Oracle Management Cloud · Prakash Ramamurthy Senior Vice President, Systems Management and...

19
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Oracle Management Cloud Security Edition Prakash Ramamurthy Senior Vice President, Systems Management and Security Confidential – Oracle Internal/Restricted/Highly Restricted

Transcript of Oracle Management Cloud · Prakash Ramamurthy Senior Vice President, Systems Management and...

  • Copyright © 2016, Oracle and/or its affiliates. All rights reserved. |

    Oracle Management CloudSecurity Edition

    Prakash RamamurthySenior Vice President, Systems Management and Security

    Confidential – Oracle Internal/Restricted/Highly Restricted

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

    Safe Harbor Statement

    The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.

    Confidential – Oracle Internal/Restricted/Highly Restricted 2

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

    Security Challenges Are Visible

    • Pieces of malware discovered in 2015430m1m

    Sources: 1. Verizon's 2016 Data Breach Investigations Report, , 2. DarkReading.com, June 2016, , quoting Symantec. 3. Gartner, “Special Report: Cybersecurity at the Speed of Digital Business,” August 2016.

    • Daily cyberattacks in 2015

    • Digital businesses that will suffer major security failures by 202060%

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |Oracle Public 4

    Security Gaps Are Widening

    ! New and unknown vectors! Low & slow, multi-stage

    threats! Targeted attacks

    ! Cloud adoption, shadow IT! BYOD, unmanaged devices! “Identity” - the only

    remaining perimeter

    ! Continuous integration/delivery

    ! Higher risk of mis-configuration

    ! Shrinking detection windows

    ! More things to monitor! More tools, more alerts! Staffing shortages

    Shrinking Visibility

    Growing Threat

    Sophistication

    Overwhelmed SOC

    AcceleratedChange

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

    It's not my machines, it's your code!

    It's not my code, it's your machines!

    Where’s the data?

    5

    What does the data mean?

    Human-Factor Dependence is Widespread and Inefficient

    END USER EXPERIENCE

    APPLICATION

    MIDDLE TIER

    DATA TIER

    VIRTUALIZATION TIER

    VM CONTAINER

    INFRASTRUCTURE TIER

    VM CONTAINER

    Real UsersSynthetic Users

    App metricsTransactions

    Server metricsDiagnosticsLogs

    Host metricsVM metricsContainer metrics

    CMDBTicketsAlerts

    END USER EXPERIENCE

    APPLICATION

    MIDDLE TIER

    DATA TIER

    VIRTUALIZATION TIER

    VM CONTAINER

    INFRASTRUCTURE TIER

    VM CONTAINER

    Real UsersSynthetic Users

    App metricsTransactions

    Server metricsDiagnosticsLogs

    Host metricsVM metricsContainer metrics

    CMDBTicketsAlerts

    END USER EXPERIENCE

    APPLICATION

    MIDDLE TIER

    DATA TIER

    VIRTUALIZATION TIER

    VM CONTAINER

    INFRASTRUCTURE TIER

    VM CONTAINER

    Real UsersSynthetic Users

    App metricsTransactions

    Server metricsDiagnosticsLogs

    Host metricsVM metricsContainer metrics

    CMDBTicketsAlerts

    END USER EXPERIENCE

    APPLICATION

    MIDDLE TIER

    DATA TIER

    VIRTUALIZATION TIER

    VM CONTAINER

    INFRASTRUCTURE TIER

    VM CONTAINER

    Real UsersSynthetic Users

    App metricsTransactions

    Server metricsDiagnosticsLogs

    Host metricsVM metricsContainer metrics

    CMDBTicketsAlerts

    END USER EXPERIENCE

    APPLICATION

    MIDDLE TIER

    DATA TIER

    VIRTUALIZATION TIER

    VM CONTAINER

    INFRASTRUCTURE TIER

    VM CONTAINER

    Real UsersSynthetic Users

    App metricsTransactions

    Server metricsDiagnosticsLogs

    Host metricsVM metricsContainer metrics

    CMDBTicketsAlerts

    END USER EXPERIENCE

    APPLICATION

    MIDDLE TIER

    DATA TIER

    VIRTUALIZATION TIER

    VM CONTAINER

    INFRASTRUCTURE TIER

    VM CONTAINER

    Real UsersSynthetic Users

    App metricsTransactions

    Server metricsDiagnosticsLogs

    Host metricsVM metricsContainer metrics

    CMDBTicketsAlerts

    END USER EXPERIENCE

    APPLICATION

    MIDDLE TIER

    DATA TIER

    VIRTUALIZATION TIER

    VM CONTAINER

    INFRASTRUCTURE TIER

    VM CONTAINER

    Real UsersSynthetic Users

    App metricsTransactions

    Server metricsDiagnosticsLogs

    Host metricsVM metricsContainer metrics

    CMDBTicketsAlerts

    END USER EXPERIENCE

    APPLICATION

    MIDDLE TIER

    DATA TIER

    VIRTUALIZATION TIER

    VM CONTAINER

    INFRASTRUCTURE TIER

    VM CONTAINER

    Real UsersSynthetic Users

    App metricsTransactions

    Server metricsDiagnosticsLogs

    Host metricsVM metricsContainer metrics

    CMDBTicketsAlerts

    It’s not my policies, it’s your code!

    It’s not my code, it’s your policies!

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

    Have All The Data You Need

    6

    Know What The Data Means

    What if You Could…?

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

    Introducing

    7

    Smarter insight.

    Swifter action.

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | 8

    Our Vision

    Complete, integrated suite of management solutions

    Designed for heterogeneous applications and infrastructure

    Rapid time to valueOn Premise

    Application PerformanceMonitoring

    LogAnalytics IT

    Analytics

    Infrastructure Monitoring

    ComplianceOrchestration

    Brand-new systems management services September 2016

    Security Monitoring & Analytics

    Brand-new security services September 2016

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | Confidential – Oracle Internal/Restricted/Highly Restricted 9

    Part of the Oracle Identity SOC Solution

    Content Security User Security Network Security

    Security PostureApplications, data and user activity analytics, threat intelligence, and compliance

    One-Stop SOC Dashboard

    Automated Incident Response & Remediation

    Security Monitoring & Analytics + Compliance Cloud Services

    Cloud Security Service

    Identity Cloud Service

    API Platform Cloud Service

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

    01100100 01100001 01110100 01100001 0110010001100001 01110100 0100 0110000101100100 01100001 01110100 01100001 0110010001100001 01011 01110100110000101100100 01100001 01110100 110000101100100 01100001 01110100 011000010110010001100001 01110100 110000101100100 0100111 01100001 01110100110000101100100 01100001 01110100 01100001 011010 0110010001100001 0111010001100001 0110010001100001 01110100 01001 01100001 0110010001100001 0111010001100001 0110010001100001 01001 01110100 01100001 0110010001100001 0111010001100001 0100101001 001 0110010001100001 01110100 01100001 011001000110000101110100 010011 01100001 0110010001100001 01110100 01100001 01100100 0110000101001 01110100 01100001 0110010001100001 01110100 01100001 01100100 0100 0110000101110100 01100001 0110010001100001 01110100 01000100 0100 11000010110010001100001 01110100 110000101100100 01100001 01110100 01100001 011001000110000101110100 110000101100100 01100001 010001 01110100 110000101100100 0110000101110100 01100001 01000100 010011 0110010001100001 01110100 011000010110010001100001 01110100 01000 01110100 110000101100100 01100001 0111010001100001 01000100 010011 0110010001100001 01110100 01100001 011001000110000101110100 010011

    Comprehensive View of Security Posture and Threats

    10

    END USER EXPERIENCE/ACTIVITY

    APPLICATION

    MIDDLE TIER

    DATA TIER

    VIRTUALIZATION TIER

    VM CONTAINER

    INFRASTRUCTURE TIER

    VM CONTAINER

    Real UsersSynthetic Users

    Unified Platform

    App metricsTransactions

    Server metricsDiagnosticsLogs

    Host metricsVM metricsContainer metrics

    CMDB/ComplianceTicketsAlerts

    INTELLIGENT, UNIFIED PLATFORM

    POWERED BY MACHINE LEARNING

    INFORMED BY A COMPLETE DATA SET

    HETEROGENEOUS AND OPEN

    Security Events

    Global Threat FeedsCASBIdentity

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | 11

    01100100 01100001 01110100 01100001 0110010001100001 01110100 0100 0110000101100100 01100001 01110100 01100001 0110010001100001 01011 01110100110000101100100 01100001 01110100 110000101100100 01100001 01110100 011000010110010001100001 01110100 110000101100100 0100111 01100001 01110100110000101100100 01100001 01110100 01100001 011010 0110010001100001 0111010001100001 0110010001100001 01110100 01001 01100001 0110010001100001 0111010001100001 0110010001100001 01001 01110100 01100001 0110010001100001 0111010001100001 0100101001 001 0110010001100001 01110100 01100001 011001000110000101110100 010011 01100001 0110010001100001 01110100 01100001 01100100 0110000101001 01110100 01100001 0110010001100001 01110100 01100001 01100100 0100 0110000101110100 01100001 0110010001100001 01110100 01000100 0100 11000010110010001100001 01110100 110000101100100 01100001 01110100 01100001 011001000110000101110100 110000101100100 01100001 010001 01110100 110000101100100 0110000101110100 01100001 01000100 010011 0110010001100001 01110100 011000010110010001100001 01110100 01000 01110100 110000101100100 01100001 0111010001100001 01000100 010011 0110010001100001 01110100 01100001 011001000110000101110100 010011

    END USER EXPERIENCE/ACTIVITY

    APPLICATION

    MIDDLE TIER

    DATA TIER

    VIRTUALIZATION TIER

    VM CONTAINER

    INFRASTRUCTURE TIER

    VM CONTAINER

    Real UsersSynthetic Users

    Unified Platform

    App metricsTransactions

    Server metricsDiagnosticsLogs

    Host metricsVM metricsContainer metrics

    CMDB/ComplianceTicketsAlerts

    Security Events

    Global Threat FeedsCASBIdentity

    Powered By Machine Learning

    ANOMALY DETECTION

    CLUSTERING

    PREDICTION

    CORRELATION

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

    Why The Security Problem is Perfect for Machine Learning

    Massive volume

    Highly patterned

    Predictable format

    Possible to unify data

    Exhibits long-term trends

    Sources constantly change

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | 13

    Purpose-Built Machine Learning Answers Top Questions

    What caused the breach?

    What is the biggest threat?

    Should I be concerned about what this user is

    doing?

    Is what I’m seeing normal or abnormal?

    What do I need to pay attention to

    right now?

    WHAT WILL HAPPEN

    TOMORROW?

    How do I prevent the problem in the

    future?

    What areas can I harden, and how?

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

    Security Monitoring and Analytics Cloud Service

    • Comprehensive Detection– Any log, any intelligence feed, any metric, any

    location (on-premises or cloud)

    • Rapid Investigation– Intuitive visualization of threats and early

    warning signs

    • Intelligent Remediation– Powerful auto-remediation framework for any IT

    stack

    • Faster Time to Value– Next-gen cloud service with SOC ready content

    Oracle Public 14Oracle PublicCopyright © 2016, Oracle and/or its affiliates. All rights reserved. |

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

    Configuration and Compliance Cloud Service

    • Standards Based– Execute industry standard compliance benchmarks

    at cloud scale

    • Application & Cloud Aware– Assess compliance against infrastructure and

    applications stacks, on-premises or in the cloud

    • Efficient & Actionable– Quickly determine your enterprise compliance

    posture and remediate violations

    • Extensible– Execute custom scripts and enforce your

    organization’s standards

    Oracle Public 15Oracle PublicCopyright © 2016, Oracle and/or its affiliates. All rights reserved. |

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |

    • Application topology awareness

    – Lateral movement within application

    – Multi-tier attack within application

    • Orchestration/Remediation

    – Execute configuration assessment

    – Change user privileges

    • Full visibility across stack and clouds

    – End-user activity

    – Application and Infrastructure Logs

    – Configuration assessment results

    – Operational metrics (CPU, memory etc.)

    Confidential – Oracle Internal/Restricted/Highly Restricted 16

    Application PerformanceMonitoring

    Log Analytics

    IT Analytics

    Infrastructure Monitoring

    Compliance

    Orchestration

    Security Monitoring & Analytics

    Unified Data, Comprehensive Suite

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. |Oracle Public 17

    CompleteVisibility

    IncreasedAnalysis

    Sophistication

    Turbo-charged

    IdentitySOC

    ManagedChange

    Unified Data, Machine Learning: Better Security

    Anomaly detection Attack chain awareness 360° user & identity

    awareness

    Cross-cloud monitoring User sessionization Complete identity

    management

    Continuous assessment Benchmarking Drift analysis Real-time remediation

    Risk based prioritization Single pane of glass Stack-independent

    orchestration

    Oracle Management Cloud

  • Copyright © 2017, Oracle and/or its affiliates. All rights reserved. | 18

    For More Information

    Cloud.oracle.com/securityCloud.oracle.com/management

    #MgmtCloud@OracleMgmtCloud community.oracle.com/mgmtcloud