返回 搜尋 透過語音搜尋
登入
返回 Oracle 帳戶
Cloud 帳戶 登入 Cloud

找不到任何結果

您的搜尋查無相符結果

以下操作有助您找到所需內容,建議您不妨一試:

  • 檢查您關鍵字搜尋的拼字是否正確。
  • 改用您所輸入關鍵字的同義詞,例如以「應用軟體」取代「軟體」。“”“”
  • 嘗試下列其中一項熱門搜尋。
  • 開始新的搜尋。

 

常見問題

Cloud Security to Protect Your Workloads

See how Oracle Cloud Infrastructure protects sensitive, business-critical workloads.

Secure Your Cloud Infrastructure

Not all public clouds are the same on security. At Oracle we have been serving enterprises for over four decades. We understand the requirements for securing mission critical workloads. Our public cloud is built on security-first design principles that exceed earlier cloud designs, delivering high customer isolation and automated protections with data residency, sovereignty, and security at the core of our innovation and operations.

Generation 2 Security Architecture

Generation 2 Security Architecture

Oracle Cloud Infrastructure is a Generation 2 security platform, conceived and architected on security-first design principles. Innovations like isolated network virtualization and pristine physical host deployment, enable customer isolation from other cloud tenants and from Oracle personnel as well as reduced risk from advanced persistent threats.

Automated, always-on security controls

Automated, always-on security controls

Cloud security should be easy to implement and use, preventing all-too-common errors from misconfiguration and making security best practices mandatory. This bold premise is at the core of development of Oracle Cloud Infrastructure’s layered defenses and security controls which span the full stack of cloud deployment protection requirements.

Deep expertise in global data protection

Deep expertise in global data protection

Oracle’s approach to security is informed by more than 40 years experience in protecting the world’s most sensitive data. We operate our cloud in the regions that customers require with the processes, personnel, and certifications to meet local and organizational needs for data sovereignty, privacy, and transparency.