Back to the main page
Expert Tips: Protect Against the Top Three Security Concerns in 2013
For more than two decades, Graham Palmer, director of information security for Oracle's EMEA operations and a cyber-security expert, has helped companies investigate information breaches and improve their IT security.
In the wake of numerous high-profile attacks in 2012, we asked Palmer where organizations need to redouble their security efforts in 2013—and why Oracle's security inside-out approach is uniquely positioned to meet these proliferating challenges.
- Securing Mobile: Bring Your Own Device
In the old days, organizations had a centralized team that handed out hardware. Now we're in the age when people want to access work systems with their own devices, whether it's a laptop, an iPad, a smart phone, etc.
The genie is out of the bottle, and the job of protecting corporate data—from e-mail to core applications—on multiple platforms has become a widespread challenge. Many questions arise. Do you give someone the same rights when using a corporate-issued device as when they're using their personal iPhone? Do you build an encrypted chamber within the iPhone or other device in order to keep it out of the wrong hands?
- Defending Against Advanced Persistent Threats
Increasingly, highly organized hackers are targeting specific organizations and institutions in order to get, in particular, highly sensitive information—for purposes such as theft of industrial secrets and even state-sponsored espionage. These threats are widely known as advanced persistent threats (APTs).
To achieve their goals, hackers are using progressively more-sophisticated techniques, such as spear-phishing and spy-phishing. Malware is packaged to be completely invisible, with no known signature for antivirus software to recognize. As a result, it can sit on a network for a long time without ever being detected. The risks are enormous—such as the case of a recently bankrupted telecom giant whose difficulties may have been exacerbated by stealth cyber attacks.
- Protecting Applications and Data
Many organizations are still concentrating too many security resources on perimeters. But the rise of mobility, coupled with the increasing sophistication of APTs, means perimeter firewalls alone do not guarantee information security.
According to the 2012 Verizon Data Breach Investigations Report, 94 percent of all data compromised involved servers. So the real risks are against applications, data, and the infrastructure. The report also states that 97 percent of all breaches were avoidable through simple or intermediate controls. So the question becomes one of how to protect critical assets at the many different layers where data resides.
Oracle's Security Inside-Out Approach
In response to these challenges, Oracle offers a comprehensive, inside-out approach to security—not simply relying on perimeter security, but protecting data where it lives, throughout multiple layers of systems. Oracle’s leading-edge security solutions span database security, identity management, governance, risk and compliance, enterprise management, cloud security, servers and storage, and infrastructure. Oracle is focused on delivering security products and secure solutions.
For example, Oracle Advanced Security provides transparent data encryption, so even if hackers can access data, they won't be able to read it. To prevent insider threats, Oracle Database Vault provides privileged user access controls. And Oracle Audit Vault and Database Firewall is a first line of defense for databases that consolidates audit data from databases, operating systems, directories, and more.
Centralized identity management is also essential, which is why Oracle has built identity management directly into its middleware platform. With Oracle's platform approach to identity management, you don't need a point solution to support every new mobile device or SOA solution. Oracle's approach inserts critical controls into existing digital resources, providing an extensible and secure foundation that transcends individual devices or silo-based solutions.
Learn more about Oracle's security inside out approach today.