該当する結果がありません

一致する検索結果がありませんでした

お探しのものを見つけるために、以下の項目を試してみてください。

  • キーワード検索のスペルを確認してください。
  • 入力したキーワードの同義語を使用してください。たとえば、「ソフトウェア」の代わりに「アプリケーション」を試してみてください。
  • 下記に示すよく使用される検索語句のいずれかを試してみてください。
  • 新しい検索を開始してください。

 

急上昇中の質問

Cloud Security to Protect Your Workloads

See how Oracle Cloud Infrastructure protects sensitive, business-critical workloads.

Secure Your Cloud Infrastructure

Not all public clouds are the same on security. At Oracle we have been serving enterprises for over four decades. We understand the requirements for securing mission critical workloads. Our public cloud is built on security-first design principles that exceed earlier cloud designs, delivering high customer isolation and automated protections with data residency, sovereignty, and security at the core of our innovation and operations.

Generation 2 Security Architecture

Generation 2 Security Architecture

Oracle Cloud Infrastructure is a Generation 2 security platform, conceived and architected on security-first design principles. Innovations like isolated network virtualization and pristine physical host deployment, enable customer isolation from other cloud tenants and from Oracle personnel as well as reduced risk from advanced persistent threats.

Automated, always-on security controls

Automated, always-on security controls

Cloud security should be easy to implement and use, preventing all-too-common errors from misconfiguration and making security best practices mandatory. This bold premise is at the core of development of Oracle Cloud Infrastructure’s layered defenses and security controls which span the full stack of cloud deployment protection requirements.

Deep expertise in global data protection

Deep expertise in global data protection

Oracle’s approach to security is informed by more than 40 years experience in protecting the world’s most sensitive data. We operate our cloud in the regions that customers require with the processes, personnel, and certifications to meet local and organizational needs for data sovereignty, privacy, and transparency.