Back to the main page
Oracle Cybersecurity Expert Says Agencies Need a Holistic Approach
All types and sizes of organizations throughout the world are besieged by cyberthreats today, but public sector agencies face particular challenges. Whether it’s a large intelligence agency that manages classified information or a small social services office with detailed personal files about citizens, the data represents a high-value target, especially for sophisticated state-sponsored cyberthieves, according to Franck Journoud, Oracle senior director, cybersecurity and technology policy.
“Cyber espionage is not the only threat, but it’s considerable, even for organizations that aren’t military or intelligence agencies,” Journoud says. “No organization is safe; every organization around the world is exposed.”
Adding to the challenge are the tight budgets that agencies have faced in recent years, which make it difficult to invest in new security technologies. But Journoud says agencies can better protect themselves by first creating a thorough risk profile of their operations and then making targeted investments in solutions that add layers of security throughout their operations.
“There isn’t a single silver bullet that can make an organization more secure. Instead, agencies need to think about security holistically,” Journoud says. “At Oracle, we think of this as defense in-depth security solutions.”
Oracle's end-to-end approach to security not only helps reduce the risks inherent in multiple point solutions, it also helps reduce costs associated with security and compliance. Oracle provides layers of security in five key areas.
- Application layer security. Gain comprehensive compliance management and centralized policy administration to support multiple compliance requirements.
- Middleware security. Enforce role-based access controls and identity management, including rights management and identity governance.
- Database security. Secure data at the source with a comprehensive portfolio of solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance for Oracle Database and non-Oracle databases.
- Infrastructure security. Rely on infrastructure-level security such as hardware-level encryption, to protect data at rest from unauthorized disclosure, alteration, and deletion—without impacting performance.
- Mobile and cloud security. Enable better user experiences and seamless interaction while achieving operational efficiency and data protection with security for mobile and cloud solutions.
“Agencies can’t use just a firewall on the network to defend themselves anymore—they need a new approach to security,” Journoud says. “With the right solutions, agencies can significantly reduce their risk profiles.”
Get more details about Oracle’s security inside-out solutions.
Access the secure government resource center to learn more about Oracle and security in the public sector.