dcsimg

Oracle Cloud Service Looks to Unify IT Security and Compliance

Mike Vizard

Oracle is pushing to eliminate the silos that have long existed between IT security and compliance via an update to the Oracle Identity Security Operations Center (SOC) cloud service.

Rohit Gupta, group vice president for cloud security at Oracle, says the latest version of Oracle Identity SOC makes it possible to determine how changes to providing access to applications might impact the overall IT security posture of an organization. For example, when a user is given access to a new application, Oracle SOC applies advanced analytics and machine learning algorithms to the feeds being generated via the Oracle Cloud Access Security Broker service to determine the potential impact that change might have on the security of other applications, says Gupta. In addition, Gupta says IT organizations can use that capability to identify what credentials are no longer being used. Those capabilities are enabled by tightening integration between Oracle Identity SOC and the Oracle Cloud Compliance service that is part of Oracle Management Cloud.

Those same analytics, adds Gupta, can be employed to determine what ports are open or whether encryption has been inadvertently turned off. IT organizations can then determine if they want those ports to be automatically turned off or encryption enabled by default, says Gupta.

Oracle is also integrating Oracle Identity SOC with Oracle Marketing Cloud and Oracle Data Cloud, which makes it possible for IT organizations to extend those identity management and compliance capabilities to external-facing applications.

Finally, Oracle has unfurled Identity SOC Security Network in Oracle Cloud Marketplace to provide connectors to third-party security technologies spanning enterprise mobility management, firewalls, endpoint security and threat intelligence services.

Gupta says IT organizations want to be able to more flexibly and consistently apply security policies by relying on cloud services based on application programming interfaces (APIs). In many instances, Gupta says, that need is being driven by the unification of IT security and application development, otherwise known as DevSecOps.

“We’re trying to take security to another level,” says Gupta.

OracleSOCDashboard

It is too early to say whether such a shift will result in more secure IT environments. But given the current state of IT security in the enterprise, there’s little doubt that a more programmatic approach that brings IT security and compliance processes closer together would represent a significant step in the right direction for most IT organizations.


Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.




Add Comment      Leave a comment on this blog post
Jul 23, 2018 8:55 PM techate techate  says:
It security need for who provide internet-based service or product. They are very in a risky zone for database security and storage. Oracle is a big company and has the good expert team who handle any kind of database with high safe effort Reply

Post a comment

 

 

 

 


(Maximum characters: 1200). You have 1200 characters left.

 

null
null

 

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


 

By submitting your information, you agree that itbusinessedge.com may send you ITBbusinessEdge offers via email, phone and text message, as well as email offers about other products and services that ITBbusinessEdge believes may be of interest to you. ITBbusinessEdge will process your information in accordance with the Quinstreet Privacy Policy.