Upload
others
View
12
Download
0
Embed Size (px)
Citation preview
The Oracle Trust FabricSecuring the Cloud Journey
Eric Olden
Senior Vice President and General Manager
Cloud Security and Identity
26.11.2018
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | 2
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
The Challenges Ahead
• More scale and complexity
• More diverse bad guys: hackers, data thieves, bit coin, state actors
• Driving more noise and increased attack surface, leading to more risk
3
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Oracle CTO and Chairman Larry Ellison
“The way to secure our data, the way to prevent data theft, is more
automation. And we need a cyber-defense system that automatically
detects vulnerabilities and attacks. Fix the vulnerability before an attack.
And then, if there is an attack, detect the attack and shut it down.”
“…we need new systems. It can’t be our people versus their computers.
We’re going to lose that war. It’s got to be our computers versus their
computers. And make no mistake: It’s a war.”
4
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
A New Cloud World
• Security in a post-perimeter world
– Network protections are insufficient in a cloud and mobile world
– Identity has become the new perimeter
• Next generation of cloud is needed to meet today’s scale and speed
– Smart, self-healing, and scalable
– Security must be built-in at every level
5
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
The Promise of the Trust Fabric
A new way of secure enterprise computing built for the cloud
• Trusted
• Agile
• Compliant
6
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
1. Secure the Whole Cloud Stack
• Data security—encrypted and controlled
• Infrastructure security—managed, visible, and compliant
• Application security—integrated, visible, compliant, and secure
• User security—identity management and access control
• Ecosystem security—holistic security across the cloud continuum
2. Secure All Your Environments and Applications
• Adopt a platform that allows you to pick and choose solutions that matter
• Secure all your apps and all your users (employees, partners, and customers)
• Span the continuum from on premises to multicloud
3. Intelligent Security
• Machine Learning
• Applied AI
• Data Driven Automation
The Ideal Cloud Security and Identity Platform
7
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | 8
Trust Fabric’s LAYERED SECURITY MODEL
Cloud Visibility and Data-Loss Prevention
Cloud Monitoring and Log Analytics
Identity and Access Management
Encryption Key Management
Data Security and Encryption
Sensitive Data
Cloud Application Firewall
Cloud Infrastructure Security
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Trust Fabric Across Cloud / Hybrid / Enterprise
HYBRID
CLOUDENTERPRISE
Unified Security Across the Entire Cloud Journey
• Secure the cloud and multicloud world
• Secure enterprise infrastructure
• Bridge the cloud and the enterprise with hybrid
9
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Oracle Cloud Security and Identity Platform
Cloud SecurityUser Security
Cloud Infrastructure-Level Security
Advanced IaaS and DDOS Protection
Security PostureApps/data/user activity analytics, threat intelligence, and compliance
Security Monitoring and Analytics Cloud Service
CASB Cloud Service
Identity Cloud Service
App Security
Cloud ApplicationFirewall
Data Security
Encryption andKey Management
10
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Reduce MTTD and MTTR
• Mean time to detection
• Mean time to resolution
Continual Detection and Response
• Oracle Management Cloud• Configuration and compliance
• Security monitoring and analytics
• CASB• Continual detection of cloud
usage
• Anomaly detection on behavior
• WAF• Web application firewall
• Distributed denial of service (DDoS)
Automated Adaptive Remediation
• CASB
• Risk score
• Adaptive authentication
• Orchestration Cloud
• Automated ticket creation for investigation and remediation
• Autonomous Database• Automate patching
• Zero down time
Rapid Detection and ResponseApp
internals(security posture)
Firewalls 3rd party threat feed
Data classification
Normalized, categorized data clusters
Forecasts: high-risk user accounts and data
Threats, anomalies, and recommendations
11
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
1) Integrated Security Portfolio
Complete Security Portfolio
• Identity management
• Cloud security
• Encryption / KMS
• Monitoring and analytics
• Cloud infrastructure
2) Integrating Security Across Oracle Apps and Services
Integrated Security for Oracle
• Database
• SaaS apps
• PaaS services
• IaaS resources
• Enterprise apps
• CX apps
• Vertical apps
3) Integrate Across the Cloud Journey
Pure Cloud
• Multicloud: Azure, AWS, IBM
• Multi-SaaS: Salesforce…
• Oracle Cloud
Hybrid
• Edge
• Cross-perimeter integration
Enterprise
• On premises
Integrated and Unified Trust for the Cloud
12
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Billions invested in next-generation cloud data centers
Enterprise-class support and service
World’s leading enterprise software portfolio and platform
extended to the cloud
Leveraging Oracle’s Global Reach and Presence
13
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Trust
• Proactive security
• Reliable security
• Uptime
Agile
• Supports your cloud journey
• Loosely coupled
• Rapid innovation cycles
Compliance
• Prove controls globally
• Accelerate time to audit
• Decrease costs of audit and avoid fines
Benefits of the Oracle Trust Fabric
14