The Oracle Trust Fabric Securing the Cloud Journey

Similar documents
Best Practices in Securing a Multicloud World

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Oracle bakes security into its DNA

Machine learning-based adaptive intelligence: The future of cybersecurity

AKAMAI CLOUD SECURITY SOLUTIONS

Securing Your Digital Transformation

Security Readiness Assessment

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

VMware Hybrid Cloud Solution

Copyright 2018, Oracle and/or its affiliates. All rights reserved.

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

Data Management and Security in the GDPR Era

Securing Digital Transformation

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Build application-centric data centers to meet modern business user needs

A CISO GUIDE TO MULTI-CLOUD SECURITY Achieving Transparent Visibility and Control and Enhanced Risk Management

Building a Secure and Compliant Cloud Infrastructure. Ben Goodman Principal Strategist, Identity, Compliance and Security Novell, Inc.

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

How to Troubleshoot Databases and Exadata Using Oracle Log Analytics

Oracle Buys Palerra Extends Oracle Identity Cloud Service with Innovative Cloud Access Security Broker

SIEMLESS THREAT DETECTION FOR AWS

Enterprise & Cloud Security

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017

Spotlight Report. Information Security. Presented by. Group Partner

Solution Overview Cisco Tetration Analytics and AlgoSec: Business Application Connectivity Visibility, Policy Enforcement, and Business-Based Risk and

CHALLENGES GOVERNANCE INTEGRATION SECURITY

State of Cloud Adoption. Cloud usage is over 90%, are you ready?

Cisco Cloud Application Centric Infrastructure

Oracle Solaris Virtualization: From DevOps to Enterprise

The Emerging Role of a CDN in Facilitating Secure Cloud Deployments

2018 Cisco and/or its affiliates. All rights reserved.

Securing Your Most Sensitive Data

Cato Cloud. Software-defined and cloud-based secure enterprise network. Solution Brief

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

Go mobile. Stay in control.

Speaker Introduction Who Mate Barany, VMware Manuel Mazzolin, VMware Peter Schmitt, Deutsche Bahn Systel Why VMworld 2017 Understanding the modern sec

Secure & Unified Identity

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Microsoft Security Management

Qualys Cloud Platform

Transforming IT: From Silos To Services

We b Ap p A t ac ks. U ser / Iden tity. P hysi ca l 11% Other (VPN, PoS,infra.)

How SD-WAN will Transform the Network. And lead to innovative, profitable business outcomes

Cisco SD-WAN. Securely connect any user to any application across any platform, all with a consistent user experience.

Build a Software-Defined Network to Defend your Business

Copyright 2011, Oracle and/or its affiliates. All rights reserved.

2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE

Traditional Security Solutions Have Reached Their Limit

hcloud Deployment Models

IBM Power Systems: Open innovation to put data to work Dexter Henderson Vice President IBM Power Systems

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

WHY LEGACY SECURITY ARCHITECTURES ARE INADEQUATE IN A MULTI-CLOUD WORLD

8 Must Have. Features for Risk-Based Vulnerability Management and More

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Security. Made Smarter.

Oracle Real Application Clusters (RAC) 12c Release 2 What s Next?

Beyond a single cloud story Xavier Poisson Gouyou Beauchamps Vice President, Service Providers and March 13, 2018

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

How to Leverage Containers to Bolster Security and Performance While Moving to Google Cloud

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

Popular SIEM vs aisiem

Cloud Computing: Making the Right Choice for Your Organization

Third Party Cloud Services Its Adoption in the New Age

Securing Your Cloud Introduction Presentation

The Data Explosion. A Guide to Oracle s Data-Management Cloud Services

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

Safeguard Application Uptime and Consistent Performance

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Cisco Connected Factory Accelerator Bundles

Building a Resilient Security Posture for Effective Breach Prevention

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Accelerate GDPR compliance with the Microsoft Cloud Agustín Corredera

CSP 2017 Network Virtualisation and Security Scott McKinnon

Cognizant Cloud Security Solution

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

HOW CLOUD, MOBILITY AND SHIFTING APP ARCHITECTURES WILL TRANSFORM SECURITY: GAINING THE HOME-COURT ADVANTAGE

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

McAfee Public Cloud Server Security Suite

The security challenge in a mobile world

Optimisation drives digital transformation

Oracle Real Application Clusters (RAC) Your way to the Cloud

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Exam C Foundations of IBM Cloud Reference Architecture V5

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Angela McKay Director, Government Security Policy and Strategy Microsoft

Building a More Secure Cloud Architecture

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8

Building Hybrid Clouds

Security

Copyright 2017 Oracle and/or its affiliates. All rights reserved.

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

TRUE SECURITY-AS-A-SERVICE

Cisco Software-Defined Access

Cloud Security: Constant Innovation

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Secure Cloud Computing Architecture (SCCA)

with Advanced Protection

Transcription:

The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018

Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. 2

The Challenges Ahead More scale and complexity More diverse bad guys: hackers, data thieves, bit coin, state actors Driving more noise and increased attack surface, leading to more risk 3

Oracle CTO and Chairman Larry Ellison The way to secure our data, the way to prevent data theft, is more automation. And we need a cyber-defense system that automatically detects vulnerabilities and attacks. Fix the vulnerability before an attack. And then, if there is an attack, detect the attack and shut it down. we need new systems. It can t be our people versus their computers. We re going to lose that war. It s got to be our computers versus their computers. And make no mistake: It s a war. 4

Autonomous Cloud Is a New World Security in a post-perimeter world Network protections are insufficient in a cloud and mobile world Identity has become the new perimeter Next generation of cloud is needed to meet today s scale and speed Smart, self-healing, and scalable Security must be built-in at every level 5

The Promise of the Trust Fabric A new way of secure enterprise computing built for the cloud Trusted Agile Compliant 6

The Ideal Cloud Security and Identity Platform 1. Secure the Whole Cloud Stack Data security encrypted and controlled Infrastructure security managed, visible, and compliant Application security integrated, visible, compliant, and secure User security identity management and access control Ecosystem security holistic security across the cloud continuum 2. Secure All Your Environments and Applications Adopt a platform that allows you to pick and choose solutions that matter Secure all your apps and all your users (employees, partners, and customers) Span the continuum from on premises to multicloud 3. Intelligent and Autonomous Security Self-driving Self-securing Self-repairing Self-tuning Self-scaling 7

Trust Fabric s LAYERED SECURITY MODEL Cloud Monitoring and Log Analytics Cloud Infrastructure Security Cloud Application Firewall Cloud Visibility and Data-Loss Prevention Identity and Access Management Encryption Key Management Data Security and Encryption Sensitive Data 8

Trust Fabric Across Cloud / Hybrid / Enterprise Unified Security Across the Entire Cloud Journey Secure the cloud and multicloud world Secure enterprise infrastructure Bridge the cloud and the enterprise with hybrid ENTERPRISE CLOUD HYBRID 9

Oracle Cloud Security and Identity Platform Security Monitoring and Analytics Cloud Service Data Security User Security Cloud Security App Security Encryption and Key Management Identity Cloud Service CASB Cloud Service Cloud Application Firewall Cloud Infrastructure-Level Security Advanced IaaS and DDOS Protection Security Posture Apps/data/user activity analytics, threat intelligence, and compliance 10

Autonomous Rapid Detection and Response App internals (security posture) Firewalls Data classification 3 rd party threat feed Normalized, categorized data clusters Forecasts: high-risk user accounts and data Threats, anomalies, and recommendations Reduce MTTD and MTTR Mean time to detection Mean time to resolution Continual Detection and Response Oracle Management Cloud Configuration and compliance Security monitoring and analytics CASB Continual detection of cloud usage Anomaly detection on behavior WAF Web application firewall Distributed denial of service (DDoS) Automated Adaptive Remediation CASB Risk score Adaptive authentication Orchestration Cloud Automated ticket creation for investigation and remediation Autonomous Database Automate patching Zero down time 11

Integrated and Unified Trust for the Cloud 1) Integrated Security Portfolio Complete Security Portfolio Identity management Cloud security Encryption / KMS Monitoring and analytics Cloud infrastructure 2) Integrating Security Across Oracle Apps and Services Integrated Security for Oracle Database SaaS apps PaaS services IaaS resources Enterprise apps CX apps Vertical apps 3) Integrate Across the Cloud Journey Pure Cloud Multicloud: Azure, AWS, IBM Multi-SaaS: Salesforce Oracle Cloud Hybrid Edge Cross-perimeter integration Enterprise On premises 12

Leveraging Oracle s Global Reach and Presence Billions invested in nextgeneration cloud data centers Enterprise-class support and service World s leading enterprise software portfolio and platform extended to the cloud 13

Benefits of the Oracle Trust Fabric Trust Proactive security Reliable security Uptime Agile Supports your cloud journey Loosely coupled Rapid innovation cycles Compliance Prove controls globally Accelerate time to audit Decrease costs of audit and avoid fines 14

The Road Ahead Next-generation AI and machine learning Predictive analytics Multicloud integration and security 15