검색 결과가 없습니다

검색어와 일치하는 결과가 없습니다.

원하시는 정보를 찾는 데 도움이 되도록 다음을 시도해 보십시오.

  • 검색에 사용하신 키워드의 철자가 올바른지 확인하십시오.
  • 입력한 키워드에 동의어를 사용하십시오. 예를 들어 “소프트웨어” 대신 “애플리케이션”을 사용해 보십시오.
  • 아래에 표시된 인기 검색어 중 하나를 사용해 보십시오.
  • 새로운 검색을 시작하십시오.
인기 질문

Oracle Cloud Infrastructure—Isolated Network Virtualization

Prevent attacks on customer tenancies with isolated network virtualization. A foundational element of Oracle Cloud infrastructure’s security-first architecture, Isolated network virtualization stops malware in its tracks with a custom-designed SmartNIC to isolate and virtualize the network.

Learn about security-first design principles

See how security is fundamental to the architecture of Oracle Cloud Infrastructure with tiered defenses and highly secure operations.

Oracle Cloud Infrastructure Architecture

Reduce the risk of attacks with isolated network virtualization, a key design of Oracle Cloud Infrastructure’s security architecture.

Shortcomings of first-generation clouds

In first-generation cloud offerings, if a successful attack compromises a virtual machine instance and subsequently a hypervisor, there are no barriers to prevent an attacker’s attempts to modify the network. The networking function is managed by the same hypervisor that has been compromised: a virtual machine escape that gains access to the hypervisor also has access to the network. This can lead to several threats to hosts on the network and could expose private tenant data.


Second-generation cloud advantage

Oracle Cloud Infrastructure is different from first-generation clouds because of its use of a custom-designed SmartNIC that isolates and virtualizes the network.

The SmartNIC is isolated by hardware and software from the host, preventing a compromised instance from compromising the network. Oracle Cloud Infrastructure maintains greater external control of host network functionality and can prevent network traversal attacks.


May 7, 2020

Why Oracle Cloud Infrastructure Security is a Cut Above

Amanda OCallaghan, Oracle Content Strategist

As companies transition to the cloud for greater speed and agility, they’re also starting to see security as a cloud benefit rather than a risk. But with today’s larger and more diversified threat landscape, businesses need to be absolutely sure of the depth of their security before they trust the cloud with such important workloads. At Oracle, we anticipated this need and built our cloud from the ground up to address it.

Read the complete post

Featured blogs

View all

Resources

cloud readiness

Oracle Cloud Free Tier

Build, test, and deploy applications on Oracle Cloud for free. Sign up once, get access to two free offers.

documentation

Oracle Cloud Infrastructure Security Guide

Get the latest documentation for Oracle Cloud Infrastructure Security.

customer community

Join a community of peers

Cloud Customer Connect is Oracle’s premier online cloud community. With more than 200,000 members, it’s designed to promote peer-to-peer collaboration and sharing of best practices, product updates, and feedback.

cloud learning

Develop Oracle Cloud Security skills

Oracle University provides training and certification organizations can rely on to ensure their success, all delivered in a choice of formats.

Additional areas of interest:

Hardware Root of Trust

Protect tenants from firmware-based attacks

Autonomous Linux

Get to know about the world’s first autonomous OS

Compliance

Learn how Oracle Cloud Infrastructure is addressing global compliance concerns

Oracle Cloud Infrastructure Regions

See Oracle Cloud Infrastructure Data Center Regions

Get started


Oracle Cloud Infrastructure Security

Read the architecture technical brief paper.


Explore Our Blog

Read our isolated network virtualization expert’s blog.


Try Oracle Cloud

Take advantage of Oracle Cloud Free Tier.


Oracle Cloud Infrastructure Security Differentiators

Learn more about Oracle Cloud Infrastructure security differentiators.