Niciun rezultat găsit

Căutarea dvs. nu a întors niciun rezultat

We suggest you try the following to help find what you're looking for:

  • Check the spelling of your keyword search.
  • Use synonyms for the keyword you typed, for example, try “application” instead of “software.”
  • Try one of the popular searches shown below.
  • Start a new search.

 

Trending Questions

Cloud Security to Protect Your Workloads

See how Oracle Cloud Infrastructure protects sensitive, business-critical workloads.

Secure Your Cloud Infrastructure

Not all public clouds are the same on security. At Oracle we have been serving enterprises for over four decades. We understand the requirements for securing mission critical workloads. Our public cloud is built on security-first design principles that exceed earlier cloud designs, delivering high customer isolation and automated protections with data residency, sovereignty, and security at the core of our innovation and operations.

Generation 2 Security Architecture

Generation 2 Security Architecture

Oracle Cloud Infrastructure is a Generation 2 security platform, conceived and architected on security-first design principles. Innovations like isolated network virtualization and pristine physical host deployment, enable customer isolation from other cloud tenants and from Oracle personnel as well as reduced risk from advanced persistent threats.

Automated, always-on security controls

Automated, always-on security controls

Cloud security should be easy to implement and use, preventing all-too-common errors from misconfiguration and making security best practices mandatory. This bold premise is at the core of development of Oracle Cloud Infrastructure’s layered defenses and security controls which span the full stack of cloud deployment protection requirements.

Deep expertise in global data protection

Deep expertise in global data protection

Oracle’s approach to security is informed by more than 40 years experience in protecting the world’s most sensitive data. We operate our cloud in the regions that customers require with the processes, personnel, and certifications to meet local and organizational needs for data sovereignty, privacy, and transparency.