Story image

Oracle’s bid to deliver end-to-end cloud security

25 Oct 2018

To help ensure customers’ data is secure from the core of infrastructure to the edge of the cloud, Oracle announced new cloud security technologies. 

In addition to the self-securing and self-patching capabilities of Oracle Autonomous Database and with the integration of machine learning and intelligent automation to remediate threats, these new cloud services allow customers to improve the security of applications deployed on the next generation of Oracle Cloud Infrastructure. 

The new cloud services include a Web Application Firewall (WAF) to protect against attacks on web traffic, Distributed Denial-of-Service (DDoS) protection to stop outside parties from disrupting running applications, an integrated Cloud Access Security Broker (CASB) which monitors and enforces secure configurations, and a Key Management Service (KMS) that allows customers to control the encryption of their data.

Emerging technologies like cloud, artificial intelligence and IoT, enable organizations to drive new innovations and reduce costs. However, with opportunities come increased risk including expanded attack surfaces. 

Security teams rely on manual processes and disparate tools that introduce human error and take an excessive amount of time to accurately detect and respond to threats and outages. Oracle has built integrated layers of defence that are designed to secure users, apps, data and infrastructure.

“Organizations are facing constant security threats from sophisticated actors who want to attack their applications and access their sensitive data,” said Don Johnson, senior vice president, product development, Oracle Cloud Infrastructure. 

“The new solutions build on Oracle’s existing, strong security heritage and give customers always-on capabilities that make it easier than ever to achieve end-to-end security. These new security layers include highly automated detective, preventive, responsive, and predictive security controls that help mitigate data breaches, address regulatory compliance, and reduce overall risk.”

To help customers combat today’s sophisticated threats and protect their data, Oracle has introduced the following automated security solutions:

Web Application Firewall (WAF)

The native WAF is designed to protect next generation Oracle Cloud Infrastructure applications against botnets, application attacks and DDoS attacks. The platform can then automatically respond to threats by blocking them and alerting security operations teams for further investigation.

Distributed Denial of Service (DDoS) Protection

As part of the next generation of Oracle Cloud Infrastructure, all Oracle data centres get automated DDoS attack detection and mitigation of high volume, Layer 3/4 DDoS attacks. This helps ensure the availability of Oracle network resources even when under sustained attack.

Cloud Access Security Broker (CASB) 

Keeping a cloud environment secure requires constant monitoring and enforcement to ensure that no one has set up an insecure network or left data unprotected. Oracle Cloud Access Security Broker (CASB) constantly checks OCI environments to help make sure that corporate security practices are being followed. 

It comes with preconfigured policies and controls so that customers can deploy applications faster while reducing security and operational risk. CASB also leverages machine learning-based behavioural analytics to predict threats.

Key Management Service

Oracle Key Management enables enterprises to encrypt data using keys that they control and offers centralized key management and key lifecycle monitoring capabilities. 

The solution delivers partitions in highly available and certified Hardware Security Modules that are isolated per customer. It is ideal for organizations that need to verify for regulatory compliance and security governance purposes that their data is encrypted where it is stored.

WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.
New threat rears its head in new malware report
Check Point’s researchers view Speakup as a significant threat, as it can be used to download and spread any malware.