Wednesday, April 11, 2012
Applications-to-Disk
Oracle is the world's largest enterprise software company, and the acquisition of Sun has made it the only company that can deliver a complete, open,and integrated IT stack to its clients. The Oracle stack includes every software and hardware technology needed to manage business information and streamline business processes, and because the Oracle stack is open and integrated, it reduces IT complexity and increase its TCO.
Oracle Applications - The leading companies in every industry around the world rely on Oracle applications. Oracle has assembled the world's most complete and open portfolio of business solutions, making it the leader in business applications software. Industry-specific and horizontal business applications are complete, best-in-class solutions based on an open, standards-based architecture.
Oracle Fusion Middleware - The Oracle Fusion Middleware suite of standardsbased software is the leading software infrastructure for building and deploying enterprise applications to provide better quality information and streamlined processes. Fusion Middleware creates scalable enterprise and web applications,
and integrates different systems together to automate business processes. It also includes management technologies that extract information, and store it in repositories that enable sharing through Oracle's Enterprise 2.0 approach, secured with Oracle identity management.
Oracle Database - The innovative, industry-leading Oracle Database delivers the highest levels of performance, scalability, and reliability in the market today. Powerful Database Options such as Real Application Clusters provide enhanced availability and scalability for customers' most mission critical environments. And Oracle Database enables companies to securely maintain service levels as their businesses grow, and they upgrade and consolidate systems with the Oracle grid infrastructure.
Oracle Operating Systems - Oracle provides operating systems that form astable, scalable core for all levels of the Oracle stack. Oracle Enterprise Linux delivers the most compatible and stable Linux available, and Oracle Unbreakable Linux support is available for any Linux edition. The Oracle Solaris OS is the
innovative and uniquely flexible Unix operating system used to power Sun Servers.
Oracle Virtualization - Virtualization and operating systems options of the Oracle stack provide complete desktop-to-datacenter strategies thatoptimize computing resources. Oracle VM, Oracle Clusterware 11g, Oracle Real Application Clusters, Oracle Automatic Storage Management, and Oracle Sun Storage Virtualization, create large, scalable, reliable, datacenter and cloud computing environments that are readily managed with Oracle Enterprise Manager. Oracle VM VirtualBox creates desktop virtualization, while Oracle VDI software creates virtual desktop environments.
Sun Servers - Oracle Sun servers are a comprehensive, scalable line of systems based on industry-leading SPARC, UltraSPARC, Intel Xeon, and AMD Opteron processors to reliably meet every business requirement, now and in the future. Sun servers are cost-effective, eco-responsible solutions built in a variety of form factors and custom configurations for maximum customer benefit.
Sun Storage - Oracle's Sun Open Storage combines industry-standard hardware and open source software to deliver, reliable, scalable, and flexible, high-performance hierarchical disk storage environments to enterprise datacenters with breakthrough economics. Oracle StorageTek tape libraries, tape virtualization, tape drives, tape media, and tape software, deliver the tape solutions enterprises need to meet today's unprecedented growth in data volumes and archiving requirements.
Monday, April 9, 2012
KEY FEATURES AND BENEFIT OF ORACLE ADVANCE SECURITY
- Transparently encrypt data without application changes
- Built-in key management
- Encrypt entire application tables or individual columns
- Encrypt database exports and RMAN backups
- Encrypt Oracle SQL*Net network traffic
- Fully interoperable with Oracle Advanced Compression technologies
- Fully Interoperable with Oracle GoldenGate 11.1.1.1
- Exadata X2 ‘Smart Scan’ and EHCC support
- Integration with hardware security modules (HSM) for centralized, high assurance, key managementCryptographic acceleration with AES-NI on Intel®XEON®5600
- Industry standards – AES, 3DES, PKCS#11, PKCS#12, X.509v3
ORACLE ADVANCED SECURITY
ORACLE ADVANCED SECURITY
Oracle Advanced Security helps customers address regulatory
compliance requirements by protecting sensitive data on the
network, on storage media and within the database from
unauthorized disclosure. Transparent Data Encryption, a major
component of Oracle Advanced Security, provides the industry’s
most advanced database encryption solution for protecting sensitive
information without requiring changes to applications.
Overview
Oracle Advanced Security is an option to the Oracle Database 11g Enterprise
Edition that helps address privacy and regulatory requirements including the
Payment Card Industry Data Security Standard (PCI-DSS), Health Insurance
Portability and Accountability Act (HIPAA), and numerous breach notification
laws. Oracle Advanced Security provides data encryption and strong authentication
services to the Oracle database, safeguarding sensitive data against unauthorized
access from the network and the operating system. It also protects against theft,
loss, and improper decommissioning of storage media and database backups.
Transparent Data Encryption
Transparent data encryption (TDE) encrypts data before it is written to storage and
automatically decrypts data when reading it from storage without any changes to
existing applications – no triggers, views or other costly changes. Access controls
that are enforced by the Oracle database, including object grants, roles, virtual
private database and Oracle Database Vault, still remain in effect.
TDE supports two modes: tablespace encryption and column encryption. TDE
tablespace encryption, introduced with Oracle Database 11g, provides an efficient
solution for encrypting entire application tables. TDE tablespace encryption fully
supports Exadata X2 including Smart Scan and Hybrid Columnar Compression
(EHCC). Starting with Oracle Database 11.2.0.2, TDE tablespace encryption
automatically utilizes the hardware acceleration of the Intel ® Xeon ® 5600 CPUs
with AES-NI, enabling Oracle Database 11g to encrypt and decrypt data up to 10
times faster on Intel ®platforms, including the Oracle Exadata Database Machine.
TDE column encryption, introduced with Oracle Database 10g Release2, provides
an efficient solution for encrypting individual data elements such as credit card and
social security numbers. For TDE column and tablespace encryption, frequently
accessed data blocks are cached in memory in the same manner as traditional
nonencrypted data blocks. This efficient use of native database performance
optimizations enables TDE to minimize overhead. TDE tablespace and column
encryption also can be used in combination within the same database for hybrid
encryption solutions
Sunday, April 8, 2012
Oracle Software Powers The Internet
Oracle databases power the largest and most popular web sites on the Internet. In record numbers, organizations throughout the world are deploying distributed databases and client/server applications based on Oracle9i and Oracle Net Services. This proliferation of distributed computing is matched by an increase in the amount of information that organizations place on computers. Employee and financial records, customer orders, product information, and other sensitive data have moved from filing cabinets to file structures. The volume of sensitive information on the web has thus increased the value of data that can be compromised
Security Threats
Security Threats
The increased volume of data in distributed environments exposes users to a variety of security threats, including the following:
Eavesdropping and Data Theft
Data Tampering
Falsifying User Identities
Password-Related Threats
The increased volume of data in distributed environments exposes users to a variety of security threats, including the following:
Eavesdropping and Data Theft
Data Tampering
Falsifying User Identities
Password-Related Threats
Subscribe to:
Posts (Atom)