Oracle Information InDepth



Stay Connected

Database Security

Identity Management

Oracle on Twitter Oracle on Facebook Oracle Blog  Oracle on Twitter Oracle on Facebook Oracle Blog 

November 2012




Back to the main page

At Oracle OpenWorld and CSO Summit, Record Attendance Underscores Need for Security Inside Out

With more than 50,000 attendees from 123 countries, Oracle OpenWorld 2012 broke previous attendance records. And in a year of high-profile breaches, it's not surprising that security-related events also attracted record crowds—from conference sessions to the Chief Security Officer Summit.

Attendees heard the latest developments in a rapidly changing security landscape, and learned how Oracle is working with its customers to provide security solutions that protect them not only at the perimeter of their organizations, but deep inside their core systems and applications.

"As criminals go after sensitive customer data, organizations across industries are seeking a more complete, comprehensive approach to security—especially as they embrace cloud, mobile, and social technologies," explains Naresh Persaud, director, Security and Identity Management, Oracle.

The Threats Are Outside, but Risks Are Inside
With media reports regularly detailing high-profile security breaches, organizations have reacted by spending billions of dollars. According to one industry analyst, the percentage of IT security spending nearly doubled in a recent three-year period. Unfortunately, much of that spending has been allocated to securing end points, such as laptops, networks, and e-mail accounts—which, while critical, is also an expensive and limited strategy.

Real vulnerabilities lie within applications, where data is created; within middleware, where data is modified and managed; within databases and file systems, where data is stored; and within the IT infrastructure, where data often resides at rest. SQL injection attacks, one of the most prevalent types of attacks, are designed to extract data right from the source—at the database server level.

That is why organizations need to build a security strategy that includes preventive, detective, and administrative controls to help address internal and external threats.

Oracle's Comprehensive, Cost-Effective Security Inside Out Approach
Unique in the industry, Oracle's end-to-end, inside-out approach not only helps reduce the risks inherent in multiple point solutions, but also drives down security and compliance costs.

Oracle provides multiple layers of security to ensure that only authorized users have appropriate access to your systems.

  • Application layer security. Gain comprehensive compliance management and centralized policy administration to support multiple compliance requirements.
  • Middleware security. Enforce role-based access controls and identity management, including rights management and identity governance.
  • Database security. Secure data at the source with a comprehensive portfolio of solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance for both Oracle and non-Oracle Databases.
  • Infrastructure security. Rely on infrastructure-level security such as hardware-level encryption to protect data that is at rest from unauthorized disclosure, alteration, and deletion—without impacting performance.
  • Cloud, mobile, social experience security. Enable better user experience and seamless interaction while achieving business efficiency by safely unlocking the potential of social, cloud, and mobile environments with identity management and strong governance.

"Only Oracle has the depth and breadth of leading-edge solutions to make this possible, delivering security solutions that span database security and identity management; governance, risk, and compliance; enterprise management and cloud security; servers and storage; and infrastructure and Java," says Persaud.

Learn more about Oracle’s complete security inside out approach.

Visit Oracle Security Solutions.

Back to Top

Please send questions or comments to

This document is provided for information purposes only, and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor is it subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document, and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission.

Hardware and Software, Engineered to Work Together

Copyright © 2012, Oracle and/or its affiliates.
All rights reserved.

Contact Us | Legal Notices and Terms of Use | Privacy Statement


Oracle Corporation - Worldwide Headquarters, 500 Oracle Parkway, OPL - E-mail Services, Redwood Shores, CA 94065, United States

Your privacy is important to us. You can login to your account to update your e-mail subscriptions or you can opt-out of all Oracle Marketing e-mails at any time.

Please note that opting-out of Marketing communications does not affect your receipt of important business communications related to your current relationship with Oracle such as Security Updates, Event Registration notices, Account Management and Support/Service communications.