Uw zoekopdracht heeft geen resultaten opgeleverd.
We raden u aan het volgende te proberen om te vinden wat u zoekt:
Join the Oracle database security monthly community call.
Oracle Key Vault is specifically engineered for high-performance encryption key management for Oracle Transparent Data Encryption, part of Oracle Advanced Security.
Reduce complexity and strengthen security by centrally storing and distributing passwords, tokens, SSH keys, certificates, wallets, and other secrets. The impact of losing one of these secrets can be catastrophic. Key Vault distributes, itemizes, and protects secrets in a highly-available, scalable cluster.
High-availability cluster deployment supports up to 16 fully replicated nodes, each capable of read/write operation. Scale the cluster without downtime, support geographically distributed systems, and enable high levels of resource use with no idle standby servers.
Key Vault is engineered to work seamlessly throughout the Oracle environment with support for Oracle Database, Oracle MySQL, Oracle Exadata, Oracle Real Application Clusters, Oracle Data Guard, Oracle GoldenGate, and more. Key Vault is specifically designed to meet the demanding performance requirements of a busy database, providing secure, centralized storage and management of keys in a highly available cluster of key management servers. Key Vault provides a secure alternative to using local wallets, allowing you to safely remove the encryption keys from servers where encrypted databases are operated. This improves security and reduces the risk of compromise.
Available in Oracle Cloud Marketplace, Key Vault offers prebuilt images so organizations can get started and improve database security in just minutes. Oracle Cloud Infrastructure ( OCI)-based Oracle Key Vault clusters provide fault-tolerant, continuous key management services to on-premises, hybrid, or multicloud database deployments. Migrate on-premises Key Vault clusters to OCI, or vice versa, without database downtime. Leverage OCI’s resiliency by installing Key Vault cluster nodes into different availability domains within the same or across different Oracle Cloud regions. Benefit from the flexible deployment options by adding or removing nodes from a cluster and increasing or decreasing the size of the OCI VM shape.
Key Vault provides RESTful APIs for cluster monitoring, database enrollment, and automation, allowing management of large numbers of databases and reducing the cost of administration by eliminating the repetitive tasks of manual database registration.
Embrace a more secure alternative to using local wallets. Remove encryption keys from the database server and reduce the risk of compromise.
Key Vault offers online key management for encrypted trail files, independent of the database vendor, protecting data throughout the entire replication process.
Key Vault supports key storage and distribution for Oracle Automatic Storage Management Cluster File System.
Manage keys for Transparent Data Encryption to accelerate compliance with regulations such as GDPR, CCPA, PCI-DSS, HIPAA, and more.
Review the documentation for Oracle Key Vault versions 21.1, 18.6, 12.2 and 12.1. Topics include installation, upgrading, clustering, integration with HSMs, maintenance and management, and much more.
AskTOM Office Hours offers free, open Q&A sessions with Oracle Database experts who are eager to help you fully leverage the multitude of enterprise-strength database security tools available to your organization.
This workshop introduces Key Vault’s features, explains how to set up the environment and walks attendees through the process for generating SSH keys. Run this workshop on your own tenancy or reserve a time to run the workshop on LiveLabs, free of charge.
Download the Key Vault software appliance from the Oracle Cloud Marketplace to start using the scalable, highly-available key management system.
Learn how to set up the environment and generate SSH keys. Run the workshop on your own tenancy or reserve a time to run the workshop on LiveLabs, free of charge.
Quickly identify your database security posture and get recommendations to mitigate risks.