The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018
Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. 2
The Challenges Ahead More scale and complexity More diverse bad guys: hackers, data thieves, bit coin, state actors Driving more noise and increased attack surface, leading to more risk 3
Oracle CTO and Chairman Larry Ellison The way to secure our data, the way to prevent data theft, is more automation. And we need a cyber-defense system that automatically detects vulnerabilities and attacks. Fix the vulnerability before an attack. And then, if there is an attack, detect the attack and shut it down. we need new systems. It can t be our people versus their computers. We re going to lose that war. It s got to be our computers versus their computers. And make no mistake: It s a war. 4
Autonomous Cloud Is a New World Security in a post-perimeter world Network protections are insufficient in a cloud and mobile world Identity has become the new perimeter Next generation of cloud is needed to meet today s scale and speed Smart, self-healing, and scalable Security must be built-in at every level 5
The Promise of the Trust Fabric A new way of secure enterprise computing built for the cloud Trusted Agile Compliant 6
The Ideal Cloud Security and Identity Platform 1. Secure the Whole Cloud Stack Data security encrypted and controlled Infrastructure security managed, visible, and compliant Application security integrated, visible, compliant, and secure User security identity management and access control Ecosystem security holistic security across the cloud continuum 2. Secure All Your Environments and Applications Adopt a platform that allows you to pick and choose solutions that matter Secure all your apps and all your users (employees, partners, and customers) Span the continuum from on premises to multicloud 3. Intelligent and Autonomous Security Self-driving Self-securing Self-repairing Self-tuning Self-scaling 7
Trust Fabric s LAYERED SECURITY MODEL Cloud Monitoring and Log Analytics Cloud Infrastructure Security Cloud Application Firewall Cloud Visibility and Data-Loss Prevention Identity and Access Management Encryption Key Management Data Security and Encryption Sensitive Data 8
Trust Fabric Across Cloud / Hybrid / Enterprise Unified Security Across the Entire Cloud Journey Secure the cloud and multicloud world Secure enterprise infrastructure Bridge the cloud and the enterprise with hybrid ENTERPRISE CLOUD HYBRID 9
Oracle Cloud Security and Identity Platform Security Monitoring and Analytics Cloud Service Data Security User Security Cloud Security App Security Encryption and Key Management Identity Cloud Service CASB Cloud Service Cloud Application Firewall Cloud Infrastructure-Level Security Advanced IaaS and DDOS Protection Security Posture Apps/data/user activity analytics, threat intelligence, and compliance 10
Autonomous Rapid Detection and Response App internals (security posture) Firewalls Data classification 3 rd party threat feed Normalized, categorized data clusters Forecasts: high-risk user accounts and data Threats, anomalies, and recommendations Reduce MTTD and MTTR Mean time to detection Mean time to resolution Continual Detection and Response Oracle Management Cloud Configuration and compliance Security monitoring and analytics CASB Continual detection of cloud usage Anomaly detection on behavior WAF Web application firewall Distributed denial of service (DDoS) Automated Adaptive Remediation CASB Risk score Adaptive authentication Orchestration Cloud Automated ticket creation for investigation and remediation Autonomous Database Automate patching Zero down time 11
Integrated and Unified Trust for the Cloud 1) Integrated Security Portfolio Complete Security Portfolio Identity management Cloud security Encryption / KMS Monitoring and analytics Cloud infrastructure 2) Integrating Security Across Oracle Apps and Services Integrated Security for Oracle Database SaaS apps PaaS services IaaS resources Enterprise apps CX apps Vertical apps 3) Integrate Across the Cloud Journey Pure Cloud Multicloud: Azure, AWS, IBM Multi-SaaS: Salesforce Oracle Cloud Hybrid Edge Cross-perimeter integration Enterprise On premises 12
Leveraging Oracle s Global Reach and Presence Billions invested in nextgeneration cloud data centers Enterprise-class support and service World s leading enterprise software portfolio and platform extended to the cloud 13
Benefits of the Oracle Trust Fabric Trust Proactive security Reliable security Uptime Agile Supports your cloud journey Loosely coupled Rapid innovation cycles Compliance Prove controls globally Accelerate time to audit Decrease costs of audit and avoid fines 14
The Road Ahead Next-generation AI and machine learning Predictive analytics Multicloud integration and security 15