Thursday Feb 28, 2013
Thursday Feb 14, 2013
By Troy Kitch-Oracle on Feb 14, 2013
According to Gartner, “Adopting data masking helps enterprises raise the level of security and privacy assurance against abuses. At the same time, data masking helps enterprises meet compliance requirements with the security and privacy standards recommended by regulating/auditing authorities.”
Gartner continued, “…we expect a relatively high speed of technology maturity for data masking. By 2016, the static data masking [SDM] market will reach the Plateau of Productivity in Gartner's Hype Cycle, with approximately 50% of the target audience adopting it.”
“With more structured and unstructured data in enterprise databases, companies need simple and consistent tools to comply with data privacy regulations and mask sensitive data during application development, testing or data analysis,” said Vipin Samar, Vice President of Database Security Product Development, Oracle. “Oracle is the world’s #1 database provider, integrating best-in-class hardware and software to deliver extreme performance and ensure robust database security for our customers.”
Oracle Data Masking Pack is a component of Oracle Enterprise Manager and part of the Oracle Database Security defense-in-depth solution. Get the Gartner Magic Quadrant for Data Masking Technology here.
(1) Gartner, Inc., “Magic Quadrant for Data Masking Technology,” by Joseph Feiman, Carsten Casper, December 20, 2012
Thursday Feb 07, 2013
By Troy Kitch-Oracle on Feb 07, 2013
Oracle is exhibiting at RSA Conference 2013. The RSA Conference 2013 is a premier security conference that gives attendees a chance to learn about IT security's most important issues through first-hand interactions with peers, luminaries, and emerging and established companies.
Here’s a quick run-down of all things Oracle at this year’s RSA Conference.
Mark your Calendars:
PNG F43: Waiter, There's a Fly in My Code
Mary Ann Davidson, Chief Security Officer, Oracle and Joshua Brickman, Program Director, CA Technologies
Friday, March 1, 11:40 a.m. -12:00 p.m. in Room 131
Oracle Solution Showcase:
While at the conference, catch the latest Database Security and Identity Management product demonstrations at Oracle Booth # 1941.
Monday, Feb 25, 2013 6:00 a.m. – 8:00 p.m. (Welcome Reception)
Tuesday, Feb 26, 2013 11:00 a.m. – 6:00 p.m.
Wednesday, Feb 27, 2013 11:00 a.m. – 6:00 p.m.
Thursday, Feb 28, 2013 11:00 a.m. – 3:00 p.m.
Book Signing with Mary Ann
Davidson at Oracle Solution Showcase:
Plan to meet Mary Ann Davidson, Chief Security Officer, Oracle and receive an autographed copy of either "Outsourcing Murder" or her new book "Denial of Service", part of the Miss-Information Technology Series.
Monday, Feb 25, 2013 6:30 a.m. – 7:30 p.m.
Tuesday, Feb 26, 2013 1:00 p.m.– 2:00 p.m.
5:00 p.m. – 6:00 p.m.
Wednesday, Feb 27, 2013 1:00 a.m. – 2:00 p.m.
Oracle Security Executives:
Oracle Security product management executives and experts will be in attendance at this year’s RSA Conference. Like to schedule a meeting? Simply send us a note with your information, areas of interest and 3 preferred time slots and we will confirm.
Get free access to the exhibit floor by registering here using the code: FXE13ORAC, compliments of Oracle. To take advantage of the complimentary code, you’d need to register by February 22.We look forward to seeing you at RSA Conference 2013.
Wednesday Feb 06, 2013
By Troy Kitch-Oracle on Feb 06, 2013
Please join Oracle and (ISC)2 as we discuss the importance of detective, preventive, and administrative security controls for a comprehensive database security defense-in-depth strategy.
According to leading industry reports, 98% of breached data originates from database servers and nearly half are compromised in less than a minute! Almost all victims are not aware of a breach until a third party notifies them and nearly all breaches could have been avoided through the use of basic controls. Join (ISC)2 and Oracle on January 31, 2013 for Part 1 of our next Security Briefings series that will focus on database security and the detective, preventive, and administrative controls that can be put in place to mitigate the risk to your databases. There's no turning back the clock on stolen data, but you can put in place controls to ensure your organization won't be the next headline.
The collaboration and sharing of information made possible by social media has enabled a new class of social engineering attacks, greatly increasing the risks posed by insiders for most organizations. Consider that LinkedIn searches for "Database Administrator" and "System Administrator" return over one million potential targets. In fact, stolen credentials were involved in 84% of the attacks that have resulted in over one billion records stolen from database servers. Join (ISC)2 and Oracle on February 21, 2013 for Part 2 of our Security Briefings series as we focus on database security and the preventive controls that can be used to mitigate the risks posed by insiders and attackers exploiting legitimate access to data and database infrastructure by adopting a defense-in-depth strategy.
Who are we?
Follow us on
- Securing Information in the New Digital Economy
- Top Two Cloud Security Concerns: Data Breaches and Data Loss
- All Data is Not Equal, Map Security Controls to the Value of Data
- Oracle Cloud Forum - Mapping Security Controls to the Value of Data
- 34% of Organizations Say Data Breach “Somewhat likely” to “Inevitable” in 2015
- Oracle Security Webcast Series for UK Customers
- Encrypting, Redacting and Masking at Epsilon
- Why Infinity Insurance Chose Oracle Advanced Security and Database Vault
- ISACA Webcast: Data-Centric Audit and Protection, Reducing Risk and Improving the Security Posture
- New KuppingerCole Report on Audit Vault and Database Firewall