검색 결과가 없습니다

검색어와 일치하는 결과가 없습니다.

원하시는 정보를 찾는 데 도움이 되도록 다음을 시도해 보십시오.

  • 검색에 사용하신 키워드의 철자가 올바른지 확인하십시오.
  • 입력한 키워드에 동의어를 사용하십시오. 예를 들어 “소프트웨어” 대신 “애플리케이션”을 사용해 보십시오.
  • 아래에 표시된 인기 검색어 중 하나를 사용해 보십시오.
  • 새로운 검색을 시작하십시오.
인기 질문

Effective and Manageable Cloud Security for Your Most Important Workloads

We've built our cloud security approach based on seven core pillars to ensure you have the level of isolation, data protection, control and visibility you need for your cloud infrastructure. We deliver a fault-tolerant, resilient and verifiably secure cloud infrastructure that enables integration with your existing security assets.

Cloud Security Family

Core Security Pillars

Read the Oracle Security White Paper to learn more about Oracle's security strategy and our seven core security pillars.

    Customer Isolation

  • Deploy your application and data assets, isolated from other tenants and Oracle.

    Data Encryption

  • Leverage controls to protect your data so that you can meet security and compliance requirements.

    Security Controls

  • Manage access to your services and segregate operational responsibilities to help reduce risk associated with malicious and accidental user actions.

    Visibility

  • Audit and monitor actions on your resources through comprehensive log data and security monitoring solutions to help reduce security and operational risk.

    Hybrid Cloud

  • Use your existing security assets, such as user accounts, policies and third-party security solutions, when accessing cloud resources and securing data and application assets.

    High Availability

  • Take advantage of consistent uptime through fault-tolerant data centers that are resilient against network attacks.

    Verifiably Secure Infrastructure

  • Run business critical workloads on a verifiably secure infrastructure that follows rigorous processes and security controls in all phases of development and operation.

Security Solutions from Trusted Partners

Launch solutions from leading security providers directly on Oracle Cloud Infrastructure via the Oracle Cloud Marketplace.

Palo Alto Networks logo

Palo Alto Networks VM-Series Next Generation Firewall

Palo Alto Networks

The VM-Series next-generation firewall protects your applications and data with the same security capabilities that protects thousands of customer networks worldwide.

Fortinet logo

Fortinet FortiGate-VM with Terraform

Fortinet

Fortinet FortiGate-VM allows mitigation of blind spots to improve policy compliance by implementing critical security controls within your OCI environment. FortiGate-VM includes all of the security and networking services common to all FortiGate appliances - physical or virtualized.

FireEye logo

FireEye Email Security

FireEye

FireEye Email Security Powered by Oracle Cloud combats advanced email-borne attacks.

Featured Resources

Oracle CASB Enables Security Monitoring for Oracle Cloud Infrastructure

Oracle CASB Enables Security Monitoring for Oracle Cloud Infrastructure

At Oracle Cloud Infrastructure, customer security is of paramount importance.

White Paper on Oracle's Security Approach and Service Offerings

White Paper on Oracle's Security Approach and Service Offerings

Oracle Cloud Infrastructure Security

Oracle Cloud Infrastructure Security Best Practices

Oracle Cloud Infrastructure Security Best Practices

This guide provides actionable guidance and recommendations to Oracle Cloud Infrastructure customers for securely configuring Oracle Cloud Infrastructure services and resources.