Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cloud
    • Cloud
    • Cybersecurity

    Oracle Cloud Security Suites Automatically Detect, Foil Cyber-Threats

    By
    David Needle
    -
    October 4, 2017
    Share
    Facebook
    Twitter
    Linkedin
      Cloud security

      Asserting that a new approach is needed to combat cyber-crime, Oracle chairman Larry Ellison introduced two new cloud security suites at Oracle OpenWorld that rely primarily on machine learning to automatically detect and resolve threats rather than rely on human intervention.

      “Companies are losing the cyber war every year and it’s getting worse,” said Ellison. That’s because, in Ellison’s view, companies are relying too heavily on humans to protect their computer systems, which are under attack by highly sophisticated computer-generated threats.

      “We have to re-prioritize and think about how we defend our systems, because if it’s our people versus their computers, we’re going to lose that war. It has to be our computers against theirs,” Ellison said.

      In his initial OpenWorld keynote on Oct. 1, Ellison detailed the Oracle Autonomous Database set for release in December with multiple built-in security features. For example, it configures and applies security patches automatically rather than requiring IT administrators to implement patches manually during scheduled downtime.

      The recent cyber-attack that led to the theft of credit card and personal information of 145.5 million Americans held by the Equifax credit reporting company was caused by a failure to apply an available security patch to Apache Struts, Equifax has confirmed.

      But Ellison said the Autonomous Database is only part of a complete security solution. The two new cloud suites, Oracle Identity Security Operations Center and the Oracle Management Cloud, use machine learning to identify anomalies throughout a company’s IT on premises and cloud data infrastructure to remediate security threats.

      “We are using the same technology, machine learning, that is the foundation of self-driving cars and facial recognition and applying it to new areas—autonomous dataset recognition and our highly automated security and compliance cloud,” he said.

      “I’m not saying it’s never going to make a mistake,” Ellison added later. “But it’s much less likely than a team of humans managing security.”

      The Oracle Security Monitoring and Analytics Cloud Service has security incident and event management (SIEM), as well as user and entity behavioral analytics (UEBA). These features are powered by cloud activity monitoring and threat detection from the Oracle Cloud Access Security Broker service, identity context from Oracle Identity Cloud Service and operational telemetry and logs from Oracle Management Cloud.

      Oracle said all of this security and operational telemetry is accessible from the proverbial “single pane of glass” or dashboard showing results across both public and hybrid cloud environments.

      “It’s all of your assets, all your users, all the data, everything,” said Ellison. “The system will direct the database to patch itself, or if it’s a different kind of asset, to run a script to remediate an asset that cannot protect itself.”

      Ellison was also careful to note that customers can choose to implement the automated security features selectively. So, for example, if a customer wants security personnel to be alerted when an employee visits a suspicious IP address, it can be set up that way. Under the automated system, one option is to have that user’s password automatically reset or require multi-factor authentication.

      As is usually the case with Ellison speeches, he had to pick on at least one competing vendor. In this case it was Splunk which he credited with inventing the category of log analytics and being the best at doing it.

      “But the log data analytics are left in separate silos and it’s hard to analyze them or you have to use third party tools to do an analysis,” said Ellison.

      More importantly, he noted Splunk doesn’t offer automatic remediation of the anomalies it finds, such as someone using hacker tools to try and uncover a user’s password.  You need a separate system to address such security issues.

      By contrast, he said Oracle offers a single integrated system that keeps track of all a company’s software, data and user behaviors to distinguish normal or abnormal activity. “And most importantly, it remediates those problems,” he said.

      David Needle
      Based in Silicon Valley, veteran technology reporter David Needle covers mobile, bi g data, and social media among other topics. He was formerly News Editor at Infoworld, Editor of Computer Currents and TabTimes and West Coast Bureau Chief for both InformationWeek and Internet.com.

      MOST POPULAR ARTICLES

      Android

      Samsung Galaxy XCover Pro: Durability for Tough...

      Chris Preimesberger - December 5, 2020 0
      Have you ever dropped your phone, winced and felt the pain as it hit the sidewalk? Either the screen splintered like a windshield being...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Big Data and Analytics

      GoodData CEO Roman Stanek on Business Intelligence...

      James Maguire - May 4, 2022 0
      I spoke with Roman Stanek, CEO of GoodData, about business intelligence, data as a service, and the frustration that many executives have with data...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2021 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×