Professional Documents
Culture Documents
Chetan Vithlani
Product Manager
Oracle Management Cloud
eBay MySpace
Yahoo
427M passwords
148M
customer
360M emails ALL 3 Billion+
111M usernames user accounts
records
Prioritize deals that are or can be driven by external threats, specifically data breaches
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Confidential – Oracle Internal/Restricted/Highly Restricted 7
Modern Security Challenges
• BYOD reduces perimeter • Zero day attacks require • More assets, security
security efficacy anomaly detection tools, & alerts to manage
• Cloud assets uncovered • Low & slow, multi-stage • High false positives or
by legacy security threats require sequence noise to signal ratio
monitoring tools awareness • Manual remediation
• DevOps multiplies • Targeted, credentialed spread across point tools
change rates and risk of attacks require identity erodes time to resolution
vulnerable configurations awareness
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Confidential – Oracle Internal/Restricted/Highly Restricted 8
Current Approach: Fragmented, Integration Intensive
UEBA
(User and Entity Behavior Analytics)
User context, Anomaly detection
SIEM
(Security Information and Event Management) X Multiple UIs, data models for same data
Security context, Rules based detection X Separation of rules & ML based threats
X Configuration management per stack
X Silo’d and manual remediation
Log Management X Scale and delivery model differences
Raw logs, Forensic search, IT ops analytics
Configuration Management
Secure state, configuration auditing
Copyright © 2016, Oracle and/or its affiliates. All rights reserved. | Confidential – Oracle Internal/Restricted/Highly Restricted 9
Oracle Management Cloud for SIEM/UEBA
APPLICATION
Real users
Synthetic users
POWERED BY
MACHINE
App metrics
MIDDLE TIER Transactions LEARNING
Server metrics
DATA TIER Diagnostics logs INFORMED BY
A COMPLETE
Host metrics DATA SET
VIRTUALIZATION VM metrics
TIER Container metrics
Configuration HETEROGENEOUS
Compliance Unified Platform AND OPEN
INFRASTRUCTURE Tickets & Alerts
TIER
Security & Network
events
Copyright © 2017, Oracle and/or its affiliates. All rights reserved. 11
OMC Key Capabilities
Unified Log
Analytics Remediation Security
Monitoring Management
Log Analyze business and IT data using Manage configuration and change
Analytics pre-built apps and explorers against industry and own standards
Aggregate, index, and explore the
entire enterprise log estate
Systems Management Services (for “the NOC”) Security Services (for “the SOC”)
ADAPTIVE INTELLIGENCE
Unified Data Platform (includes OMC APM CS & Infrastructure Monitoring CS) and Purpose-Built Machine Learning
• Enforce company-specific
compliance across hybrid clouds
https://www.forbes.com/sites/oracle/2017/04/25/is-your-systems-management-software-smart-enough/
https://developer.oracle.com/code
https://www.darkreading.com/vulnerabilities---threats/the-soc-is-deadlong-live-the-soc/a/d-id/1329284? https://www.forbes.com/sites/oracle/2017/07/10/cant-stop-cyberattacks-teach-your-computer-to-do-it/
Cloud.oracle.com/management
Cloud.oracle.com/security
#MgmtCloud community.oracle.com/mgmtcloud
@OracleMgmtCloud