SlideShare una empresa de Scribd logo
1 de 26
Descargar para leer sin conexión
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Security Challenges
in Cloud
Virtualization Forum 2018
Gusztáv Szuhai
Oracle
Security solutions manager CEE
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for
information purposes only, and may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole discretion of Oracle.
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Agenda
New challenges and Oracle answers
Understand your security responsibilities
New center of cyber-defense: identity
Maximise intelligence-driven automation
Quick peek into the SOC
1
2
3
4
5
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Agenda
New challenges and Oracle answers
Understand your security responsibilities
New center of cyber-defense: identity
Maximise intelligence-driven automation
Quick peek into the SOC
1
2
3
4
5
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
The Oracle and KPMG Cloud Threat Report 2018
• Security, compliance issues that
impact orgs on their cloud journey
• Survey research of 450 global
security leaders/practitioners
Topics impacting organizations:
• Cloud adoption and keeping pace at scale
• Global threat landscape
• Role of identity management
• Cybersecurity best practices
• Emerging security technologies
www.Oracle.com/CTR
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
New Challenges and Oracle Answers
Increase IT Efficiency, Prevent Cyberattacks, Increase Autoremediation Capabilities
Transformation to Cloud
• Oracle becoming a provider
• Customers applying cloud-first or hybrid
strategies
Digitalization
• exploding # of end-points to secure
• new compliance requirements
Threat landscape changing
• automated, frequent, high-resourced
attacks
• 70% social engineering – identity theft
emerges as major threat
New Challenges
Autonomous Operation
• Self-managed DB and other products
• In wider context: less human interaction
more auto-remediation based on ML
Manageability
• predictive log analysis (BigData, ML)
• applicable patterns learnt elsewhere
Identity SOC
• highly automated security governance
• on-prem, cloud, hybrid – single UI
• Identity context, auto-remediation
New Answers
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Agenda
New challenges and Oracle answers
Understand your security responsibilities
New center of cyber-defense: identity
Maximise intelligence-driven automation
Quick peek into the SOC
1
2
3
4
5
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
• Your CSP needs to be
independently certified
ISO27001 (27017/18), SOC1/2
etc.
• Large organisations have complex
regulatory requirements e.g. GDPR
• For you to be trusted your whole
security management system
(ISMS) should also be certified to
the same standard
Compliance
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
on-premises, hybrid, multi-cloud
Shared Responsibility Model
Service configuration
Data
Apps
OS
Virtualization
Network
Infrastructure
Physical
Service configuration
Data
Apps
OS
Virtualization
Network
Infrastructure
Physical
Service configuration
Data
Apps
OS
Virtualization
Network
Infrastructure
Physical
SaaSPaaSIaaS
Customer
Cloud
Service
Provider
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Agenda
New challenges and Oracle answers
Understand your security responsibilities
New center of cyber-defense: identity
Maximise intelligence-driven automation
Quick peek into the SOC
1
2
3
4
5
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Users are the
new perimeter
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Security Intelligence Delivered with Identity
Prevent
Detect
Predict
Respond
NetworkUsers
Asset
(entity, data, or content)
Identity
SOC
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Agenda
New challenges and Oracle answers
Understand your security responsibilities
New center of cyber-defense: identity
Maximise intelligence-driven automation
Quick peek into the SOC
1
2
3
4
5
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Security Challenges
THREAT
EXPOSURE
85%
of breaches
exploited system
vulnerability where
patch was available
LIMITED
EXPERTISE
3.5 million
open cybersecurity
jobs
by 2021
INADEQUATE
TOOLS
86%
feel traditional tools
are not sufficient to
manage security
across the cloud
ALERT
OVERLOAD
16,937
average alerts per
week per
enterprise; only
19% reliable and 4%
investigated
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
01100100 01100001 01110100 01100001 0110010001100001 01110100 0100 01100001
01100100 01100001 01110100 01100001 0110010001100001 01011 01110100
110000101100100 01100001 01110100 110000101100100 01100001 01110100 01100001
0110010001100001 01110100 110000101100100 0100111 01100001 01110100
110000101100100 01100001 01110100 01100001 011010 0110010001100001 01110100
01100001 0110010001100001 01110100 01001 01100001 0110010001100001 01110100
01100001 0110010001100001 01001 01110100 01100001 0110010001100001 01110100
01100001 0100101001 001 0110010001100001 01110100 01100001 0110010001100001
01110100 010011 01100001 0110010001100001 01110100 01100001 01100100 01100001
01001 01110100 01100001 0110010001100001 01110100 01100001 01100100 0100 01100001
01110100 01100001 0110010001100001 01110100 01000100 0100 110000101100100
01100001 01110100 110000101100100 01100001 01110100 01100001 0110010001100001
01110100 110000101100100 01100001 010001 01110100 110000101100100 01100001
01110100 01100001 01000100 010011 0110010001100001 01110100 01100001
0110010001100001 01110100 01000 01110100 110000101100100 01100001 01110100
01100001 01000100 010011 0110010001100001 01110100 01100001 0110010001100001
01110100 010011
Next-Generation Unified Data
END USER
EXPERIENCE/ACTIVITY
APPLICATION
MIDDLE TIER
DATA TIER
VIRTUALIZATION
TIER
VM CONTAINER
INFRASTRUCTURE
TIER
VM CONTAINER
Real Users
Synthetic Users
Unified Platform
App metrics
Transactions
Server metrics
Diagnostics
Logs
Host metrics
VM metrics
Container metrics
CMDB/Compliance
Tickets
Alerts
INTELLIGENT,
UNIFIED PLATFORM
POWERED BY
MACHINE LEARNING
INFORMED BY A
COMPLETE DATA SET
HETEROGENEOUS
AND OPEN
✔
✔
✔
✔
Security Events
Global Threat Feeds
CASB
Identity
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
01100100 01100001 01110100 01100001 0110010001100001 01110100 0100 01100001
01100100 01100001 01110100 01100001 0110010001100001 01011 01110100
110000101100100 01100001 01110100 110000101100100 01100001 01110100 01100001
0110010001100001 01110100 110000101100100 0100111 01100001 01110100
110000101100100 01100001 01110100 01100001 011010 0110010001100001 01110100
01100001 0110010001100001 01110100 01001 01100001 0110010001100001 01110100
01100001 0110010001100001 01001 01110100 01100001 0110010001100001 01110100
01100001 0100101001 001 0110010001100001 01110100 01100001 0110010001100001
01110100 010011 01100001 0110010001100001 01110100 01100001 01100100 01100001
01001 01110100 01100001 0110010001100001 01110100 01100001 01100100 0100 01100001
01110100 01100001 0110010001100001 01110100 01000100 0100 110000101100100
01100001 01110100 110000101100100 01100001 01110100 01100001 0110010001100001
01110100 110000101100100 01100001 010001 01110100 110000101100100 01100001
01110100 01100001 01000100 010011 0110010001100001 01110100 01100001
0110010001100001 01110100 01000 01110100 110000101100100 01100001 01110100
01100001 01000100 010011 0110010001100001 01110100 01100001 0110010001100001
01110100 010011
Powered By Machine Learning
END USER
EXPERIENCE
APPLICATION
MIDDLE TIER
DATA TIER
VIRTUALIZATION
TIER
VM CONTAINER
INFRASTRUCTURE
TIER
VM CONTAINER
Unified Platform
ANOMALY DETECTION
CLUSTERING
CORRELATION
PREDICTION
✔
✔
✔
✔
Real Users
Synthetic Users
App metrics
Transactions
Server metrics
Diagnostics
Logs
Host metrics
VM metrics
Container metrics
CMDB/Compliance
Tickets
Alerts
Security Events
Global Threat Feeds
CASB
Identity
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Automated Preventive and Corrective Action
Infrastructure
Monitoring
Incident
Response
Automated Response & Remediation (Orchestration Cloud Service)
Violation
Remediation
Application
Scaling
Threat
Remediation
Configuration
& Compliance
IT Analytics Log AnalyticsApplication
Performance
Monitoring
Security
Monitoring &
Analytics
Event TypesLegend
Workflow
Stats
Action on
Saved Search,
Execution Logs
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Security Monitoring and
Analytics
IT
Analytics
Log
Analytics
Services Designed To Work Together
Infrastructure
Monitoring
Configuration &
Compliance
OrchestrationApplication
Performance Monitoring
Monitor real and synthetic users
and application performance
Monitor database and cross-tier
infrastructure performance
Aggregate, index, and explore the
entire enterprise log estate
Manage configuration and change
against industry and own standards
Execute automated remediation
and other tasks at cloud scale
Analyze business and IT data using
pre-built apps and explorers
Detect, investigate, and remediate
full range of security threats
Systems Management Services (for “the NOC”) Security Services (for “the SOC”)
CASB
Cloud Access Security Broker
Security Governance of cloud usage
„Shadow IT” discovery
IDCS
Identity Cloud Service
Identity and Access Mgmt in hybrid
environment, multicloud SSO, MFA
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Security Monitoring and
Analytics
IT
Analytics
Log
Analytics
Services Designed To Work Together
Infrastructure
Monitoring
Configuration &
Compliance
OrchestrationApplication
Performance Monitoring
Monitor real and synthetic users
and application performance
Monitor database and cross-tier
infrastructure performance
Aggregate, index, and explore the
entire enterprise log estate
Manage configuration and change
against industry and own standards
Execute automated remediation
and other tasks at cloud scale
Analyze business and IT data using
pre-built apps and explorers
Detect, investigate, and remediate
full range of security threats
Systems Management Services (for “the NOC”) Security Services (for “the SOC”)
CASB
Cloud Access Security Broker
IDCS
Identity Cloud Service
Security Governance of cloud usage
„Shadow IT” discovery
Identity and Access Mgmt in hybrid
environment, multicloud SSO, MFA
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Agenda
New challenges and Oracle answers
Understand your security responsibilities
New center of cyber-defense: identity
Maximise intelligence-driven automation
Quick peek into the SOC
1
2
3
4
5
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
Learn More About Oracle
Oracle.com/Security
Cloud.oracle.com/Management
Blogs.oracle.com/CloudSecurity
Blogs.oracle.com/ManagementCloud
@OracleSecurity
@OracleMgmtCloud
/OracleSecurity
/OracleManagementCloud
www.oracle.com/CTR (Cyber threat report with KPMG)
Cloud.oracle.com/tryit
Oracle PublicCopyright © 2017, Oracle and/or its affiliates. All rights reserved. |
Security Challenges in Cloud

Más contenido relacionado

La actualidad más candente

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportIftikhar Ali Iqbal
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesNetskope
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applicationsForcepoint LLC
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudForcepoint LLC
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)Iftikhar Ali Iqbal
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overviewAllessandra Negri
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASBKyle Watson
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesNetskope
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threatsZscaler
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipNetskope
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud securityDavid De Vos
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud GenerationForcepoint LLC
 
Secure remote access to AWS your users will love
Secure remote access to AWS your users will loveSecure remote access to AWS your users will love
Secure remote access to AWS your users will loveZscaler
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerAnkit Dua
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionNetskope
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Netskope
 

La actualidad más candente (20)

McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC ReportMcAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
 
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own DevicesForrester Research: Securing the Cloud When Users are Left to Their Own Devices
Forrester Research: Securing the Cloud When Users are Left to Their Own Devices
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the CloudTop 5 Information Security Lessons Learned from Transitioning to the Cloud
Top 5 Information Security Lessons Learned from Transitioning to the Cloud
 
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
 
Microsoft threat protection + wdatp+ aatp overview
Microsoft threat protection + wdatp+ aatp  overviewMicrosoft threat protection + wdatp+ aatp  overview
Microsoft threat protection + wdatp+ aatp overview
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
Making Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar SlidesMaking Cloud Security Part of Your DNA Webinar Slides
Making Cloud Security Part of Your DNA Webinar Slides
 
Dissecting ssl threats
Dissecting ssl threatsDissecting ssl threats
Dissecting ssl threats
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
Quantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate LeadershipQuantifying Cloud Risk for Your Corporate Leadership
Quantifying Cloud Risk for Your Corporate Leadership
 
Cloud summit demystifying cloud security
Cloud summit   demystifying cloud securityCloud summit   demystifying cloud security
Cloud summit demystifying cloud security
 
Securing Beyond the Cloud Generation
Securing Beyond the Cloud GenerationSecuring Beyond the Cloud Generation
Securing Beyond the Cloud Generation
 
Secure remote access to AWS your users will love
Secure remote access to AWS your users will loveSecure remote access to AWS your users will love
Secure remote access to AWS your users will love
 
Maximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and ZscalerMaximize your cloud app control with Microsoft MCAS and Zscaler
Maximize your cloud app control with Microsoft MCAS and Zscaler
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
 

Similar a Security Challenges in Cloud

Oracle Cloud – Application Performance Monitoring
Oracle Cloud – Application Performance MonitoringOracle Cloud – Application Performance Monitoring
Oracle Cloud – Application Performance MonitoringMarketingArrowECS_CZ
 
Smoketest - Oracle Management Cloud
Smoketest - Oracle Management Cloud Smoketest - Oracle Management Cloud
Smoketest - Oracle Management Cloud Volker Linz
 
Drive faster & better software delivery with performance monitoring & DevOps
Drive faster & better software delivery with performance monitoring & DevOpsDrive faster & better software delivery with performance monitoring & DevOps
Drive faster & better software delivery with performance monitoring & DevOpsVolker Linz
 
A4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyA4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyDr. Wilfred Lin (Ph.D.)
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.CIOEastAfrica
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudMarketingArrowECS_CZ
 
Capgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database SecurityCapgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database SecurityJohan Louwers
 
SOUG Day - autonomous what is next
SOUG Day - autonomous what is nextSOUG Day - autonomous what is next
SOUG Day - autonomous what is nextThomas Teske
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraLuca Martelli
 
Oracle Modern AppDev Approach to Cloud & Container Native App
Oracle Modern AppDev Approach to Cloud & Container Native AppOracle Modern AppDev Approach to Cloud & Container Native App
Oracle Modern AppDev Approach to Cloud & Container Native AppPaulo Alberto Simoes ∴
 
IoT Cloud Service & Partner IoT Solution
IoT Cloud Service & Partner IoT Solution IoT Cloud Service & Partner IoT Solution
IoT Cloud Service & Partner IoT Solution harishgaur
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudDr. Wilfred Lin (Ph.D.)
 
Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Oracle Developers
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Javaterrencebarr
 
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!Antony Welfare
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Rafael Maranon
 

Similar a Security Challenges in Cloud (20)

Oracle Cloud – Application Performance Monitoring
Oracle Cloud – Application Performance MonitoringOracle Cloud – Application Performance Monitoring
Oracle Cloud – Application Performance Monitoring
 
Smoketest - Oracle Management Cloud
Smoketest - Oracle Management Cloud Smoketest - Oracle Management Cloud
Smoketest - Oracle Management Cloud
 
Management Cloud Oracle
Management Cloud OracleManagement Cloud Oracle
Management Cloud Oracle
 
Omc AMIS evenement 26012017 Dennis van Soest
Omc AMIS evenement 26012017 Dennis van SoestOmc AMIS evenement 26012017 Dennis van Soest
Omc AMIS evenement 26012017 Dennis van Soest
 
Drive faster & better software delivery with performance monitoring & DevOps
Drive faster & better software delivery with performance monitoring & DevOpsDrive faster & better software delivery with performance monitoring & DevOps
Drive faster & better software delivery with performance monitoring & DevOps
 
A4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiencyA4 drive dev_ops_agility_and_operational_efficiency
A4 drive dev_ops_agility_and_operational_efficiency
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
 
Capgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database SecurityCapgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database Security
 
SOUG Day - autonomous what is next
SOUG Day - autonomous what is nextSOUG Day - autonomous what is next
SOUG Day - autonomous what is next
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
 
Oracle Modern AppDev Approach to Cloud & Container Native App
Oracle Modern AppDev Approach to Cloud & Container Native AppOracle Modern AppDev Approach to Cloud & Container Native App
Oracle Modern AppDev Approach to Cloud & Container Native App
 
IoT Cloud Service & Partner IoT Solution
IoT Cloud Service & Partner IoT Solution IoT Cloud Service & Partner IoT Solution
IoT Cloud Service & Partner IoT Solution
 
A5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloudA5 cloud security_now_a_reason_to_move_to_the_cloud
A5 cloud security_now_a_reason_to_move_to_the_cloud
 
Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016
 
Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016
 
Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018Public hyperledger meetup sf may 2018
Public hyperledger meetup sf may 2018
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
Blockchain in Retail :Omnichannel retailers can now compete and beat Amazon!
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 

Más de MarketingArrowECS_CZ

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfMarketingArrowECS_CZ
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!MarketingArrowECS_CZ
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?MarketingArrowECS_CZ
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaMarketingArrowECS_CZ
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceMarketingArrowECS_CZ
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeMarketingArrowECS_CZ
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle softwareMarketingArrowECS_CZ
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?MarketingArrowECS_CZ
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoMarketingArrowECS_CZ
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. částMarketingArrowECS_CZ
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. částMarketingArrowECS_CZ
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageMarketingArrowECS_CZ
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeMarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částMarketingArrowECS_CZ
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částMarketingArrowECS_CZ
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyMarketingArrowECS_CZ
 

Más de MarketingArrowECS_CZ (20)

INFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdfINFINIDAT InfiniGuard - 20220330.pdf
INFINIDAT InfiniGuard - 20220330.pdf
 
Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!Využijte svou Oracle databázi na maximum!
Využijte svou Oracle databázi na maximum!
 
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?Jak konsolidovat Vaše databáze s využitím Cloud služeb?
Jak konsolidovat Vaše databáze s využitím Cloud služeb?
 
Chráníte správně svoje data?
Chráníte správně svoje data?Chráníte správně svoje data?
Chráníte správně svoje data?
 
Oracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management PlatformaOracle databáze – Konsolidovaná Data Management Platforma
Oracle databáze – Konsolidovaná Data Management Platforma
 
Nové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database ApplianceNové vlastnosti Oracle Database Appliance
Nové vlastnosti Oracle Database Appliance
 
Infinidat InfiniGuard
Infinidat InfiniGuardInfinidat InfiniGuard
Infinidat InfiniGuard
 
Infinidat InfiniBox
Infinidat InfiniBoxInfinidat InfiniBox
Infinidat InfiniBox
 
Novinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databázeNovinky ve světě Oracle DB a koncept konvergované databáze
Novinky ve světě Oracle DB a koncept konvergované databáze
 
Základy licencování Oracle software
Základy licencování Oracle softwareZáklady licencování Oracle software
Základy licencování Oracle software
 
Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?Garance 100% dostupnosti dat! Kdo z vás to má?
Garance 100% dostupnosti dat! Kdo z vás to má?
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
 
Oracle Data Protection - 2. část
Oracle Data Protection - 2. částOracle Data Protection - 2. část
Oracle Data Protection - 2. část
 
Oracle Data Protection - 1. část
Oracle Data Protection - 1. částOracle Data Protection - 1. část
Oracle Data Protection - 1. část
 
Benefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): StorageBenefity Oracle Cloudu (4/4): Storage
Benefity Oracle Cloudu (4/4): Storage
 
Benefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): ComputeBenefity Oracle Cloudu (3/4): Compute
Benefity Oracle Cloudu (3/4): Compute
 
InfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníkaInfiniBox z pohledu zákazníka
InfiniBox z pohledu zákazníka
 
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. částExadata z pohledu zákazníka a novinky generace X8M - 2. část
Exadata z pohledu zákazníka a novinky generace X8M - 2. část
 
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. částExadata z pohledu zákazníka a novinky generace X8M - 1. část
Exadata z pohledu zákazníka a novinky generace X8M - 1. část
 
Úvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastrukturyÚvod do Oracle Cloud infrastruktury
Úvod do Oracle Cloud infrastruktury
 

Último

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Security Challenges in Cloud

  • 1.
  • 2. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Security Challenges in Cloud Virtualization Forum 2018 Gusztáv Szuhai Oracle Security solutions manager CEE
  • 3. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
  • 4. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | Agenda New challenges and Oracle answers Understand your security responsibilities New center of cyber-defense: identity Maximise intelligence-driven automation Quick peek into the SOC 1 2 3 4 5
  • 5. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | Agenda New challenges and Oracle answers Understand your security responsibilities New center of cyber-defense: identity Maximise intelligence-driven automation Quick peek into the SOC 1 2 3 4 5
  • 6. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | The Oracle and KPMG Cloud Threat Report 2018 • Security, compliance issues that impact orgs on their cloud journey • Survey research of 450 global security leaders/practitioners Topics impacting organizations: • Cloud adoption and keeping pace at scale • Global threat landscape • Role of identity management • Cybersecurity best practices • Emerging security technologies www.Oracle.com/CTR
  • 7. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | New Challenges and Oracle Answers Increase IT Efficiency, Prevent Cyberattacks, Increase Autoremediation Capabilities Transformation to Cloud • Oracle becoming a provider • Customers applying cloud-first or hybrid strategies Digitalization • exploding # of end-points to secure • new compliance requirements Threat landscape changing • automated, frequent, high-resourced attacks • 70% social engineering – identity theft emerges as major threat New Challenges Autonomous Operation • Self-managed DB and other products • In wider context: less human interaction more auto-remediation based on ML Manageability • predictive log analysis (BigData, ML) • applicable patterns learnt elsewhere Identity SOC • highly automated security governance • on-prem, cloud, hybrid – single UI • Identity context, auto-remediation New Answers
  • 8. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | Agenda New challenges and Oracle answers Understand your security responsibilities New center of cyber-defense: identity Maximise intelligence-driven automation Quick peek into the SOC 1 2 3 4 5
  • 9. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | • Your CSP needs to be independently certified ISO27001 (27017/18), SOC1/2 etc. • Large organisations have complex regulatory requirements e.g. GDPR • For you to be trusted your whole security management system (ISMS) should also be certified to the same standard Compliance
  • 10. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | on-premises, hybrid, multi-cloud Shared Responsibility Model Service configuration Data Apps OS Virtualization Network Infrastructure Physical Service configuration Data Apps OS Virtualization Network Infrastructure Physical Service configuration Data Apps OS Virtualization Network Infrastructure Physical SaaSPaaSIaaS Customer Cloud Service Provider
  • 11. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | Agenda New challenges and Oracle answers Understand your security responsibilities New center of cyber-defense: identity Maximise intelligence-driven automation Quick peek into the SOC 1 2 3 4 5
  • 12. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Users are the new perimeter
  • 13. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Security Intelligence Delivered with Identity Prevent Detect Predict Respond NetworkUsers Asset (entity, data, or content) Identity SOC
  • 14. Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Agenda New challenges and Oracle answers Understand your security responsibilities New center of cyber-defense: identity Maximise intelligence-driven automation Quick peek into the SOC 1 2 3 4 5
  • 15. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | Security Challenges THREAT EXPOSURE 85% of breaches exploited system vulnerability where patch was available LIMITED EXPERTISE 3.5 million open cybersecurity jobs by 2021 INADEQUATE TOOLS 86% feel traditional tools are not sufficient to manage security across the cloud ALERT OVERLOAD 16,937 average alerts per week per enterprise; only 19% reliable and 4% investigated
  • 16. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | 01100100 01100001 01110100 01100001 0110010001100001 01110100 0100 01100001 01100100 01100001 01110100 01100001 0110010001100001 01011 01110100 110000101100100 01100001 01110100 110000101100100 01100001 01110100 01100001 0110010001100001 01110100 110000101100100 0100111 01100001 01110100 110000101100100 01100001 01110100 01100001 011010 0110010001100001 01110100 01100001 0110010001100001 01110100 01001 01100001 0110010001100001 01110100 01100001 0110010001100001 01001 01110100 01100001 0110010001100001 01110100 01100001 0100101001 001 0110010001100001 01110100 01100001 0110010001100001 01110100 010011 01100001 0110010001100001 01110100 01100001 01100100 01100001 01001 01110100 01100001 0110010001100001 01110100 01100001 01100100 0100 01100001 01110100 01100001 0110010001100001 01110100 01000100 0100 110000101100100 01100001 01110100 110000101100100 01100001 01110100 01100001 0110010001100001 01110100 110000101100100 01100001 010001 01110100 110000101100100 01100001 01110100 01100001 01000100 010011 0110010001100001 01110100 01100001 0110010001100001 01110100 01000 01110100 110000101100100 01100001 01110100 01100001 01000100 010011 0110010001100001 01110100 01100001 0110010001100001 01110100 010011 Next-Generation Unified Data END USER EXPERIENCE/ACTIVITY APPLICATION MIDDLE TIER DATA TIER VIRTUALIZATION TIER VM CONTAINER INFRASTRUCTURE TIER VM CONTAINER Real Users Synthetic Users Unified Platform App metrics Transactions Server metrics Diagnostics Logs Host metrics VM metrics Container metrics CMDB/Compliance Tickets Alerts INTELLIGENT, UNIFIED PLATFORM POWERED BY MACHINE LEARNING INFORMED BY A COMPLETE DATA SET HETEROGENEOUS AND OPEN ✔ ✔ ✔ ✔ Security Events Global Threat Feeds CASB Identity
  • 17. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | 01100100 01100001 01110100 01100001 0110010001100001 01110100 0100 01100001 01100100 01100001 01110100 01100001 0110010001100001 01011 01110100 110000101100100 01100001 01110100 110000101100100 01100001 01110100 01100001 0110010001100001 01110100 110000101100100 0100111 01100001 01110100 110000101100100 01100001 01110100 01100001 011010 0110010001100001 01110100 01100001 0110010001100001 01110100 01001 01100001 0110010001100001 01110100 01100001 0110010001100001 01001 01110100 01100001 0110010001100001 01110100 01100001 0100101001 001 0110010001100001 01110100 01100001 0110010001100001 01110100 010011 01100001 0110010001100001 01110100 01100001 01100100 01100001 01001 01110100 01100001 0110010001100001 01110100 01100001 01100100 0100 01100001 01110100 01100001 0110010001100001 01110100 01000100 0100 110000101100100 01100001 01110100 110000101100100 01100001 01110100 01100001 0110010001100001 01110100 110000101100100 01100001 010001 01110100 110000101100100 01100001 01110100 01100001 01000100 010011 0110010001100001 01110100 01100001 0110010001100001 01110100 01000 01110100 110000101100100 01100001 01110100 01100001 01000100 010011 0110010001100001 01110100 01100001 0110010001100001 01110100 010011 Powered By Machine Learning END USER EXPERIENCE APPLICATION MIDDLE TIER DATA TIER VIRTUALIZATION TIER VM CONTAINER INFRASTRUCTURE TIER VM CONTAINER Unified Platform ANOMALY DETECTION CLUSTERING CORRELATION PREDICTION ✔ ✔ ✔ ✔ Real Users Synthetic Users App metrics Transactions Server metrics Diagnostics Logs Host metrics VM metrics Container metrics CMDB/Compliance Tickets Alerts Security Events Global Threat Feeds CASB Identity
  • 18. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | Automated Preventive and Corrective Action Infrastructure Monitoring Incident Response Automated Response & Remediation (Orchestration Cloud Service) Violation Remediation Application Scaling Threat Remediation Configuration & Compliance IT Analytics Log AnalyticsApplication Performance Monitoring Security Monitoring & Analytics Event TypesLegend Workflow Stats Action on Saved Search, Execution Logs
  • 19. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | Security Monitoring and Analytics IT Analytics Log Analytics Services Designed To Work Together Infrastructure Monitoring Configuration & Compliance OrchestrationApplication Performance Monitoring Monitor real and synthetic users and application performance Monitor database and cross-tier infrastructure performance Aggregate, index, and explore the entire enterprise log estate Manage configuration and change against industry and own standards Execute automated remediation and other tasks at cloud scale Analyze business and IT data using pre-built apps and explorers Detect, investigate, and remediate full range of security threats Systems Management Services (for “the NOC”) Security Services (for “the SOC”) CASB Cloud Access Security Broker Security Governance of cloud usage „Shadow IT” discovery IDCS Identity Cloud Service Identity and Access Mgmt in hybrid environment, multicloud SSO, MFA
  • 20. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | Security Monitoring and Analytics IT Analytics Log Analytics Services Designed To Work Together Infrastructure Monitoring Configuration & Compliance OrchestrationApplication Performance Monitoring Monitor real and synthetic users and application performance Monitor database and cross-tier infrastructure performance Aggregate, index, and explore the entire enterprise log estate Manage configuration and change against industry and own standards Execute automated remediation and other tasks at cloud scale Analyze business and IT data using pre-built apps and explorers Detect, investigate, and remediate full range of security threats Systems Management Services (for “the NOC”) Security Services (for “the SOC”) CASB Cloud Access Security Broker IDCS Identity Cloud Service Security Governance of cloud usage „Shadow IT” discovery Identity and Access Mgmt in hybrid environment, multicloud SSO, MFA
  • 21. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | Agenda New challenges and Oracle answers Understand your security responsibilities New center of cyber-defense: identity Maximise intelligence-driven automation Quick peek into the SOC 1 2 3 4 5
  • 22. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
  • 23. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
  • 24. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. |
  • 25. Copyright © 2018, Oracle and/or its affiliates. All rights reserved. | Learn More About Oracle Oracle.com/Security Cloud.oracle.com/Management Blogs.oracle.com/CloudSecurity Blogs.oracle.com/ManagementCloud @OracleSecurity @OracleMgmtCloud /OracleSecurity /OracleManagementCloud www.oracle.com/CTR (Cyber threat report with KPMG) Cloud.oracle.com/tryit Oracle PublicCopyright © 2017, Oracle and/or its affiliates. All rights reserved. |