Back to the main page
At Oracle OpenWorld and CSO Summit, Record Attendance Underscores Need for Security Inside Out
With more than 50,000 attendees from 123 countries, Oracle OpenWorld 2012 broke previous attendance records. And in a year of high-profile breaches, it's not surprising that security-related events also attracted record crowds—from conference sessions to the Chief Security Officer Summit.
Attendees heard the latest developments in a rapidly changing security landscape, and learned how Oracle is working with its customers to provide security solutions that protect them not only at the perimeter of their organizations, but deep inside their core systems and applications.
"As criminals go after sensitive customer data, organizations across industries are seeking a more complete, comprehensive approach to security—especially as they embrace cloud, mobile, and social technologies," explains Naresh Persaud, director, Security and Identity Management, Oracle.
The Threats Are Outside, but Risks Are Inside
With media reports regularly detailing high-profile security breaches, organizations have reacted by spending billions of dollars. According to one industry analyst, the percentage of IT security spending nearly doubled in a recent three-year period. Unfortunately, much of that spending has been allocated to securing end points, such as laptops, networks, and e-mail accounts—which, while critical, is also an expensive and limited strategy.
Real vulnerabilities lie within applications, where data is created; within middleware, where data is modified and managed; within databases and file systems, where data is stored; and within the IT infrastructure, where data often resides at rest. SQL injection attacks, one of the most prevalent types of attacks, are designed to extract data right from the source—at the database server level.
That is why organizations need to build a security strategy that includes preventive, detective, and administrative controls to help address internal and external threats.
Oracle's Comprehensive, Cost-Effective Security Inside Out Approach
Unique in the industry, Oracle's end-to-end, inside-out approach not only helps reduce the risks inherent in multiple point solutions, but also drives down security and compliance costs.
Oracle provides multiple layers of security to ensure that only authorized users have appropriate access to your systems.
- Application layer security. Gain comprehensive compliance management and centralized policy administration to support multiple compliance requirements.
- Middleware security. Enforce role-based access controls and identity management, including rights management and identity governance.
- Database security. Secure data at the source with a comprehensive portfolio of solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance for both Oracle and non-Oracle Databases.
- Infrastructure security. Rely on infrastructure-level security such as hardware-level encryption to protect data that is at rest from unauthorized disclosure, alteration, and deletion—without impacting performance.
- Cloud, mobile, social experience security. Enable better user experience and seamless interaction while achieving business efficiency by safely unlocking the potential of social, cloud, and mobile environments with identity management and strong governance.
"Only Oracle has the depth and breadth of leading-edge solutions to make this possible, delivering security solutions that span database security and identity management; governance, risk, and compliance; enterprise management and cloud security; servers and storage; and infrastructure and Java," says Persaud.
Learn more about Oracle’s complete security inside out approach.
Visit Oracle Security Solutions.