SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
<Insert Picture Here>




Tänased võimalused turvalahendustes
Tarvi Tara
Oracle
5 Questions Your Business May Ask

1•   Can we guarantee privacy of our customer data?

2•   Have we suffered any breaches?

3• Do the DBAs know the financial results before the
   management?
4• Are we in compliance with all regulations?



5•   Can we secure our existing applications?
How is Data Compromised?
Source: Verizon 2010 Data Breach
Investigations Report
Typical current security architecture



                         database         application

                                 data center

• Sensitive information created & secured in the database
  • Backups are secured
  • Access to sensitive database tables controlled
• Information is transmitted securely to the application
  • Database to application
  • Server to client (application to browser)
• IDM technologies secure access to the application
Oracle Database Security
Defense-in-Depth
                            Encryption and Masking
                           • Oracle Advanced Security
                           • Oracle Secure Backup
                           • Oracle Data Masking
                            Access Control
                           • Oracle Database Vault
                           • Oracle Label Security
                            Auditing and Tracking
                           • Oracle Audit Vault
                           • Oracle Configuration Management
                           • Oracle Total Recall

                            Monitoring and Blocking
                           • Oracle Database Firewall
Oracle Database Vault
   Enforce Security Policies Inside the Database
                                                    Security
                                                     DBA


                                Procurement                     Application
                                                                   DBA
Application                         HR

                                  Finance
                                              select * from finance.customers
                                                                                DBA


• Automatic and customizable DBA separation of duties and protective realms
• Enforce who, where, when, and how using rules and factors
    • Enforce least privilege for privileged database users
    • Prevent application by-pass and enforce enterprise data governance
• Securely consolidate application data or enable multi-tenant data management
Oracle Data Masking
     Irreversibly De-Identify Data for Non-Production Use

            Production                                                 Non-Production
LAST_NAME   SSN           SALARY                                LAST_NAME    SSN           SALARY

AGUILAR     203-33-3234   40,000                                ANSKEKSL     111—23-1111     60,000

BENSON      323-22-2943   60,000                                BKJHHEIEDK   222-34-1345     40,000


                                   Data never leaves Database




• Make application data securely available in non-production environments
• Prevent application developers and testers from seeing production data
• Extensible template library and policies for data masking automation
• Referential integrity automatically preserved so applications continue to work
You have secured the perimeters…
… but digital information is no respecter of perimeters!



                                 Email
                                                  File system

           SharePoint




                                                  Intranet/
                                                  Extranet
                               Content
                             Management
Which perimeter are we talking about?
Many business processes involve external parties




                                     Email
                                              File system

                    SharePoint




                                               Intranet/
                                               Extranet
                                   Content
                                 Management
Typical methods for securing desktops
                                 Prevent use of
OS access control               external services

      Encrypt disk                  Prevent use of
                                   external devices
 Encrypt content
     (PGP)                   Monitor information flow
                                       (DLP)


• Buying all these solutions is expensive
• What about partners, customers, suppliers?
• Massively restrict end users ability to work
• Protect the content instead of location!
<Insert Picture Here>


Oracle Information
Rights Management
Content Author Seals Content




Content Author


Chooses Content Classification
                                     Could be…
Confidential Highly Restricted
(Board, Legal, M&A, Project, etc.)   Intellectual property,
                                     research, supplier
Confidential Restricted              communications,
Confidential Internal                manuals, BI reports…
Public
This User Doesn’t Have Rights to View
Even if stored on a local file system or external drive




                                    Access
                                     can be
                                   revoked
                                  at any time
This User Only Has Read Access
No printing, editing or screen captures…


    Partner




User can view
document in
MS Word, but
take screenshot
and paste….
Oracle Information Rights Management
 Securing all copies of your sensitive information
                                        Enterprise perimeters


                                               Email
                                                             File systems
                                ECM                                             Supplier
      Customer
                                                       Intranet/
                                   Databases           extranet




                                         Oracle IRM Server
                                                                            Partner




• Everywhere IRM-encrypted content is stored, transmitted or used
   • NO ACCESS FOR UNAUTHORIZED USERS
   • Transparent, revocable access for authorized users
   • Centralized policy and auditing for widely distributed content
• Content security beyond the database, application and firewall
Oracle Security Inside Out
                                                                                 Database Security
                                                                                 • Encryption and Masking
                                                                                 • Privileged User Controls
                                                                                • Multi-Factor Authorization
                                                                              • Activity Monitoring and Audit
                                                                                   • Secure Configuration


                                                                               Identity Management
                                                                                   • User Provisioning
                                                                                   • Role Management
                                                                               • Entitlements Management
Information                                                                   • Risk-Based Access Control
                                                                                   • Virtual Directories
              Infrastructure

                               Databases
                                                                            Information Rights Management
                                           Applications                          • Document-level Access Control
                                                              Content           • All copies, regardless of location
                                                                                      (even beyond the firewall)
                                                                                    • Auditing and Revocation




                                                      Oracle Confidential
                                                                                                                 24
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara

Mais conteúdo relacionado

Mais procurados

Simple cloud security explanation
Simple cloud security explanationSimple cloud security explanation
Simple cloud security explanationindianadvisory
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the CloudRichard Diver
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsBob Rhubart
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewnazeer325
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introductionerry wardhana
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloudtcarrucan
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)Peter Tutty
 
MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?Olav Tvedt
 
Securing Data in MongoDB with Gazzang and Chef
Securing Data in MongoDB with Gazzang and ChefSecuring Data in MongoDB with Gazzang and Chef
Securing Data in MongoDB with Gazzang and ChefMongoDB
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentationtsteh
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingTroy Kitch
 
Hitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Systems, Inc.
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 
Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo
 

Mais procurados (20)

Simple cloud security explanation
Simple cloud security explanationSimple cloud security explanation
Simple cloud security explanation
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Identity and Security in the Cloud
Identity and Security in the CloudIdentity and Security in the Cloud
Identity and Security in the Cloud
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introduction
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?MTUG - På tide med litt oversikt og kontroll?
MTUG - På tide med litt oversikt og kontroll?
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Securing Data in MongoDB with Gazzang and Chef
Securing Data in MongoDB with Gazzang and ChefSecuring Data in MongoDB with Gazzang and Chef
Securing Data in MongoDB with Gazzang and Chef
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
 
Hitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX ComplianceHitachi ID Solutions Supporting SOX Compliance
Hitachi ID Solutions Supporting SOX Compliance
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint Fasoo Secure Document (FSD) for SharePoint
Fasoo Secure Document (FSD) for SharePoint
 

Destaque

Yosuke's Timeline
Yosuke's TimelineYosuke's Timeline
Yosuke's TimelineNIST2017
 
Ratbag Radio Network
Ratbag Radio NetworkRatbag Radio Network
Ratbag Radio NetworkRatbag Media
 
Coast to coast
Coast to coast Coast to coast
Coast to coast jyr892
 
PEShare.co.uk Shared Resource
PEShare.co.uk Shared ResourcePEShare.co.uk Shared Resource
PEShare.co.uk Shared Resourcepeshare.co.uk
 
Service learning - Dr Clevenger, Colorado State
Service learning - Dr Clevenger, Colorado StateService learning - Dr Clevenger, Colorado State
Service learning - Dr Clevenger, Colorado StatestanfordCEM
 
DCFA April - May 2011 Newsletter
DCFA April - May 2011 NewsletterDCFA April - May 2011 Newsletter
DCFA April - May 2011 NewsletterKanda P.
 

Destaque (8)

Yosuke's Timeline
Yosuke's TimelineYosuke's Timeline
Yosuke's Timeline
 
Ratbag Radio Network
Ratbag Radio NetworkRatbag Radio Network
Ratbag Radio Network
 
Coast to coast
Coast to coast Coast to coast
Coast to coast
 
ITS
ITSITS
ITS
 
PEShare.co.uk Shared Resource
PEShare.co.uk Shared ResourcePEShare.co.uk Shared Resource
PEShare.co.uk Shared Resource
 
Service learning - Dr Clevenger, Colorado State
Service learning - Dr Clevenger, Colorado StateService learning - Dr Clevenger, Colorado State
Service learning - Dr Clevenger, Colorado State
 
1873082 (1)
1873082 (1)1873082 (1)
1873082 (1)
 
DCFA April - May 2011 Newsletter
DCFA April - May 2011 NewsletterDCFA April - May 2011 Newsletter
DCFA April - May 2011 Newsletter
 

Semelhante a Tänased võimalused turvalahendustes - Tarvi Tara

Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...MongoDB
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Trend Micro
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerOracleIDM
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Round table guide
Round table guideRound table guide
Round table guideOracleIDM
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data InsightSymantec
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityInnoTech
 
Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)BeyondTrust
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Oracle - Document Life - 6apr2012
Oracle - Document Life - 6apr2012Oracle - Document Life - 6apr2012
Oracle - Document Life - 6apr2012Agora Group
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscapeDharma Atluri
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?Precisely
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteEdgar Alejandro Villegas
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Global Business Events
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsBob Rhubart
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudBob Rhubart
 

Semelhante a Tänased võimalused turvalahendustes - Tarvi Tara (20)

Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...Understanding Database Encryption & Protecting Against the Insider Threat wit...
Understanding Database Encryption & Protecting Against the Insider Threat wit...
 
Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012Where to Store the Cloud Encryption Keys - InterOp 2012
Where to Store the Cloud Encryption Keys - InterOp 2012
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements Server
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Round table guide
Round table guideRound table guide
Round table guide
 
Symantec Data Insight
Symantec Data InsightSymantec Data Insight
Symantec Data Insight
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your Identity
 
Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)Prevent Data Leakage Using Windows Information Protection (WIP)
Prevent Data Leakage Using Windows Information Protection (WIP)
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Oracle - Document Life - 6apr2012
Oracle - Document Life - 6apr2012Oracle - Document Life - 6apr2012
Oracle - Document Life - 6apr2012
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
Asug84339   how to secure privacy data in a hybrid s4 hana landscapeAsug84339   how to secure privacy data in a hybrid s4 hana landscape
Asug84339 how to secure privacy data in a hybrid s4 hana landscape
 
What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?What Does a Full Featured Security Strategy Look Like?
What Does a Full Featured Security Strategy Look Like?
 
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom KyteOracle Database 11g Security and Compliance Solutions - By Tom Kyte
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
 
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
Mark Carlile, EMEA Enterprise Lead at Airwatch - Mobile content strategies an...
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the CloudRationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
 

Mais de ORACLE USER GROUP ESTONIA

Planning Your Oracle E-Business Suite Upgrade to Release 12.1
Planning Your Oracle E-Business Suite Upgrade to Release 12.1Planning Your Oracle E-Business Suite Upgrade to Release 12.1
Planning Your Oracle E-Business Suite Upgrade to Release 12.1ORACLE USER GROUP ESTONIA
 
Millist vundamenti vajab üks korralik rakendus oracle lahendused läbi teenuse...
Millist vundamenti vajab üks korralik rakendus oracle lahendused läbi teenuse...Millist vundamenti vajab üks korralik rakendus oracle lahendused läbi teenuse...
Millist vundamenti vajab üks korralik rakendus oracle lahendused läbi teenuse...ORACLE USER GROUP ESTONIA
 
Infosüsteemide infrastruktuuri haldus ja monitooring Oracle Enterprise Manage...
Infosüsteemide infrastruktuuri haldus ja monitooring Oracle Enterprise Manage...Infosüsteemide infrastruktuuri haldus ja monitooring Oracle Enterprise Manage...
Infosüsteemide infrastruktuuri haldus ja monitooring Oracle Enterprise Manage...ORACLE USER GROUP ESTONIA
 
Oracle Storage – Innovation and cost cutting bundle
Oracle Storage – Innovation and cost cutting bundleOracle Storage – Innovation and cost cutting bundle
Oracle Storage – Innovation and cost cutting bundleORACLE USER GROUP ESTONIA
 
Oracle VM – the coolest virtualizator you’ve ever had
Oracle VM – the coolest virtualizator you’ve ever had Oracle VM – the coolest virtualizator you’ve ever had
Oracle VM – the coolest virtualizator you’ve ever had ORACLE USER GROUP ESTONIA
 
Essbase juurutus Bonnier Business Press in Central and Eastern Europe divisjo...
Essbase juurutus Bonnier Business Press in Central and Eastern Europe divisjo...Essbase juurutus Bonnier Business Press in Central and Eastern Europe divisjo...
Essbase juurutus Bonnier Business Press in Central and Eastern Europe divisjo...ORACLE USER GROUP ESTONIA
 
IT valdkonna konsolideerimine Rahandusministeeriumi valitsemisalas – RMIT
IT valdkonna konsolideerimine Rahandusministeeriumi valitsemisalas – RMITIT valdkonna konsolideerimine Rahandusministeeriumi valitsemisalas – RMIT
IT valdkonna konsolideerimine Rahandusministeeriumi valitsemisalas – RMITORACLE USER GROUP ESTONIA
 
Maailmarekordi sünd läbi rahva- ja eluruumide loenduse e-lahenduse
Maailmarekordi sünd läbi rahva- ja eluruumide loenduse e-lahenduseMaailmarekordi sünd läbi rahva- ja eluruumide loenduse e-lahenduse
Maailmarekordi sünd läbi rahva- ja eluruumide loenduse e-lahenduseORACLE USER GROUP ESTONIA
 
Advanced Customer Support Services - Alexander Barkalov
Advanced Customer Support Services - Alexander BarkalovAdvanced Customer Support Services - Alexander Barkalov
Advanced Customer Support Services - Alexander BarkalovORACLE USER GROUP ESTONIA
 
Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...ORACLE USER GROUP ESTONIA
 
Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...ORACLE USER GROUP ESTONIA
 
Oracle Fusion Middleware - pragmatic approach to build up your applications -...
Oracle Fusion Middleware - pragmatic approach to build up your applications -...Oracle Fusion Middleware - pragmatic approach to build up your applications -...
Oracle Fusion Middleware - pragmatic approach to build up your applications -...ORACLE USER GROUP ESTONIA
 
Oracle – parim andmelao platvorm! - Andrus Altrov ja Kaur Tiitus
Oracle – parim andmelao platvorm! - Andrus Altrov ja Kaur TiitusOracle – parim andmelao platvorm! - Andrus Altrov ja Kaur Tiitus
Oracle – parim andmelao platvorm! - Andrus Altrov ja Kaur TiitusORACLE USER GROUP ESTONIA
 
Oracle data integrator in swedbank EDW - Rein Adamson ja Mart Tudre
Oracle data integrator in swedbank EDW - Rein Adamson ja Mart TudreOracle data integrator in swedbank EDW - Rein Adamson ja Mart Tudre
Oracle data integrator in swedbank EDW - Rein Adamson ja Mart TudreORACLE USER GROUP ESTONIA
 
Mitmepalgeline uus protsessor T4 SUN´i perekonnast - Karel Kannel
Mitmepalgeline uus protsessor T4 SUN´i perekonnast - Karel KannelMitmepalgeline uus protsessor T4 SUN´i perekonnast - Karel Kannel
Mitmepalgeline uus protsessor T4 SUN´i perekonnast - Karel KannelORACLE USER GROUP ESTONIA
 

Mais de ORACLE USER GROUP ESTONIA (20)

Planning Your Oracle E-Business Suite Upgrade to Release 12.1
Planning Your Oracle E-Business Suite Upgrade to Release 12.1Planning Your Oracle E-Business Suite Upgrade to Release 12.1
Planning Your Oracle E-Business Suite Upgrade to Release 12.1
 
Millist vundamenti vajab üks korralik rakendus oracle lahendused läbi teenuse...
Millist vundamenti vajab üks korralik rakendus oracle lahendused läbi teenuse...Millist vundamenti vajab üks korralik rakendus oracle lahendused läbi teenuse...
Millist vundamenti vajab üks korralik rakendus oracle lahendused läbi teenuse...
 
Infosüsteemide infrastruktuuri haldus ja monitooring Oracle Enterprise Manage...
Infosüsteemide infrastruktuuri haldus ja monitooring Oracle Enterprise Manage...Infosüsteemide infrastruktuuri haldus ja monitooring Oracle Enterprise Manage...
Infosüsteemide infrastruktuuri haldus ja monitooring Oracle Enterprise Manage...
 
Oracle Storage – Innovation and cost cutting bundle
Oracle Storage – Innovation and cost cutting bundleOracle Storage – Innovation and cost cutting bundle
Oracle Storage – Innovation and cost cutting bundle
 
Oracle CRM on Demand
Oracle CRM on DemandOracle CRM on Demand
Oracle CRM on Demand
 
Oracle VM – the coolest virtualizator you’ve ever had
Oracle VM – the coolest virtualizator you’ve ever had Oracle VM – the coolest virtualizator you’ve ever had
Oracle VM – the coolest virtualizator you’ve ever had
 
Essbase juurutus Bonnier Business Press in Central and Eastern Europe divisjo...
Essbase juurutus Bonnier Business Press in Central and Eastern Europe divisjo...Essbase juurutus Bonnier Business Press in Central and Eastern Europe divisjo...
Essbase juurutus Bonnier Business Press in Central and Eastern Europe divisjo...
 
Oracle CRM Case Management
Oracle CRM Case ManagementOracle CRM Case Management
Oracle CRM Case Management
 
IT valdkonna konsolideerimine Rahandusministeeriumi valitsemisalas – RMIT
IT valdkonna konsolideerimine Rahandusministeeriumi valitsemisalas – RMITIT valdkonna konsolideerimine Rahandusministeeriumi valitsemisalas – RMIT
IT valdkonna konsolideerimine Rahandusministeeriumi valitsemisalas – RMIT
 
Maailmarekordi sünd läbi rahva- ja eluruumide loenduse e-lahenduse
Maailmarekordi sünd läbi rahva- ja eluruumide loenduse e-lahenduseMaailmarekordi sünd läbi rahva- ja eluruumide loenduse e-lahenduse
Maailmarekordi sünd läbi rahva- ja eluruumide loenduse e-lahenduse
 
Advanced Customer Support Services - Alexander Barkalov
Advanced Customer Support Services - Alexander BarkalovAdvanced Customer Support Services - Alexander Barkalov
Advanced Customer Support Services - Alexander Barkalov
 
Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...
 
Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...
 
Corporate overview the services story
Corporate overview the services storyCorporate overview the services story
Corporate overview the services story
 
Oracle Fusion Middleware - pragmatic approach to build up your applications -...
Oracle Fusion Middleware - pragmatic approach to build up your applications -...Oracle Fusion Middleware - pragmatic approach to build up your applications -...
Oracle Fusion Middleware - pragmatic approach to build up your applications -...
 
Oracle – parim andmelao platvorm! - Andrus Altrov ja Kaur Tiitus
Oracle – parim andmelao platvorm! - Andrus Altrov ja Kaur TiitusOracle – parim andmelao platvorm! - Andrus Altrov ja Kaur Tiitus
Oracle – parim andmelao platvorm! - Andrus Altrov ja Kaur Tiitus
 
Metaandmete haldus - Jüri Harju
Metaandmete haldus -  Jüri HarjuMetaandmete haldus -  Jüri Harju
Metaandmete haldus - Jüri Harju
 
Golden gate11g overview - Edgars Rungis
Golden gate11g overview - Edgars RungisGolden gate11g overview - Edgars Rungis
Golden gate11g overview - Edgars Rungis
 
Oracle data integrator in swedbank EDW - Rein Adamson ja Mart Tudre
Oracle data integrator in swedbank EDW - Rein Adamson ja Mart TudreOracle data integrator in swedbank EDW - Rein Adamson ja Mart Tudre
Oracle data integrator in swedbank EDW - Rein Adamson ja Mart Tudre
 
Mitmepalgeline uus protsessor T4 SUN´i perekonnast - Karel Kannel
Mitmepalgeline uus protsessor T4 SUN´i perekonnast - Karel KannelMitmepalgeline uus protsessor T4 SUN´i perekonnast - Karel Kannel
Mitmepalgeline uus protsessor T4 SUN´i perekonnast - Karel Kannel
 

Último

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Último (20)

Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Tänased võimalused turvalahendustes - Tarvi Tara

  • 1. <Insert Picture Here> Tänased võimalused turvalahendustes Tarvi Tara Oracle
  • 2. 5 Questions Your Business May Ask 1• Can we guarantee privacy of our customer data? 2• Have we suffered any breaches? 3• Do the DBAs know the financial results before the management? 4• Are we in compliance with all regulations? 5• Can we secure our existing applications?
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. How is Data Compromised? Source: Verizon 2010 Data Breach Investigations Report
  • 8. Typical current security architecture database application data center • Sensitive information created & secured in the database • Backups are secured • Access to sensitive database tables controlled • Information is transmitted securely to the application • Database to application • Server to client (application to browser) • IDM technologies secure access to the application
  • 9. Oracle Database Security Defense-in-Depth Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking Access Control • Oracle Database Vault • Oracle Label Security Auditing and Tracking • Oracle Audit Vault • Oracle Configuration Management • Oracle Total Recall Monitoring and Blocking • Oracle Database Firewall
  • 10. Oracle Database Vault Enforce Security Policies Inside the Database Security DBA Procurement Application DBA Application HR Finance select * from finance.customers DBA • Automatic and customizable DBA separation of duties and protective realms • Enforce who, where, when, and how using rules and factors • Enforce least privilege for privileged database users • Prevent application by-pass and enforce enterprise data governance • Securely consolidate application data or enable multi-tenant data management
  • 11. Oracle Data Masking Irreversibly De-Identify Data for Non-Production Use Production Non-Production LAST_NAME SSN SALARY LAST_NAME SSN SALARY AGUILAR 203-33-3234 40,000 ANSKEKSL 111—23-1111 60,000 BENSON 323-22-2943 60,000 BKJHHEIEDK 222-34-1345 40,000 Data never leaves Database • Make application data securely available in non-production environments • Prevent application developers and testers from seeing production data • Extensible template library and policies for data masking automation • Referential integrity automatically preserved so applications continue to work
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. You have secured the perimeters… … but digital information is no respecter of perimeters! Email File system SharePoint Intranet/ Extranet Content Management
  • 17. Which perimeter are we talking about? Many business processes involve external parties Email File system SharePoint Intranet/ Extranet Content Management
  • 18. Typical methods for securing desktops Prevent use of OS access control external services Encrypt disk Prevent use of external devices Encrypt content (PGP) Monitor information flow (DLP) • Buying all these solutions is expensive • What about partners, customers, suppliers? • Massively restrict end users ability to work • Protect the content instead of location!
  • 19. <Insert Picture Here> Oracle Information Rights Management
  • 20. Content Author Seals Content Content Author Chooses Content Classification Could be… Confidential Highly Restricted (Board, Legal, M&A, Project, etc.) Intellectual property, research, supplier Confidential Restricted communications, Confidential Internal manuals, BI reports… Public
  • 21. This User Doesn’t Have Rights to View Even if stored on a local file system or external drive Access can be revoked at any time
  • 22. This User Only Has Read Access No printing, editing or screen captures… Partner User can view document in MS Word, but take screenshot and paste….
  • 23. Oracle Information Rights Management Securing all copies of your sensitive information Enterprise perimeters Email File systems ECM Supplier Customer Intranet/ Databases extranet Oracle IRM Server Partner • Everywhere IRM-encrypted content is stored, transmitted or used • NO ACCESS FOR UNAUTHORIZED USERS • Transparent, revocable access for authorized users • Centralized policy and auditing for widely distributed content • Content security beyond the database, application and firewall
  • 24. Oracle Security Inside Out Database Security • Encryption and Masking • Privileged User Controls • Multi-Factor Authorization • Activity Monitoring and Audit • Secure Configuration Identity Management • User Provisioning • Role Management • Entitlements Management Information • Risk-Based Access Control • Virtual Directories Infrastructure Databases Information Rights Management Applications • Document-level Access Control Content • All copies, regardless of location (even beyond the firewall) • Auditing and Revocation Oracle Confidential 24