
Cybersecurity is an important aspect and becomes more precarious when organizations go to the cloud to implement mission-critical applications.
The data is the new oil of the 21st century.
The opportunity presented by the cloud also brings challenges and that is the nature of the opportunity.
Among the big data breaches that drew attention last year was Capital One, an Amazon Web Services (AWS) customer, who announced a data breach that has exposed personal information such as transaction data, credit scores, history of payments, balances and for some linked bank accounts, social security numbers of 106 million people in the United States and Canada.
The data breach was an exploitation of a configuration problem in a firewall, which is usually corrected by audits and routine security checks. This incident shows how current business security implementations are becoming more complicated as the risk landscape is always evolving.
Equifax was fined for not patching 2% of its database management, while the rest was patched while more than 1 million biometric data, usernames and passwords were stolen from Superma's Biostar 2 security platform .
According to the security research firm VpnMentor, the personal and employment data of thousands of British professionals, as well as the data stored by several British consulting firms, were not protected in the AWS S3 database in recent years.
“There is no challenge that is greater today than the risks to which we may be exposed. As we connect, threats become more real with a larger surface area and the wicked are also using the same emerging technologies to wage a highly sophisticated war against us, "said Steve Daheb, Senior Vice President of Oracle Cloud.
"We believe it is the role of the technology provider to do the integration work for you, whether through automation or services and support, while concentrating on what is good for the company," he said.
Imagine a product that self-patches, self-manages and eliminates human error and that is what differentiates Oracle from AWS and other cloud providers, he said.
"It will take 3.1 million cybersecurity professionals in the US alone, and we can't find enough people," he said.
Patches in microseconds
Not all companies can afford to hire security professionals, said Wim Coekaerts, Senior Vice President of Operating Systems and Virtualization Engineering at Oracle, adding that many people think that the cloud is not secure and, therefore, “we will have our own safety standards and features. "
That is the wrong approach, he said, and everyone has to start from scratch and it is dangerous.
“As a company, we can hire many security professionals to do it at scale. In order for us to climb, we have to do it ourselves in an autonomous database and an autonomous cloud, ”he said.
To make patches, he said that they (customers) need to download the applications, then the database and after the patches, they must restart the operating system, restart the database and applications.
“From a technical point of view, you must perform all these steps. From a practical point of view, a company must hire a project manager. You have to contact the people in the applications if they are going to agree with the recession and then you have to talk to the people in the database, ”he said.
Therefore, the entire patch schedule of an individual company is really expensive. So, the company is exposed for a few months, he said.
Oracle says it has an IP that allows it to patch the operating system in eight microseconds without tearing down the system.
“We have made 120 million patches in four hours across the cloud and nobody knew. We do not restart the server or applications. It is really important to make patches without downtime. If it is going to affect the user, they don't want to do it and there will be a delay, "Coekaerts said.
In addition, Oracle does it for you and not as a complement.
Safer Internet Initiative
Laurent Gil, Product Strategy Architect at Oracle, said that internally, Oracle has scientists and data engineers in the cloud security product space to make it more intelligent and automated.
By launching the "3D Visualization of Internet Routing" service, as part of a more secure Internet initiative, he said that Oracle aims to increase public understanding of Internet routing events such as BGP leaks, which redirects Your recipient's traffic in order to scam visitors or simply by stealing data or due to improper configuration errors that cause a black hole for Internet traffic and hijacking through visualizations.
According to the Internet Society, a non-profit organization, in 2018 there were more than 12,000 interruptions or routing leaks.
"The goal of Oracle is to make the Internet safer so that all users can feel secure in moving confidential data to the cloud and operate critical workloads in an online environment," Gil said.
Oracle has a totally different approach when it comes to security, Daheb said and "we have to think about it more comprehensively when it comes to multiple and hybrid cloud environments. It's also about protecting top-level users of applications. , data and infrastructure. "
"We see how to use artificial intelligence, machine learning and autonomous technologies and implement them in our security offers. The data is encrypted by default," he said.
In addition, he said that what Oracle offers is an intelligent and self-managed database to provide a high degree of automation to routine administrative tasks.
An autonomous database is a database in the cloud that eliminates the complexity, human error and manual management associated with optimization, security, backups and updates of the database; tasks traditionally performed by database administrators.
With an autonomous database, he said that such violations do not occur and that autonomous capabilities are based on each component of the product portfolio.
According to KuppingerCole Analysts AG, Oracle has been named general leader in database and big data security in 2019.
That's why the Oracle cloud database and infrastructure are well protected and encrypted, Daheb added.









