Corporate Security Blog

Securing the Oracle Cloud

Technology safeguards, fewer risks, and unparalleled security motivate CIOs to embrace cloud computing.

If one thing is constant in the IT world, it's change. Consider the age-old dilemma of security versus innovation. Just a few years ago, concerns about data security and privacy prevented some organizations from adopting cloud-based business models. Today, many of these concerns have been alleviated. IT leaders are migrating their applications and data to the cloud in order to benefit from security features offered by some cloud providers. The key is to choose the right technology—one that is designed to protect users, enhance safeguarding of data, and better address requirements under privacy laws. Find out why millions of users rely on advanced and complete cloud services to transform fundamental business processes more quickly and confidently than ever before.

The Evolving Security Landscape

Mitigating the Risk of Data Loss with Cloud Technology

The IT security practices of many organizations that manage their own systems may not be strong enough to resist complex threats from malware, phishing schemes, and advanced persistent threats unleashed by malicious users, cybercriminal organizations, and state actors. The perimeter-based security controls typically implemented by organizations who manage their own security—from firewalls, intrusion detection systems, and antivirus software packages—are arguably no longer sufficient to prevent these threats.

It's time to look further. It's time to look to the cloud. Thousands of organizations and millions of users obtain a better security position using a tier 1 public cloud provider than they can obtain in their own data centers. A full 78 percent of businesses surveyed say the cloud can improve both their security and their agility.5 Consider the facts: Most of today's security budgets are used to protect the network, with less than a third used to protect data and intellectual property that resides inside the organization.6 Network security is important, but it's not enough.

Building Oracle's Defense-in-Depth Strategy

Oracle Cloud is built around multiple layers of security and multiple levels of defense throughout the technology stack. Redundant controls provide exceptional resiliency, so if vulnerability is discovered and exploited in one layer, the unauthorized user will be confronted with another security control in the next layer.

But having some of the world's best security technology is only part of the story. Oracle aligns people, processes, and technology to offer an integrated defense-in-depth platform:

  • Preventive controls designed to mitigate unauthorized access to sensitive systems and data
  • Detective controls designed to reveal unauthorized system and data changes through auditing, monitoring, and reporting
  • Administrative measures to address security policies, practices, and procedures

Gaining an Edge with Cloud Security

In the Digital Age, companies depend on their information systems to connect with customers, sell products, operate equipment, maintain inventory, and carry out a wide range of other business processes. If your data is compromised, IT assets quickly become liabilities. A 2016 Ponemon Institute study found that the average cost of a data breach continues to rise each year, with each lost or stolen record that contains confidential information representing US$158 in costs or penalties.8 In response, more and more organizations are transitioning their information systems to the cloud to achieve better security for sensitive data and critical business processes.

Security used to be an inhibitor to moving to the cloud. Now it's an enabler to get you where you need to go. Oracle helps you embrace the cloud quickly, and with confidence.

Learn more about Oracle security cloud services, read the paper "Oracle Infrastructure and Platform Cloud Services Security", and try Oracle Cloud today.

1 QuinStreet Enterprise, "2015 Security Outlook: Meeting Today's Evolving Cyber-Threats".
2 Ponemon Institute, "The Cost of Malware Containment," 2015.
3 Leviathan Security Group, "Quantifying the Cost of Cloud Security,".
4 Crowd Research Partners, "Cloud Security: 2016 Spotlight Report"
5 Coleman Parkes Research, "A Secure Path to Digital Transformation".
6 CSO Market Pulse, "An Inside-Out Approach to Enterprise Security."
7 Jeff Kauflin, "The Fast-Growing Job with a Huge Skills Gap: Cyber Security," Forbes, March 16, 2017.
8 IBM Security, "2016 Ponemon Cost of Data Breach Study"

Be the first to comment

Comments ( 0 )
Please enter your name.Please provide a valid email address.Please enter a comment.CAPTCHA challenge response provided was incorrect. Please try again.Captcha

Integrated Cloud Applications & Platform Services