SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
<Insert Picture Here>




Oracle Security Solutions

Angelo Maria Bosis
Technology Sales Consultant Senior Manager
Agenda




         • Innovation & Constraints
         • Oracle Enterprise Security
                  • Oracle Identity Management
                  • Oracle DataBase Security
         • Oracle Security beyond the Enterprise
         • Summary




© 2011 Oracle Corporation – Proprietary and Confidential   2
What Keeps You up at Night?
                                                           Compliance

   Threats                                                 • Tougher Regulations
                                                           • Intrusive Audits
   • Attacks                                               • Costly Burdensome Reporting
   • Improper Access
   • Infrastructure Scaling




                                                           Opportunities

                                                           •   Social Identity
                                                           •   Mobile Access
                                                           •   Cloud Computing
                                                           •   Massive Web




© 2011 Oracle Corporation – Proprietary and Confidential                                   3
Is it Possible?
                   How is it Possible?
© 2011 Oracle Corporation – Proprietary and Confidential   4
Focus on Protecting Your Data,
            Applications & Infrastructure


                                      End-users and access points



                                                                            Firewall

                                                           Applications &
                                                             Middleware

                                                                             Identity Management
                                                                Database


                                                                               Database Security
                                                           Infrastructure


                                                                                 Infrastructure
                                                                                    Security

© 2011 Oracle Corporation – Proprietary and Confidential                                           5
Oracle Identity Management 11g
              Complete and Integrated Suite

                                                              Unified
                                                           Administration




                       Identity                                                             Directory
                     Administration                                                           Services
                                                            Access
                                                           Management
   • Unified and Modern Web 2.0                                  • Simplified Systems Management
     based Admin Interface                                       • Shared Services for:
   • Unified Installation and Configuration                          •   Password Management
   • Common Auditing and Logging                                     •   Identity Administration
   • Common Policy Framework                                         •   Single Sign-On
                                                                     •   Strong Authentication


© 2011 Oracle Corporation – Proprietary and Confidential                                                 6
Oracle Identity Management Overview
          Complete, Hot-Pluggable, & Service-Oriented Security
        Identity Administration                              Access Management           Directory Services

                                                               Access Manager
                                                              Identity Federation
              Identity Manager                             Adaptive Access Manager      Unified Directory Server
                                                           Enterprise Single Sign-On     Directory Server EE
                                                              Entitlements Server          Internet Directory
                                                              Enterprise Gateway            Virtual Directory
                                                            Web Services Security

                                                       Identity & Access Governance
                                                               Identity Analytics

                                                           Platform Security Services

                                                           Operational Manageability

                                                Management Pack For Identity Management


© 2011 Oracle Corporation – Proprietary and Confidential                                                           7
Access: Authentication & Authorization




© 2011 Oracle Corporation – Proprietary and Confidential   8
Focus on Protecting Your Data,
           Applications & Infrastructure


                                      End-users and access points



                                                                            Firewall

                                                           Applications &
                                                             Middleware

                                                                             Identity Management
                                                                Database


                                                                               Database Security
                                                           Infrastructure


                                                                                 Infrastructure
                                                                                    Security

© 2011 Oracle Corporation – Proprietary and Confidential                                           9
Oracle Database Security
           Continuous Innovation
                                                                                   Database Firewall
                                                     Oracle Database 11g
                                                                                Data Masking
                                                                            TDE Tablespace Encryption
                                                                         Audit Vault
                                         Oracle Database 10g
                                                                   Database Vault
                                                               Transparent Data Encryption (TDE)
                                                          Proxy Authentication
                             Oracle Database 9i
                                                     Fine Grained Auditing
                                                Oracle Label Security
                                          Enterprise User Security
                                     Virtual Private Database (VPD)
                    Oracle8i
                                Database Encryption API
                          Strong Authentication
                      Native Network Encryption
     Oracle7      Database Auditing


© 2011 Oracle Corporation – Proprietary and Confidential                                          10
Database Security Defense-in-Depth

                                                            Prevent access by non-database users for
                                                             data at rest, in motion, and storage
                                                            Increase database user identity assurance
                                                            Strict access control to application data
                                                             even from privileged users
                                                            Enforce multi-factor authorization
                                                            Audit database activity, and create reports
                              Data                          Monitor database traffic and prevent threats
                                                             from reaching the database
                                                            Ensure database production environment is
                                                             secure and prevent drift
                                                            Mask sensitive data in non-production
                                                             environments



© 2011 Oracle Corporation – Proprietary and Confidential                                                   11
Database Defense-in-Depth
                                                            Encryption and Masking
                                                           • Oracle Advanced Security
                                                           • Oracle Secure Backup
                                                           • Oracle Data Masking




© 2011 Oracle Corporation – Proprietary and Confidential                                12
Database Defense-in-Depth
                                                            Encryption and Masking
                                                           • Oracle Advanced Security
                                                           • Oracle Secure Backup
                                                           • Oracle Data Masking
                                                            Access Control
                                                           • Oracle Database Vault
                                                           • Enterprise User Security
                                                           • Oracle Label Security




© 2011 Oracle Corporation – Proprietary and Confidential                                13
Database Defense-in-Depth
                                                            Encryption and Masking
                                                           • Oracle Advanced Security
                                                           • Oracle Secure Backup
                                                           • Oracle Data Masking
                                                            Access Control
                                                           • Oracle Database Vault
                                                           • Enterprise User Security
                                                           • Oracle Label Security
                                                            Auditing and Monitoring
                                                           • Oracle Audit Vault
                                                           • Oracle Configuration Management
                                                           • Oracle Total Recall




© 2011 Oracle Corporation – Proprietary and Confidential                                   14
Database Defense-in-Depth
                                                            Encryption and Masking
                                                           • Oracle Advanced Security
                                                           • Oracle Secure Backup
                                                           • Oracle Data Masking
                                                            Access Control
                                                           • Oracle Database Vault
                                                           • Enterprise User Security
                                                           • Oracle Label Security
                                                            Auditing and Monitoring
                                                           • Oracle Audit Vault
                                                           • Oracle Configuration Management
                                                           • Oracle Total Recall

                                                            Blocking and Logging
                                                           • Oracle Database Firewall



© 2011 Oracle Corporation – Proprietary and Confidential                                   15
Oracle Database Security Solutions
           Complete Defense-in-Depth
• Comprehensive single vendor addresses all your requirements
• Transparent to existing applications or databases
• Easy to deploy point and click interfaces deliver value
  within hours                                                                                 Encryption & Masking

                                                                                                   Access Control

• Cost Effective integrated solutions reduce risk and lower TCO                                       Auditing

                                                                                               Monitoring & Blocking

• Proven #1 database vendor with over 30 years of security innovation!



               Monitoring                                  Auditing         Access            Encryption
               & Blocking                                                                     & Masking
                                                                            Control
  • Database                                • Audit Vault             • Database         • Advanced
    Firewall                                • Total Recall              Vault              Security
                                            • Configuration           • Label Security   • Secure Backup
                                              Management              • Enterprise       • Data Masking
                                                                        User Security

© 2011 Oracle Corporation – Proprietary and Confidential                                                               16
Oracle Infrastructure for HealthCare




                                                           Complete
                                                           Open
                                                           Integrated
                                                           AND Secure!

© 2011 Oracle Corporation – Proprietary and Confidential             17
18   Copyright © 2010, Oracle. All rights reserved
Database Cloud Service
            Overview
           • #1 database; in the cloud
           • Rapid provisioning
           • Simple pricing
           • Easy to use and manage
           • Rapid cloud-based application development
           • Access using Java, RESTful Web Services and
             Oracle APEX
           • Packaged business productivity applications


© 2011 Oracle Corporation – Proprietary and Confidential   19
Security & Identity Management
            Service
           • A key enabler and differentiator of Oracle
             Public Cloud
                 • Single Sign On and Identity Federation
                 • Integration between Oracle Public Cloud & on-
                   premise identity management systems
                 • Fully delegated administration and dashboards
                 • Multi-factor authentication
                 • Use of standards for application
                   visibility into public identity profiles
           • Built on Oracle Identity Management

© 2011 Oracle Corporation – Proprietary and Confidential           20
A Leader in all Analyst Coverage

   2010 Magic Quadrant for                                                             2009 Magic Quadrant for                                                            2009 Forrester Wave for
                                                                                                                                                                           Identity & Access Mgmt
            User Provisioning                                                        Web Access Management




        As of Sept. 30th 2010                                                               As of Nov. 12th 2009                                                              As of Nov 30th 2009


Magic Quadrant Disclaimer: The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how
  certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors
    placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any
    warranties of merchantability or fitness for a particular purpose. The Magic Quadrant graphic was published by Gartner, Inc., as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is
                                                                                                          available upon request from Oracle
#1 Database and Most Secure




            “Most DBMS vendors offer
            basic security features;
            Oracle’s offering is most
            comprehensive.”
                                                  - Noel
                                           Yuhanna




    Source: Forrester Database Security Market Report, 2009




© 2011 Oracle Corporation – Proprietary and Confidential      22
Oracle Security Customers in HC

                                  Footprint in Healthcare with 4000+ Clients Worldwide




© 2011 Oracle Corporation – Proprietary and Confidential                                 23
Customer Advisory Board
           Share, Communicate, & Partner




© 2011 Oracle Corporation – Proprietary and Confidential   24
For More Information



                                                             search.oracle.com


                                              security solutions




                                                                    or

                                                    oracle.com/security




© 2011 Oracle Corporation – Proprietary and Confidential                         25
© 2011 Oracle Corporation – Proprietary and Confidential   26

Mais conteúdo relacionado

Mais procurados

Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Cloud Computing - A Pragmatic Approach to Cloud Adoption
Cloud Computing - A Pragmatic Approach to Cloud AdoptionCloud Computing - A Pragmatic Approach to Cloud Adoption
Cloud Computing - A Pragmatic Approach to Cloud AdoptionBob Rhubart
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...Novell
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution DatasheetMicrosoft Private Cloud
 
Vincent Desveronnieres, Oracle
Vincent Desveronnieres,  OracleVincent Desveronnieres,  Oracle
Vincent Desveronnieres, OracleEwa Stepien
 
IT Infrastructure Specialist
IT Infrastructure SpecialistIT Infrastructure Specialist
IT Infrastructure Specialistmomentuminfocare
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0debbanerjee
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOABob Rhubart
 
Business Integration for the 21st Century
Business Integration for the 21st Century Business Integration for the 21st Century
Business Integration for the 21st Century Bob Rhubart
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSDavid J Rosenthal
 
SOAR VAR SELL SHEET.tmp
SOAR VAR SELL SHEET.tmpSOAR VAR SELL SHEET.tmp
SOAR VAR SELL SHEET.tmpscottmertz
 
Open Sky Intro
Open Sky IntroOpen Sky Intro
Open Sky Introspeloso
 
Webinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint SecurityWebinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint SecurityAntonioMaio2
 
SaaS Platform - Alice
SaaS Platform - AliceSaaS Platform - Alice
SaaS Platform - AliceEkartha Inc
 
Logicalis International Managed Services Capabilities
Logicalis International Managed Services CapabilitiesLogicalis International Managed Services Capabilities
Logicalis International Managed Services CapabilitiesLogicalis
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityAntonioMaio2
 

Mais procurados (20)

Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Presentatie mc afee emm 2011
Presentatie mc afee emm 2011Presentatie mc afee emm 2011
Presentatie mc afee emm 2011
 
Cloud Computing - A Pragmatic Approach to Cloud Adoption
Cloud Computing - A Pragmatic Approach to Cloud AdoptionCloud Computing - A Pragmatic Approach to Cloud Adoption
Cloud Computing - A Pragmatic Approach to Cloud Adoption
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...Identity and Request Management Using Novell Identity Manager: Identity Manag...
Identity and Request Management Using Novell Identity Manager: Identity Manag...
 
Microsoft Forefront - Secure Collaboration Solution Datasheet
Microsoft Forefront -  Secure Collaboration Solution DatasheetMicrosoft Forefront -  Secure Collaboration Solution Datasheet
Microsoft Forefront - Secure Collaboration Solution Datasheet
 
Azaleos Overview
Azaleos OverviewAzaleos Overview
Azaleos Overview
 
Vincent Desveronnieres, Oracle
Vincent Desveronnieres,  OracleVincent Desveronnieres,  Oracle
Vincent Desveronnieres, Oracle
 
IT Infrastructure Specialist
IT Infrastructure SpecialistIT Infrastructure Specialist
IT Infrastructure Specialist
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOA
 
Business Integration for the 21st Century
Business Integration for the 21st Century Business Integration for the 21st Century
Business Integration for the 21st Century
 
Microsoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMSMicrosoft Enterprise Mobility and Security EMS
Microsoft Enterprise Mobility and Security EMS
 
SOAR VAR SELL SHEET.tmp
SOAR VAR SELL SHEET.tmpSOAR VAR SELL SHEET.tmp
SOAR VAR SELL SHEET.tmp
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Open Sky Intro
Open Sky IntroOpen Sky Intro
Open Sky Intro
 
Webinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint SecurityWebinar: Take Control of SharePoint Security
Webinar: Take Control of SharePoint Security
 
SaaS Platform - Alice
SaaS Platform - AliceSaaS Platform - Alice
SaaS Platform - Alice
 
Logicalis International Managed Services Capabilities
Logicalis International Managed Services CapabilitiesLogicalis International Managed Services Capabilities
Logicalis International Managed Services Capabilities
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 

Destaque

3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure EnterpriseIBM Security
 
Enterprise security architecture using ibm tivoli security solutions sg246014
Enterprise security architecture using ibm tivoli security solutions sg246014Enterprise security architecture using ibm tivoli security solutions sg246014
Enterprise security architecture using ibm tivoli security solutions sg246014Banking at Ho Chi Minh city
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesNRB
 
Oracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security: A Practitioners GuideOracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security: A Practitioners GuideCourtney Llamas
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementCA Technologies
 
Security architecture
Security architectureSecurity architecture
Security architectureDuncan Unwin
 

Destaque (6)

3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
Enterprise security architecture using ibm tivoli security solutions sg246014
Enterprise security architecture using ibm tivoli security solutions sg246014Enterprise security architecture using ibm tivoli security solutions sg246014
Enterprise security architecture using ibm tivoli security solutions sg246014
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
Oracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security: A Practitioners GuideOracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security: A Practitioners Guide
 
PwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity ManagementPwC Point of View on Cybersecurity Management
PwC Point of View on Cybersecurity Management
 
Security architecture
Security architectureSecurity architecture
Security architecture
 

Semelhante a Oracle a TBIZ2011

Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerOracleIDM
 
Round table guide
Round table guideRound table guide
Round table guideOracleIDM
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simplyLilian Schaffer
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simplyLilian Schaffer
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
 
DSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYDSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYAndris Soroka
 
CARA User Interface for Oracle WebCenter
CARA User Interface for Oracle WebCenterCARA User Interface for Oracle WebCenter
CARA User Interface for Oracle WebCentercara4oraclewebcenter
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 
Eucalyptus-AWS Hybrid Using RightScale myCloud
Eucalyptus-AWS Hybrid Using RightScale myCloudEucalyptus-AWS Hybrid Using RightScale myCloud
Eucalyptus-AWS Hybrid Using RightScale myCloudRightScale
 
Hybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsHybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsSoftware Park Thailand
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallTroy Kitch
 
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van LithNetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lithvdhendrikse
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy ArchitectureBob Rhubart
 
Secure Enterprise Cloud
Secure Enterprise CloudSecure Enterprise Cloud
Secure Enterprise CloudIndu Kodukula
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 

Semelhante a Oracle a TBIZ2011 (20)

Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements Server
 
Round table guide
Round table guideRound table guide
Round table guide
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
DSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYDSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFY
 
CARA User Interface for Oracle WebCenter
CARA User Interface for Oracle WebCenterCARA User Interface for Oracle WebCenter
CARA User Interface for Oracle WebCenter
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Eucalyptus-AWS Hybrid Using RightScale myCloud
Eucalyptus-AWS Hybrid Using RightScale myCloudEucalyptus-AWS Hybrid Using RightScale myCloud
Eucalyptus-AWS Hybrid Using RightScale myCloud
 
Hybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsHybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 Trends
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
 
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van LithNetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lith
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy Architecture
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Secure Enterprise Cloud
Secure Enterprise CloudSecure Enterprise Cloud
Secure Enterprise Cloud
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 

Mais de TechnologyBIZ

Tutto in una sera: TBIZ Conference 2015
Tutto in una sera: TBIZ Conference 2015Tutto in una sera: TBIZ Conference 2015
Tutto in una sera: TBIZ Conference 2015TechnologyBIZ
 
Agenda - Innovazione Tecnologica e Opportunità per la Ricerca e le Imprese
Agenda - Innovazione Tecnologica e Opportunità per la Ricerca e le ImpreseAgenda - Innovazione Tecnologica e Opportunità per la Ricerca e le Imprese
Agenda - Innovazione Tecnologica e Opportunità per la Ricerca e le ImpreseTechnologyBIZ
 
Invitalia a TBIZConference2014
Invitalia a TBIZConference2014Invitalia a TBIZConference2014
Invitalia a TBIZConference2014TechnologyBIZ
 
TechnologyBIZ 6_anteprima_V1
TechnologyBIZ 6_anteprima_V1TechnologyBIZ 6_anteprima_V1
TechnologyBIZ 6_anteprima_V1TechnologyBIZ
 
Diversity perchè? I dati della ricerca sulla sentiment analysis della rete e...
Diversity  perchè? I dati della ricerca sulla sentiment analysis della rete e...Diversity  perchè? I dati della ricerca sulla sentiment analysis della rete e...
Diversity perchè? I dati della ricerca sulla sentiment analysis della rete e...TechnologyBIZ
 
TBIZ 2013 - Progetto Orchestra
TBIZ 2013 - Progetto OrchestraTBIZ 2013 - Progetto Orchestra
TBIZ 2013 - Progetto OrchestraTechnologyBIZ
 
TBIZ 2013- GDG Campania - Google App Engine in a few words
TBIZ 2013- GDG Campania -  Google App Engine in a few words TBIZ 2013- GDG Campania -  Google App Engine in a few words
TBIZ 2013- GDG Campania - Google App Engine in a few words TechnologyBIZ
 
TBIZ 2013 - Smart & Start di Invitalia a TBIZ
TBIZ 2013 - Smart & Start di Invitalia a TBIZTBIZ 2013 - Smart & Start di Invitalia a TBIZ
TBIZ 2013 - Smart & Start di Invitalia a TBIZTechnologyBIZ
 
Anteprima TechnologyBiz 2013 (con aggiornamento continuo)
Anteprima TechnologyBiz 2013 (con aggiornamento continuo)Anteprima TechnologyBiz 2013 (con aggiornamento continuo)
Anteprima TechnologyBiz 2013 (con aggiornamento continuo)TechnologyBIZ
 
Banco Popolare - Banca di Novara presentazione La Campania e le reti di imprese
Banco Popolare - Banca di Novara presentazione La Campania e le reti di impreseBanco Popolare - Banca di Novara presentazione La Campania e le reti di imprese
Banco Popolare - Banca di Novara presentazione La Campania e le reti di impreseTechnologyBIZ
 
Rete per il Packaging Sostenibile: 100%Campania
Rete per il Packaging Sostenibile: 100%CampaniaRete per il Packaging Sostenibile: 100%Campania
Rete per il Packaging Sostenibile: 100%CampaniaTechnologyBIZ
 
Assoreti pmi slideshow
Assoreti pmi slideshowAssoreti pmi slideshow
Assoreti pmi slideshowTechnologyBIZ
 
Liliana Speranza, ODCEC Napoli, consigliere delegato
 Liliana Speranza, ODCEC Napoli, consigliere delegato Liliana Speranza, ODCEC Napoli, consigliere delegato
Liliana Speranza, ODCEC Napoli, consigliere delegatoTechnologyBIZ
 
Massimiliano Guerrini, Rete Almax filiera della pelle Gucci
Massimiliano Guerrini, Rete Almax filiera della pelle GucciMassimiliano Guerrini, Rete Almax filiera della pelle Gucci
Massimiliano Guerrini, Rete Almax filiera della pelle GucciTechnologyBIZ
 
Andrea Cortellazzo, Rete Menocarta.net, conservazione per professionisti
Andrea Cortellazzo, Rete Menocarta.net, conservazione per professionistiAndrea Cortellazzo, Rete Menocarta.net, conservazione per professionisti
Andrea Cortellazzo, Rete Menocarta.net, conservazione per professionistiTechnologyBIZ
 
Massimo Varrone La programmazione regionale per le reti di imprese
Massimo Varrone  La programmazione regionale per le reti di imprese Massimo Varrone  La programmazione regionale per le reti di imprese
Massimo Varrone La programmazione regionale per le reti di imprese TechnologyBIZ
 
TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...
TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...
TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...TechnologyBIZ
 
TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1
TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1
TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1TechnologyBIZ
 
TBIZ 2012 - Panduit
TBIZ 2012 - Panduit TBIZ 2012 - Panduit
TBIZ 2012 - Panduit TechnologyBIZ
 

Mais de TechnologyBIZ (20)

Tutto in una sera: TBIZ Conference 2015
Tutto in una sera: TBIZ Conference 2015Tutto in una sera: TBIZ Conference 2015
Tutto in una sera: TBIZ Conference 2015
 
Agenda - Innovazione Tecnologica e Opportunità per la Ricerca e le Imprese
Agenda - Innovazione Tecnologica e Opportunità per la Ricerca e le ImpreseAgenda - Innovazione Tecnologica e Opportunità per la Ricerca e le Imprese
Agenda - Innovazione Tecnologica e Opportunità per la Ricerca e le Imprese
 
Invitalia a TBIZConference2014
Invitalia a TBIZConference2014Invitalia a TBIZConference2014
Invitalia a TBIZConference2014
 
TechnologyBIZ 6_anteprima_V1
TechnologyBIZ 6_anteprima_V1TechnologyBIZ 6_anteprima_V1
TechnologyBIZ 6_anteprima_V1
 
Diversity perchè? I dati della ricerca sulla sentiment analysis della rete e...
Diversity  perchè? I dati della ricerca sulla sentiment analysis della rete e...Diversity  perchè? I dati della ricerca sulla sentiment analysis della rete e...
Diversity perchè? I dati della ricerca sulla sentiment analysis della rete e...
 
TBIZ 2013 - Progetto Orchestra
TBIZ 2013 - Progetto OrchestraTBIZ 2013 - Progetto Orchestra
TBIZ 2013 - Progetto Orchestra
 
TBIZ 2013 - AICTT
TBIZ 2013 - AICTT TBIZ 2013 - AICTT
TBIZ 2013 - AICTT
 
TBIZ 2013- GDG Campania - Google App Engine in a few words
TBIZ 2013- GDG Campania -  Google App Engine in a few words TBIZ 2013- GDG Campania -  Google App Engine in a few words
TBIZ 2013- GDG Campania - Google App Engine in a few words
 
TBIZ 2013 - Smart & Start di Invitalia a TBIZ
TBIZ 2013 - Smart & Start di Invitalia a TBIZTBIZ 2013 - Smart & Start di Invitalia a TBIZ
TBIZ 2013 - Smart & Start di Invitalia a TBIZ
 
Anteprima TechnologyBiz 2013 (con aggiornamento continuo)
Anteprima TechnologyBiz 2013 (con aggiornamento continuo)Anteprima TechnologyBiz 2013 (con aggiornamento continuo)
Anteprima TechnologyBiz 2013 (con aggiornamento continuo)
 
Banco Popolare - Banca di Novara presentazione La Campania e le reti di imprese
Banco Popolare - Banca di Novara presentazione La Campania e le reti di impreseBanco Popolare - Banca di Novara presentazione La Campania e le reti di imprese
Banco Popolare - Banca di Novara presentazione La Campania e le reti di imprese
 
Rete per il Packaging Sostenibile: 100%Campania
Rete per il Packaging Sostenibile: 100%CampaniaRete per il Packaging Sostenibile: 100%Campania
Rete per il Packaging Sostenibile: 100%Campania
 
Assoreti pmi slideshow
Assoreti pmi slideshowAssoreti pmi slideshow
Assoreti pmi slideshow
 
Liliana Speranza, ODCEC Napoli, consigliere delegato
 Liliana Speranza, ODCEC Napoli, consigliere delegato Liliana Speranza, ODCEC Napoli, consigliere delegato
Liliana Speranza, ODCEC Napoli, consigliere delegato
 
Massimiliano Guerrini, Rete Almax filiera della pelle Gucci
Massimiliano Guerrini, Rete Almax filiera della pelle GucciMassimiliano Guerrini, Rete Almax filiera della pelle Gucci
Massimiliano Guerrini, Rete Almax filiera della pelle Gucci
 
Andrea Cortellazzo, Rete Menocarta.net, conservazione per professionisti
Andrea Cortellazzo, Rete Menocarta.net, conservazione per professionistiAndrea Cortellazzo, Rete Menocarta.net, conservazione per professionisti
Andrea Cortellazzo, Rete Menocarta.net, conservazione per professionisti
 
Massimo Varrone La programmazione regionale per le reti di imprese
Massimo Varrone  La programmazione regionale per le reti di imprese Massimo Varrone  La programmazione regionale per le reti di imprese
Massimo Varrone La programmazione regionale per le reti di imprese
 
TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...
TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...
TechnologyBIZ: Napoli Shoes è la prima Rete di imprese del settore calzaturie...
 
TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1
TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1
TBIZ 2012- APC by Schneider Electric. Struxure ware for data centers-v1
 
TBIZ 2012 - Panduit
TBIZ 2012 - Panduit TBIZ 2012 - Panduit
TBIZ 2012 - Panduit
 

Último

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Último (20)

From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Oracle a TBIZ2011

  • 1. <Insert Picture Here> Oracle Security Solutions Angelo Maria Bosis Technology Sales Consultant Senior Manager
  • 2. Agenda • Innovation & Constraints • Oracle Enterprise Security • Oracle Identity Management • Oracle DataBase Security • Oracle Security beyond the Enterprise • Summary © 2011 Oracle Corporation – Proprietary and Confidential 2
  • 3. What Keeps You up at Night? Compliance Threats • Tougher Regulations • Intrusive Audits • Attacks • Costly Burdensome Reporting • Improper Access • Infrastructure Scaling Opportunities • Social Identity • Mobile Access • Cloud Computing • Massive Web © 2011 Oracle Corporation – Proprietary and Confidential 3
  • 4. Is it Possible? How is it Possible? © 2011 Oracle Corporation – Proprietary and Confidential 4
  • 5. Focus on Protecting Your Data, Applications & Infrastructure End-users and access points Firewall Applications & Middleware Identity Management Database Database Security Infrastructure Infrastructure Security © 2011 Oracle Corporation – Proprietary and Confidential 5
  • 6. Oracle Identity Management 11g Complete and Integrated Suite Unified Administration Identity Directory Administration Services Access Management • Unified and Modern Web 2.0 • Simplified Systems Management based Admin Interface • Shared Services for: • Unified Installation and Configuration • Password Management • Common Auditing and Logging • Identity Administration • Common Policy Framework • Single Sign-On • Strong Authentication © 2011 Oracle Corporation – Proprietary and Confidential 6
  • 7. Oracle Identity Management Overview Complete, Hot-Pluggable, & Service-Oriented Security Identity Administration Access Management Directory Services Access Manager Identity Federation Identity Manager Adaptive Access Manager Unified Directory Server Enterprise Single Sign-On Directory Server EE Entitlements Server Internet Directory Enterprise Gateway Virtual Directory Web Services Security Identity & Access Governance Identity Analytics Platform Security Services Operational Manageability Management Pack For Identity Management © 2011 Oracle Corporation – Proprietary and Confidential 7
  • 8. Access: Authentication & Authorization © 2011 Oracle Corporation – Proprietary and Confidential 8
  • 9. Focus on Protecting Your Data, Applications & Infrastructure End-users and access points Firewall Applications & Middleware Identity Management Database Database Security Infrastructure Infrastructure Security © 2011 Oracle Corporation – Proprietary and Confidential 9
  • 10. Oracle Database Security Continuous Innovation Database Firewall Oracle Database 11g Data Masking TDE Tablespace Encryption Audit Vault Oracle Database 10g Database Vault Transparent Data Encryption (TDE) Proxy Authentication Oracle Database 9i Fine Grained Auditing Oracle Label Security Enterprise User Security Virtual Private Database (VPD) Oracle8i Database Encryption API Strong Authentication Native Network Encryption Oracle7 Database Auditing © 2011 Oracle Corporation – Proprietary and Confidential 10
  • 11. Database Security Defense-in-Depth  Prevent access by non-database users for data at rest, in motion, and storage  Increase database user identity assurance  Strict access control to application data even from privileged users  Enforce multi-factor authorization  Audit database activity, and create reports Data  Monitor database traffic and prevent threats from reaching the database  Ensure database production environment is secure and prevent drift  Mask sensitive data in non-production environments © 2011 Oracle Corporation – Proprietary and Confidential 11
  • 12. Database Defense-in-Depth Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking © 2011 Oracle Corporation – Proprietary and Confidential 12
  • 13. Database Defense-in-Depth Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking Access Control • Oracle Database Vault • Enterprise User Security • Oracle Label Security © 2011 Oracle Corporation – Proprietary and Confidential 13
  • 14. Database Defense-in-Depth Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking Access Control • Oracle Database Vault • Enterprise User Security • Oracle Label Security Auditing and Monitoring • Oracle Audit Vault • Oracle Configuration Management • Oracle Total Recall © 2011 Oracle Corporation – Proprietary and Confidential 14
  • 15. Database Defense-in-Depth Encryption and Masking • Oracle Advanced Security • Oracle Secure Backup • Oracle Data Masking Access Control • Oracle Database Vault • Enterprise User Security • Oracle Label Security Auditing and Monitoring • Oracle Audit Vault • Oracle Configuration Management • Oracle Total Recall Blocking and Logging • Oracle Database Firewall © 2011 Oracle Corporation – Proprietary and Confidential 15
  • 16. Oracle Database Security Solutions Complete Defense-in-Depth • Comprehensive single vendor addresses all your requirements • Transparent to existing applications or databases • Easy to deploy point and click interfaces deliver value within hours Encryption & Masking Access Control • Cost Effective integrated solutions reduce risk and lower TCO Auditing Monitoring & Blocking • Proven #1 database vendor with over 30 years of security innovation! Monitoring Auditing Access Encryption & Blocking & Masking Control • Database • Audit Vault • Database • Advanced Firewall • Total Recall Vault Security • Configuration • Label Security • Secure Backup Management • Enterprise • Data Masking User Security © 2011 Oracle Corporation – Proprietary and Confidential 16
  • 17. Oracle Infrastructure for HealthCare Complete Open Integrated AND Secure! © 2011 Oracle Corporation – Proprietary and Confidential 17
  • 18. 18 Copyright © 2010, Oracle. All rights reserved
  • 19. Database Cloud Service Overview • #1 database; in the cloud • Rapid provisioning • Simple pricing • Easy to use and manage • Rapid cloud-based application development • Access using Java, RESTful Web Services and Oracle APEX • Packaged business productivity applications © 2011 Oracle Corporation – Proprietary and Confidential 19
  • 20. Security & Identity Management Service • A key enabler and differentiator of Oracle Public Cloud • Single Sign On and Identity Federation • Integration between Oracle Public Cloud & on- premise identity management systems • Fully delegated administration and dashboards • Multi-factor authentication • Use of standards for application visibility into public identity profiles • Built on Oracle Identity Management © 2011 Oracle Corporation – Proprietary and Confidential 20
  • 21. A Leader in all Analyst Coverage 2010 Magic Quadrant for 2009 Magic Quadrant for 2009 Forrester Wave for Identity & Access Mgmt User Provisioning Web Access Management As of Sept. 30th 2010 As of Nov. 12th 2009 As of Nov 30th 2009 Magic Quadrant Disclaimer: The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. The Magic Quadrant graphic was published by Gartner, Inc., as part of a larger research note and should be evaluated in the context of the entire report. The Gartner report is available upon request from Oracle
  • 22. #1 Database and Most Secure “Most DBMS vendors offer basic security features; Oracle’s offering is most comprehensive.” - Noel Yuhanna Source: Forrester Database Security Market Report, 2009 © 2011 Oracle Corporation – Proprietary and Confidential 22
  • 23. Oracle Security Customers in HC Footprint in Healthcare with 4000+ Clients Worldwide © 2011 Oracle Corporation – Proprietary and Confidential 23
  • 24. Customer Advisory Board Share, Communicate, & Partner © 2011 Oracle Corporation – Proprietary and Confidential 24
  • 25. For More Information search.oracle.com security solutions or oracle.com/security © 2011 Oracle Corporation – Proprietary and Confidential 25
  • 26. © 2011 Oracle Corporation – Proprietary and Confidential 26