未找到结果

没有与搜索匹配的结果。

Effective and Manageable Cloud Security for Your Most Important Workloads

We've built our cloud security approach based on seven core pillars to ensure you have the level of isolation, data protection, control and visibility you need for your cloud infrastructure. We deliver a fault-tolerant, resilient and verifiably secure cloud infrastructure that enables integration with your existing security assets.

Cloud Security Family

Core Security Pillars

Read the Oracle Security White Paper to learn more about Oracle's security strategy and our seven core security pillars.

    Customer Isolation

  • Deploy your application and data assets, isolated from other tenants and Oracle.

    Data Encryption

  • Leverage controls to protect your data so that you can meet security and compliance requirements.

    Security Controls

  • Manage access to your services and segregate operational responsibilities to help reduce risk associated with malicious and accidental user actions.

    Visibility

  • Audit and monitor actions on your resources through comprehensive log data and security monitoring solutions to help reduce security and operational risk.

    Hybrid Cloud

  • Use your existing security assets, such as user accounts, policies and third-party security solutions, when accessing cloud resources and securing data and application assets.

    High Availability

  • Take advantage of consistent uptime through fault-tolerant data centers that are resilient against network attacks.

    Verifiably Secure Infrastructure

  • Run business critical workloads on a verifiably secure infrastructure that follows rigorous processes and security controls in all phases of development and operation.

Security Solutions from Trusted Partners

Launch solutions from leading security providers directly on Oracle Cloud Infrastructure via the Oracle Cloud Marketplace.

Palo Alto Networks logo

Palo Alto Networks VM-Series Next Generation Firewall

Palo Alto Networks

The VM-Series next-generation firewall protects your applications and data with the same security capabilities that protects thousands of customer networks worldwide.

Fortinet logo

Fortinet FortiGate-VM with Terraform

Fortinet

Fortinet FortiGate-VM allows mitigation of blind spots to improve policy compliance by implementing critical security controls within your OCI environment. FortiGate-VM includes all of the security and networking services common to all FortiGate appliances - physical or virtualized.

FireEye logo

FireEye Email Security

FireEye

FireEye Email Security Powered by Oracle Cloud combats advanced email-borne attacks.

Featured Resources

Oracle CASB Enables Security Monitoring for Oracle Cloud Infrastructure

Oracle CASB Enables Security Monitoring for Oracle Cloud Infrastructure

At Oracle Cloud Infrastructure, customer security is of paramount importance.

White Paper on Oracle's Security Approach and Service Offerings

White Paper on Oracle's Security Approach and Service Offerings

Oracle Cloud Infrastructure Security

Oracle Cloud Infrastructure Security Best Practices

Oracle Cloud Infrastructure Security Best Practices

This guide provides actionable guidance and recommendations to Oracle Cloud Infrastructure customers for securely configuring Oracle Cloud Infrastructure services and resources.