Aucun résultat trouvé

Votre recherche n’a donné aucun résultat.

Oracle et KPMG : Rapport 2019 sur les menaces dans le Cloud

Une étude révélatrice réalisée par Oracle et KPMG sur les défis et les opportunités généralement rencontrés lors du passage au Cloud.

Security Operations Center (SOC)

Le Security Operations center, SOC, désigne dans une entreprise l’équipe en charge d’assurer la sécurité de l’information.

A l’heure où les utilisateurs sont de plus en plus mobiles et les réseaux périphériques sont en train de migrer vers le Cloud, les ressources IT sont davantage exposées aux menaces (malware, ransomware, phishing, attaque DDOS, attaque par Brute Force,…). Les entreprises ont besoin de contrôles de sécurité cohérents qui couvrent les environnements Cloud et On-Premise. Ces contrôles doivent prendre en compte le contexte de l'identité pour mieux prédire, prévenir, détecter et réagir aux menaces, dans l'intention de sécuriser davantage vos informations.

Hybrid Cloud Security
Take Advantage of Improved Security

Hybrid Cloud Security

With the transition to hybrid cloud environments, it’s time to up the ante on security. Oracle aligns people, process, and technology with integrated, defense-in-depth security features at every layer of the computing stack.

Cloud Access Security Broker (CASB)
Gain Visibility and Enhance Security

Cloud Access Security Broker (CASB)

Do you know what your users are doing in the cloud? Can you identify potential threats to your data and mitigate them? Enhance efforts to discover potential shadow IT activities and adopt consistent security policies for users and devices. Improve your ability to identify malicious activity—those rogue needles in the haystack—with machine learning-based user behavior analytics. Maintain more consistent and reliable security configurations to better protect your data.

General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)

Better Address the Requirements of the EU General Data Protection Regulation

IT teams must comply with a broad range of industry and government regulations such as the GDPR. Such compliance efforts require insight into the nature of your data and the ability to enforce security controls wherever this data resides. Rely on Oracle to assist your efforts to address your data privacy and regulatory requirements.

Identity Made Easy in the Cloud
Identity Made Easy in the Cloud

Identity Management

Managing users and enforcing appropriate access controls through authentication and authorization are essential aspects of your overall security strategy, but these processes should be seamless to keep the bad guys out and the good ones engaged. Cloud-based identity management technology keeps it simple, so you can boost adoption and maximize returns on your cloud investments.