Nenašli sa žiadne výsledky

Vášmu vyhľadávaniu nezodpovedajú žiadne výsledky.

Aby ste našli to, čo hľadáte, odporúčame vyskúšať nasledujúci postup:

  • Skontrolujte správnosť zadania kľúčových slov vo vyhľadávaní.
  • Použite synonymá pre kľúčové slovo, ktoré ste zadali, napríklad skúste použiť „aplikácia“ namiesto „softvér“.
  • Začnite nové vyhľadávanie.
Kontakt Prihlásiť sa do služby Oracle Cloud

Oracle Security, Identity, and Compliance

Protect your most valuable data in the cloud and on-premises with Oracle’s security-first approach. Oracle has decades of experience securing data and applications; Oracle Cloud Infrastructure delivers a more secure cloud to our customers, building trust and protecting their most valuable data.

Watch the data security overview video (1:41)

Accelerate your OCI skills at Oracle CloudWorld

Whether you're already using OCI or just learning what's possible, you'll benefit from attending Oracle CloudWorld from October 17 to 20.

Cloud Security for Dummies

Learn how Oracle Cloud can help your enterprise protect its infrastructure, apps, and data against cyberattacks, adhere to compliance mandates such as the EU's General Data Protection Regulation (GDPR) or the California Consumer Privacy Act (CCPA), and much more.

Mission of the Cloud-centric CISO

See how cloud computing must drive a new model for cybersecurity leadership.

Approaching Zero Trust Security with Oracle Cloud Infrastructure

Understand how Oracle Cloud Infrastructure can help organizations adopt a zero trust security model.

Our security-first approach

Reduce risk

Strengthen your security posture and reduce risk with security-first design principles that center on providing built-in security controls. These include isolated network virtualization in Oracle Cloud Infrastructure and strict separation of duties in Oracle Database.

Learn more about Oracle Cloud Infrastructure security (PDF)

Automated

Automate security to reduce complexity, prevent human error, and lower cost with automated patching for Autonomous Database and threat mitigation for Oracle Cloud Infrastructure provided by our Access Management.

Read the IDC technical brief (PDF)

Continuous protection

Keep your business protected using always-on encryption and continuous monitoring of user behavior with Autonomous Database and Oracle Cloud Infrastructure, further mitigating risk with our Access Management.

Explore Oracle’s automated, always-on, and architected-in security

Dive into the latest 2022 cloud security trends

Oracle Security

A security-first approach to protect customer workloads

Oracle Cloud Infrastructure is designed to protect customer workloads with a security-first approach across compute, network, and storage—down to the hardware. It’s complemented by essential security services to provide the required levels of security for your most business-critical workloads.

Products and features
  • Monitoring and mitigation with Cloud Guard, Security Zones, Vulnerability Scanning, and Cloud Guard Threat Detector
  • Oracle Cloud Infrastructure Identity and Access Management
  • Network Firewall
  • Key Management
  • Web Application Firewall
  • Threat Intelligence
  • Bastion
  • Certificates
  • Isolated network virtualization
  • Root of trust
  • Autonomous Linux
  • Compliance
  • Global footprint with many regions
  • Government Cloud

Safeguard your most valuable asset—data

Reduce the risk of a data breach and simplify compliance both on-premises and in the cloud with Autonomous Database and Oracle Database security solutions that include encryption, key management, data masking, privileged user access controls, activity monitoring, and auditing.

Products
  • Oracle Advanced Security
  • Oracle Audit Vault and Database Firewall
  • Oracle Data Masking and Subsetting
  • Oracle Data Safe
  • Oracle Database Security Assessment Tool
  • Oracle Database Vault
  • Oracle Key Vault
  • Oracle Label Security

Extend security and risk mitigation capabilities

Securing critical applications against fraud and misuse is essential for protecting your organization’s business-critical data within Oracle and non-Oracle services. Fine-grained access controls, visibility, and monitoring are critical components of today’s layered defenses.

Products
  • OCI Identity and Access Management
  • CASB (cloud access security broker)
  • Risk Management Cloud

Secure user access to data and applications

Oracle Identity and Access Management provides scalability with industry-leading capabilities. Reduce operational costs and achieve rapid compliance with regulatory mandates. Secure sensitive applications and data—regardless of whether they’re hosted in the cloud or on-premises.

Products
  • Oracle Cloud Infrastructure Identity and Access Management
  • Identity Governance
  • Access Management
  • Directory Services

Strong security practices and principles for built-in protection

Oracle protects the confidentiality, integrity, and availability of the data and its systems that are hosted in the cloud, no matter which cloud product is chosen.

Resources
  • Corporate security practices
  • Oracle Software Security Assurance
  • Oracle Cloud security practices
  • Compliance and privacy programs
  • Global Customer Support

Integrated and managed security services with expertise

When transitioning to cloud or multicloud environments, security teams are challenged by an expanding attack surface, alert overloads, and a cybersecurity skills shortage.

Why choose Advanced Customer Services?
  • Proactive threat monitoring
  • Improved visibility of vulnerabilities
  • Enhanced data security controls
  • Unified identity and access management
  • Increased efficiency in addressing compliance requirements

Address the challenges of an increasingly complex regulatory environment

Oracle recommends that cloud customers formally analyze their cloud strategy to determine the suitability of using the applicable Oracle cloud services in light of their own legal and regulatory compliance obligations. Oracle provides information about frameworks for which an Oracle line of business has achieved a third-party attestation or certification for one or more of its services in the form of attestations.


Oracle Security customer successes

Learn how Oracle helps protect its customers’ data with the highest levels of security across infrastructure, applications, and users.

CARE logo
Covanta logo
Doosan logo
Epsilon logo
Marlette Funding logo
MESTEC logo
Rakuten Securities logo
TIDEXA logo
Epsilon logo

Epsilon protects their customers’ sensitive data with Oracle Advanced Security

July 28, 2022

Cloud security can help improve threat detection and reduce burnout

Rachel Nizinski, Product Marketing Manager, Oracle

Messaging apps like Slack, email, project management tools, texts, and video calls can leave anyone daunted in the age of remote work—and the fatigue that many are feeling from notification overload is spreading to cybersecurity, leading to uninvestigated alerts and employee burnout.

Featured security blogs

View all

Resources

community

AskTOM Database Security Office Hours

Free tips and training every month! Subscribe for reminders and more from Office Hours.


Join Oracle’s premier online cloud community

Learning Library

Develop your database security skills

Oracle University provides you with training and certification you can rely on to ensure your organization’s success, all delivered in your choice of formats.

Get started with Oracle Security


Try Oracle Cloud Free Tier

Build, test, and deploy applications on Oracle Cloud—for free.


Blog

Learn more from the Cloud Security Perspectives and Insights blog.


Contact sales

Talk to a member of our team about Oracle Security.