Disclaimer The following is intended to outline our general product direction. It is intended for information
More informationSee What's Coming in Oracle Taleo Business Edition Cloud Service
See What's Coming in Oracle Taleo Business Edition Cloud Service Release 15B2 Release Content Document October 2015 TABLE OF CONTENTS REVISION HISTORY... 3 TALEO BUSINESS EDITION... 4 CAREERS WEBSITE...
More informationOracle GoldenGate for Big Data
Oracle GoldenGate for Big Data The Oracle GoldenGate for Big Data 12c product streams transactional data into big data systems in real time, without impacting the performance of source systems. It streamlines
More informationCreate Faculty Membership Account. This step-by-step guide takes you through the process to create a Faculty Membership Account.
Create Faculty Membership Account This step-by-step guide takes you through the process to create a Faculty Membership Account. Before you start Have you checked the Oracle Academy New Membership Reference
More informationAPPLICATION BUILDER CLOUD. Application Creation Made Easy
APPLICATION BUILDER CLOUD Application Creation Made Easy Today s environment demands that your business... be able to adjust quickly to evolving requirements from the market, from your customers, as well
More informationMulti-Layer Security Protection for Signaling Networks
Multi-Layer Security Protection for Signaling Networks All-IP Invites Innovation, but also More Vulnerabilities O R A C L E W H I T E P A P E R J A N U A R Y 2 0 1 6 Table of Contents Introduction 2 Access
More informationHighly Available Mobile Services Infrastructure Using Oracle Berkeley DB O R A C L E W H I T E P A P E R J A N U A R Y
Highly Available Mobile Services Infrastructure Using Oracle Berkeley DB O R A C L E W H I T E P A P E R J A N U A R Y 2 0 1 7 Introduction The rapid spread of wireless voice and data networking teaches
More informationOracle TimesTen Scaleout: Revolutionizing In-Memory Transaction Processing
Oracle Scaleout: Revolutionizing In-Memory Transaction Processing Scaleout is a brand new, shared nothing scale-out in-memory database designed for next generation extreme OLTP workloads. Featuring elastic
More informationSECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON
White Paper SECURE, FLEXIBLE ON-PREMISE STORAGE WITH EMC SYNCPLICITY AND EMC ISILON Abstract This white paper explains the benefits to the extended enterprise of the on-premise, online file sharing storage
More informationOracle Database Appliance X6-2S / X6-2M ORACLE ENGINEERED SYSTEMS NOW WITHIN REACH FOR EVERY ORGANIZATION
Oracle Database Appliance X6-2S / X6-2M ORACLE ENGINEERED SYSTEMS NOW WITHIN REACH FOR EVERY ORGANIZATION Introduction The Oracle Database Appliance, introduced in 2011, is an Oracle Engineered System
More informationOverview. Implementing Fibre Channel SAN Boot with the Oracle ZFS Storage Appliance. January 2014 By Tom Hanvey; update by Peter Brouwer Version: 2.
Implementing Fibre Channel SAN Boot with the Oracle ZFS Storage Appliance January 2014 By Tom Hanvey; update by Peter Brouwer Version: 2.0 This paper describes how to implement a Fibre Channel (FC) SAN
More informationHow to Monitor Oracle Private Cloud Appliance with Oracle Enterprise Manager 13c O R A C L E W H I T E P A P E R J U L Y
How to Monitor Oracle Private Cloud Appliance with Oracle Enterprise Manager 13c O R A C L E W H I T E P A P E R J U L Y 2 0 1 8 Introduction 2 Configuration of Oracle Enterprise Manager 13c to discover
More informationCOMPUTE CLOUD SERVICE. Moving to SPARC in the Oracle Cloud
COMPUTE CLOUD SERVICE Moving to A new way forward: SPARC in the. Does your IT organization support mission-critical applications that would benefit from the unsurpassed security performance of SPARC servers
More informationOracle Express CPQ for Salesforce.com
Oracle Express CPQ for Salesforce.com Spring 16 Release Content Document January 2016 1 TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 4 GENERAL... 4 Quote Paths... 4 CONFIGURATION... 5 Lightning
More informationRobotic Zoning in a TFinity ExaScale Tape Library
Robotic Zoning in a TFinity ExaScale Tape Library August 2018 Table of Contents Abstract:... 3 Operation:... 3 TFinity ExaScale:... 6 Copyright 2018 Spectra Logic Corporation. All rights reserved worldwide.
More informationRAC Database on Oracle Ravello Cloud Service O R A C L E W H I T E P A P E R A U G U S T 2017
RAC Database on Oracle Ravello Cloud Service O R A C L E W H I T E P A P E R A U G U S T 2017 Oracle Ravello is an overlay cloud that enables enterprises to run their VMware and KVM applications with data-center-like
More informationMySQL ENTERPRISE EDITION
MySQL ENTERPRISE EDITION THE WORLD S MOST POPULAR OPEN SOURCE DATABASE HIGHLIGHTS Oracle MySQL Service Cloud MySQL Database MySQL Document Store MySQL Enterprise Backup MySQL Enterprise High Availability
More informationDATA INTEGRATION PLATFORM CLOUD. Experience Powerful Data Integration in the Cloud
DATA INTEGRATION PLATFORM CLOUD Experience Powerful Integration in the Want a unified, powerful, data-driven solution for all your data integration needs? Oracle Integration simplifies your data integration
More informationOracle Responsys. Release 18B. New Feature Summary ORACLE
Oracle Responsys Release 18B New Feature Summary ORACLE TABLE OF CONTENTS Revision History 4 Overview 4 APIs 4 New Throttling Limits for Web Services APIs 4 New Asynchronous Web Services APIs 5 New REST
More informationIngate SIParator /Firewall SIP Security for the Enterprise
Ingate SIParator /Firewall SIP Security for the Enterprise Ingate Systems Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?... 3 3
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationOracle Big Data Connectors
Oracle Big Data Connectors Oracle Big Data Connectors is a software suite that integrates processing in Apache Hadoop distributions with operations in Oracle Database. It enables the use of Hadoop to process
More informationOctober Oracle Application Express Statement of Direction
October 2017 Oracle Application Express Statement of Direction Disclaimer This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle.
More informationBT Compute Protect Schedule to the General Terms
BT Compute Protect Schedule to the General Terms Contents A note on you... 2 Words defined in the General Terms... 2 Part A The BT Compute Protect Service... 2 1 Service Summary... 2 2 Standard Service
More informationOracle Hospitality Cruise Fine Dining System Security Guide Release E
Oracle Hospitality Cruise Fine Dining System Security Guide Release 9.0.2.29 E99054-01 August 2018 Copyright 2015, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationOracle Developer Studio 12.6
Oracle Developer Studio 12.6 Oracle Developer Studio is the #1 development environment for building C, C++, Fortran and Java applications for Oracle Solaris and Linux operating systems running on premises
More information5 OAuth Essentials for API Access Control
5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows
More informationSolutions Business Manager Web Application Security Assessment
White Paper Solutions Business Manager Solutions Business Manager 11.3.1 Web Application Security Assessment Table of Contents Micro Focus Takes Security Seriously... 1 Solutions Business Manager Security
More informationOracle Hospitality Cruise Meal Count System Security Guide Release 8.3 E
Oracle Hospitality Cruise Meal Count System Security Guide Release 8.3 E99233-01 August 2018 Copyright 2015, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationOracle Cloud Infrastructure Virtual Cloud Network Overview and Deployment Guide ORACLE WHITEPAPER JANUARY 2018 VERSION 1.0
Oracle Cloud Infrastructure Virtual Cloud Network Overview and Deployment Guide ORACLE WHITEPAPER JANUARY 2018 VERSION 1.0 Table of Contents Purpose of this Whitepaper 1 Scope & Assumptions 1 Virtual Cloud
More informationOracle WebLogic Server Multitenant:
Oracle WebLogic Server Multitenant: The World s First Cloud-Native Enterprise Java Platform KEY BENEFITS Enable container-like DevOps and 12-factor application management and delivery Accelerate application
More informationCogniFit Technical Security Details
Security Details CogniFit Technical Security Details CogniFit 2018 Table of Contents 1. Security 1.1 Servers........................ 3 1.2 Databases............................3 1.3 Network configuration......................
More informationRevision History Overview Feature Summary Knowledge Management Policy Automation Platform Agent Browser Workspaces Agent Browser Desktop Automation
TABLE OF CONTENTS Revision History 3 Overview 3 Feature Summary 3 Knowledge Management 5 Implement Sitemap XML in Web Collection Crawling 5 Searchable Product Tags 5 Policy Automation 5 Integration Cloud
More informationORACLE SOLARIS CLUSTER
Oracle Solaris Cluster is a comprehensive high availability and disaster recovery solution for Oracle's SPARC and x86 environments based on Oracle Solaris. It combines extreme service availability for
More informationHandling Memory Ordering in Multithreaded Applications with Oracle Solaris Studio 12 Update 2: Part 2, Memory Barriers and Memory Fences
An Oracle White Paper September 2010 Handling Memory Ordering in Multithreaded Applications with Oracle Solaris Studio 12 Update 2: Part 2, Memory Introduction... 1 What Is Memory Ordering?... 2 More About
More informationNGN: Carriers and Vendors Must Take Security Seriously
Research Brief NGN: Carriers and Vendors Must Take Security Seriously Abstract: The next-generation network will need to provide security on many levels. A comprehensive set of standards should be in place
More informationOracle Grid Infrastructure 12c Release 2 Cluster Domains O R A C L E W H I T E P A P E R N O V E M B E R
Oracle Grid Infrastructure 12c Release 2 Cluster Domains O R A C L E W H I T E P A P E R N O V E M B E R 2 0 1 7 Table of Contents Introduction 2 Clustering with Oracle Clusterware 12c Release 2 3 Oracle
More informationOracle Communications Services Gatekeeper
Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or
More informationCombating Cyber Risk in the Supply Chain
SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an
More informationOracle FLEXCUBE Direct Banking Release Dashboard Widgets Transfer Payments User Manual. Part No. E
Oracle FLEXCUBE Direct Banking Release 12.0.0 Dashboard Widgets Transfer Payments User Manual Part No. E52305-01 Dashboard Widgets User Manual Table of Contents 1. Transaction Host Integration Matrix...
More informationSecure Network Design Document
Secure Network Design Document May 3, 2007 Authored by: Steven Puzio TABLE OF CONTENTS I. Overview... 3 II. Company Information... 5 III. Wiring Closet Cabling and Design... 6 IV. Network Electronics Selection...
More informationOracle Database Vault with Oracle Database 12c ORACLE WHITE PAPER MAY 2015
Oracle Database Vault with Oracle Database 12c ORACLE WHITE PAPER MAY 2015 Table of Contents Introduction 1 Controls for Privileged Accounts 2 Privilege User Access Controls on Application Data with Realms
More informationSteelGate Overview. Manage perimeter security and network traffic to ensure operational efficiency, and optimal Quality of Service (QoS)
Internet Communications Made Safe SteelGate Overview SteelGate Overview SteelGate is a high-performance VPN firewall appliance that Prevent Eliminate threats & attacks at the perimeter Stop unauthorized
More informationOracle Grid Infrastructure Cluster Domains O R A C L E W H I T E P A P E R F E B R U A R Y
Oracle Grid Infrastructure Cluster Domains O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 8 Table of Contents Introduction 1 Clustering with Oracle Clusterware 3 Oracle Grid Infrastructure Architectures
More informationVideo-Aware Networking: Automating Networks and Applications to Simplify the Future of Video
Video-Aware Networking: Automating Networks and Applications to Simplify the Future of Video The future of video is in the network We live in a world where more and more video is shifting to IP and mobile.
More information