Wednesday Jan 13, 2016

Oracle at RSA Conference 2016

Announcing Oracle at RSA Conference 2016 – Where the World Talks Security!

Moscone Center, San Francisco
February 29 – March 4 

 

Fueled by a $288B black market for information, we are in the midst of a data breach epidemic; spending on technology has failed to reduce the risk. Effective modern security to mitigate a data breach requires an inside-out approach with a focus on data and internal controls. 

Join Oracle at RSA Conference 2016 February 29 – March 4, and glean insight into helping your organization build an inside-out security strategy.

Oracle Speaking Session (PDAC-FO3)

Friday, March 4, 2016 | 11:20 AM – 12:10 PM | West | Room 2005

Encryption without Enterprise Key Management – It’s Like Icing without Cake, Saikat Saha, Sr. Principal Product Manager, Oracle 

Deploying encryption systems without effective key management will not deliver on the promise of data security. Whilst the exciting part is the encryption technologies, loss of the keys will compromise any solution. In this session we’ll explore the value provided by the standardization of key management protocols as well as the critical part of a security solution it plays.

Meet the Experts

Visit the Oracle Security Solution Showcase (Booth #4704) to meet our security experts and see live product demonstrations. 

  • Monday, Feb 29th – 5 – 7 p.m. (Welcome reception)
  • Tuesday, Mar 1st – 10 a.m. – 6p.m.
  • Wednesday, Mar 2nd – 10 a.m. – 6 p.m.
  • Thursday, Mar 3rd – 10 a.m. – 3 p.m.

 

Register for a complimentary Exhibit Hall Pass using code XEORACLE16 (deadline Friday, February 26th) 

Thursday Aug 07, 2014

Introducing Oracle Key Vault for Centralized Key Management

[ENTER PAGE TITLE]
Banner
Oracle Customers Secure Critical Encryption Keys with Oracle Key Vault

Centrally Manage Oracle Database Encryption Master Keys, Oracle Wallets, Java KeyStores and Other Credential Files

Encryption is widely recognized as the gold standard for protecting data privacy, but encryption is only as strong as its key management. Critical credential files such as Oracle Wallets, Java KeyStores, SSH key files and SSL certificate files are often widely distributed across servers and server clusters with error-prone synchronization and backup mechanisms.

To address the need for robust key management, Oracle today introduced Oracle Key Vault, a software appliance designed to securely manage encryption keys and credential files in the enterprise data center.

Read the press release and register for the webcast to learn how Oracle Key Vault:
  • Centralizes Keys in a modern, secure, and robust key management platform
  • Secures, shares, and manages keys and secrets for the enterprise
  • Manages key lifecycle stages including creation, rotation, and expiration

Oracle Key Vault Learn more: Oracle Key Vault enables customers to quickly deploy encryption and other security solutions.

ipad
Webcast: August 21, 2014
10:00 a.m. PT/1:00 a.m. ET
Hardware and Software Engineered to Work Together
Copyright © 2014, Oracle Corporation and/or its affiliates.
All rights reserved.
Contact Us | Legal Notices and Terms of Use | Privacy Statement

Wednesday May 22, 2013

Join Us at the Gartner Security and Risk Management Summit, June 10

Oracle will be a Silver sponsor at this year's Gartner Security & Risk Management Summit in Maryland, and showcasing Oracle Database Security solutions. Stop by to meet and interact with Oracle Security experts throughout the event.

Strategic Roadmaps to Secure the Enterprise and Reduce Risk

As the premier gathering of enterprise IT security and risk management executives, the summit takes a comprehensive look at the entire spectrum of IT security, business continuity management and risk, including: network and infrastructure security, identity and access management, compliance, privacy, fraud, business continuity management, and resilience. This year’s summit offers five in-depth, role-based programs:

  • CISO Program
  • IT Security
  • Risk Management and Compliance
  • Business Continuity Management (BCM)
  • The Business of IT Security
About

Who are we?

Follow us on

  • TwitterFacebookLinkedIn

Search

Archives
« June 2016
SunMonTueWedThuFriSat
   
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
29
30
  
       
Today