Back Search Search by voice
Sign In
Back Oracle Account
Cloud Account Sign in to Cloud

No results found

Your search did not match any results

We suggest you try the following to help find what you're looking for:

  • Check the spelling of your keyword search.
  • Use synonyms for the keyword you typed, for example, try “application” instead of “software.”
  • Try one of the popular searches shown below.
  • Start a new search.


Trending Questions

Secure Your Critical Workloads

See how Oracle Cloud Infrastructure secures your critical workloads.

Oracle and KPMG Cloud Threat Report 2019

Highlighting the security gaps in the shift to business-critical cloud services.

Oracle Cloud Is the Place for Your Most Critical Workloads

Oracle Cloud has put critical workload security at the forefront. Oracle Cloud Infrastructure is built with technology to isolate customers from the parts of the cloud controlled by other tenants and even by Oracle personnel. Customers deploy on malware-resistant hardware, have options for total visibility and control with bare metal shapes, and benefit from a thoughtfully curated defense-in-depth technology stack delivering default encryption, micro-segmentation, continuous configuration, and access monitoring as well as automated application protection.

Oracle Cloud Infrastructure is for those enterprises with the most security and compliance-intense data and applications.

Hybrid Cloud Security
Take Advantage of Improved Security

Hybrid Cloud Security

With the transition to hybrid cloud environments, it’s time to up the ante on security. Oracle aligns people, process, and technology with integrated, defense-in-depth security features at every layer of the computing stack.

Cloud Access Security Broker (CASB)
Gain Visibility and Enhance Security

Cloud Access Security Broker (CASB)

Do you know what your users are doing in the cloud? Can you identify potential threats to your data and mitigate them? Enhance efforts to discover potential shadow IT activities and adopt consistent security policies for users and devices. Improve your ability to identify malicious activity—those rogue needles in the haystack—with machine learning-based user behavior analytics. Maintain more consistent and reliable security configurations to better protect your data.

General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)

Better Address the Requirements of the Forthcoming EU General Data Protection Regulation

IT teams must comply with a broad range of industry and government regulations such as the forthcoming GDPR. Such compliance efforts require insight into the nature of your data and the ability to enforce security controls wherever this data resides. Rely on Oracle to assist your efforts to address your data privacy and regulatory requirements.

Identity Made Easy in the Cloud
Identity Made Easy in the Cloud

Identity Management

Managing users and enforcing appropriate access controls through authentication and authorization are essential aspects of your overall security strategy, but these processes should be seamless to keep the bad guys out and the good ones engaged. Cloud-based identity management technology keeps it simple, so you can boost adoption and maximize returns on your cloud investments.