What You See Is What You Get Element

Oracle Information InDepth

SECURITY INSIDE OUT EDITION

Oracle

This Edition’s Content

July 2015

News

Webcasts: Identity Management

Webcasts: Database Security

Blogs

Videos

Learn More

Customer Highlights

 

Resource Libraries

Find an Oracle Partner

Oracle Magazine

Oracle User Groups

Training

Events

Subscribe Subscribe Forward Forward

Stay Connected

Database Security

Oracle on Twitter Oracle on Facebook Oracle Blog

Identity Management

Oracle on Twitter Oracle on Facebook Oracle Blog

Contact Oracle

Global Contacts Global Contacts
Sales Chat Sales Chat Live

NEWS

 

Inoculating the Cloud

Another day, another data breach. From the recent cyber attack on the Internal Revenue Service to news of a security bug called VENOM, it seems as if frequent cybersecurity incidents represent the new normal. What new methods can your security group deploy to augment traditional perimeter defenses? The key is to focus on your most valuable asset—data—and build a security strategy that protects data at its source.
Read More


Now Available! Oracle Identity Management 11g Release 2 PS3

Read about the new business-friendly user interface that simplifies the tasks associated with provisioning and managing today’s robust, identity-driven environments. Also learn about the expansion of mobile device management capabilities and a consolidated policy management framework that enables simplified provisioning of devices, applications, and access.
Read More


Securing Data Where It Matters Most

Putting defense in depth database protection in place is the first step to a security inside out data strategy. Even if an organization’s perimeter is breached, organizations can reduce risks by placing security controls around sensitive data, detecting and preventing SQL injection attacks, monitoring database activity, encrypting data at rest and in transit, redacting sensitive application data, and masking nonproduction databases. Read insights from Oracle Vice President of Security and Identity Solutions, Europe, the Middle East, and Africa, Alan Hartwell.

Back to Top
 

WEBCASTS: IDENTITY MANAGEMENT

 

“Manage, Monitor, and Audit: The Mobile User”

This webcast explores policies, technologies, and best practices to help you manage, monitor, and audit the use of mobile devices as part of a larger identity management strategy.


See More Oracle Identity Management Webcasts

Back to Top
 

WEBCASTS: DATABASE SECURITY

 

“Highlights: Larry Ellison Unveils Cloud Platform Services”

Hear highlights of the new Oracle Cloud Platform Services announcement by Oracle Executive Chairman and Chief Technology Officer Larry Ellison. View the full launch broadcast, “Oracle Cloud Platform 2015.”


“Securing Data in the Age of Mega Breaches”

With an unprecedented number of data breaches exposing hundreds of millions of records, organizations are scrambling to stay ahead of attacks. Learn how you can mitigate the threats.


See More Oracle Database Security Webcasts

Back to Top
 

BLOGS

 

Oracle Identity Management


Security Inside Out

Back to Top
 

VIDEOS

 
Oracle’s Cloud Security

Oracle’s Cloud Security (1:35)

Oracle’s security inside out strategy helps reduce risk for data in the cloud.


The Oracle App Advantage: Sony Entertainment

The Oracle App Advantage: Sony Entertainment (34:01)

Sony Entertainment Senior Director, Business Applications Sree Vaidyanathan talks with Oracle Senior Director of Product Management Rick Beers about how Sony Entertainment’s business-led IT model has led to compelling business outcomes in a competitive industry.

Back to Top
 

LEARN MORE

 

Press Release: “Oracle Integrates Mobile Security into Identity and Access Management Platform”

An enhanced user interface, new mobile capabilities, and additional compliance functions enable comprehensive identity management from a single platform.


Press Release: “Oracle Extends World’s Most Comprehensive Enterprise Cloud Portfolio”

New platform and infrastructure services enable developers, IT professionals, and business users to drive innovation and accelerate digital transformation.


White Paper: “EU Data Protection Regulatory Reform”

Read a discussion of organizational requirements, responsibilities, benefits, risks, and responses.


Infographic: Securing Information in the New Digital Economy

We are in the midst of a data breach epidemic, fueled by a lucrative information black market. The perimeter security most IT organizations rely on has become largely ineffective. Learn how Oracle can help reduce the risks and mitigate data breaches.

Back to Top
 

CUSTOMER HIGHLIGHTS

 

Case Study: “Ferrovial Improves User Management Monitoring, Efficiency, and Response Quality and Provides Secure Mobile Access to Corporate Applications”


Case Study: “SPC Brasil Improves the Security and Credibility of Credit Data Within One of Latin America’s Largest Databases”


Case Study: “Chinae Savings Bank Processes Credit Transactions 3x Faster, Enhances Data Security, and Supports Business Development with Engineered System”

Back to Top
 

RESOURCE LIBRARIES

 

Oracle Identity Management Resource Library


Oracle Database Security Resource Library

Back to Top
 

FIND AN ORACLE PARTNER

 
Oracle Specialized Partner Oracle Exastack Partner Oracle Validated Integrations
 
Back to Top
 

ORACLE MAGAZINE

 

Subscribe to Oracle Magazine Today

Subscribe to the digital edition of Oracle Magazine now and get issues delivered straight to your device. Enjoy all the benefits of a free subscription: get the latest issue early, share your favorite content, bookmark your favorite articles, and get exclusive content and videos. Sign up for the digital edition of Oracle Magazine today!

Oracle Magazine
Back to Top
 

ORACLE USER GROUPS

 

Oracle User Groups: Join Today

Oracle is committed to fostering strong and independent user groups worldwide. The more than 900 user groups focused on products, technologies, applications, and industries provide dynamic forums for customers to share information, experiences, and expertise. Find the one that’s right for you.

Oracle User Groups
Back to Top
 

TRAINING

 

Oracle Audit Vault and Database Firewall: Install and Configure

Learn how to deploy Oracle Audit Vault and Database Firewall.


Oracle Audit Vault and Database Firewall: Policies and Reports

Learn how to create audit and database firewall policies, use built-in reports, create custom reports, and define alerts.


Oracle API Gateway 11g Release 2: Manage and Control Security

Take this new course to brush up on your XML and web services security knowledge. Learn how to use Oracle API Gateway tools to configure policies and filters to secure, accelerate, and integrate XML and web services.


Oracle Identity Governance 11g Release 2: Develop Identity Provisioning

Learn how to perform advanced administration, development, and customization tasks in Oracle Identity Manager 11g Release 2 PS3.

Back to Top
 

EVENTS

 

Oracle Sponsors CISO Breakfast Roundtable: Data-Focused Protection—Toronto

August 26, 2015 │Toronto, Ontario, Canada


Oracle Sponsors CISO Executive Network Breakfast Roundtable—New York

September 1, 2015 │New York


Oracle Sponsors CISO Executive Network Breakfast Roundtable—Philadelphia

September 2, 2015 | Philadelphia, Pennsylvania


Oracle OpenWorld 2015

October 25–29, 2015 | San Francisco, California | #oow15


Oracle Friday Tech Update Database Security

November 6, 2015 | Utrecht, Netherlands


UKOUG Technology Conference & Exhibition 2015

December 7–9, 2015 | Birmingham, UK | #ukoug_tech15


Plug into Oracle Database 12c: Find an Event Near You

Find an Oracle Database event near you.


Oracle Security Events

Oracle brings security thought leaders to locations near you.

Back to Top
 
 

Please send questions or comments to newsletter_feedback_us@oracle.com.

This document is provided for information purposes only, and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor is it subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document, and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission.

Copyright © 2015, Oracle and/or its affiliates. All rights reserved.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.

Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.

  Integrated Cloud Applications and Platform Services

Contact Us | Legal Notices and Terms of Use | Privacy

 
Oracle Corporation

NSL100442762

Oracle Corporation - Worldwide Headquarters, 500 Oracle Parkway, OPL - E-mail Services, Redwood Shores, CA 94065, United States

Your privacy is important to us. You can login to your account to update your e-mail subscriptions or you can opt-out of all Oracle Marketing e-mails at any time.

Please note that opting-out of Marketing communications does not affect your receipt of important business communications related to your current relationship with Oracle such as Security Updates, Event Registration notices, Account Management and Support/Service communications.