검색 결과가 없습니다

검색어와 일치하는 결과가 없습니다.

원하시는 정보를 찾는 데 도움이 되도록 다음을 시도해 보십시오.

  • 검색에 사용하신 키워드의 철자가 올바른지 확인하십시오.
  • 입력한 키워드에 동의어를 사용하십시오. 예를 들어 “소프트웨어” 대신 “애플리케이션”을 사용해 보십시오.
  • 아래에 표시된 인기 검색어 중 하나를 사용해 보십시오.
  • 새로운 검색을 시작하십시오.
인기 질문

Oracle Cloud Infrastructure Security Stands Out

See how security helps differentiate Oracle Cloud Infrastructure from other cloud providers.

Cloud Security to Protect Your Workloads

See how Oracle Cloud Infrastructure protects sensitive, business-critical workloads.

Secure Your Cloud Infrastructure

Not all public clouds are the same on security. At Oracle we have been serving enterprises for over four decades. We understand the requirements for securing mission critical workloads. Our public cloud is built on security-first design principles that exceed earlier cloud designs, delivering high customer isolation and automated protections with data residency, sovereignty, and security at the core of our innovation and operations.

Generation 2 Security Architecture

Generation 2 Security Architecture

Oracle Cloud Infrastructure is a Generation 2 security platform, conceived and architected on security-first design principles. Innovations like isolated network virtualization and pristine physical host deployment, enable customer isolation from other cloud tenants and from Oracle personnel as well as reduced risk from advanced persistent threats.

Automated, always-on security controls

Automated, always-on security controls

Cloud security should be easy to implement and use, preventing all-too-common errors from misconfiguration and making security best practices mandatory. This bold premise is at the core of development of Oracle Cloud Infrastructure’s layered defenses and security controls which span the full stack of cloud deployment protection requirements.

Deep expertise in global data protection

Deep expertise in global data protection

Oracle’s approach to security is informed by more than 40 years experience in protecting the world’s most sensitive data. We operate our cloud in the regions that customers require with the processes, personnel, and certifications to meet local and organizational needs for data sovereignty, privacy, and transparency.