Riding Shotgun with Your Data

Historically money and valuables have been locked away in safes to keep them secure and prevent theft. When the valuables are out of the safe, such as being used or transferred, risk of loss goes up. In the 1800’s when stagecoaches were used in the United States to transport gold, silver and cash, they had a person “riding shotgun” to help protect the valuables outside of the safe.

Encryption in today’s world is a well-established way to help keep data secure, especially when “at rest” or stored. However, to unlock the real value of data, businesses need to use it and “interact” with it in some way. This is where the operational risk can arise such as someone leaving the door open, abusing data access privileges, or not knowing where and what kind of data is being accessed. To help customers protect data and reduce this operational risk, Oracle recently introduced Oracle Data Safe,which you might say allows them to “ride shotgun” on their cloud databases.

I spoke recently with Vipin Samar who is in charge of database security for Oracle. He’s an expert on database security and has been working to protect some of the world’s most sensitive information. He recently launched Oracle Data Safe, a new cloud security service that helps customers automate security for their cloud databases.

Fred: What are some of the challenges that companies face considering that they have valuable and sensitive data that must be used in their business yet face potential liability and financial loss if any of this data is breached?

Vipin: Data is now recognized as one of the most valuable assets businesses have. But when its security is compromised, it can become a great liability, as we’ve seen in some of the recent and very public data breaches. Organizations are in a catch-22 situation as they have to use their sensitive data to operate their business, but they must reduce the risk of that data being breached or misused.

Fred: When it comes to understanding threats and risks with cloud databases, what are customers most concerned about? Is it with the cloud infrastructure, the cloud provider, the database, or something else?

Vipin: When I talk with customers about moving their databases to the cloud, I hear several concerns. First, they express concern about the underlying infrastructure with network, virtual images, operating systems, and databases. Oracle addresses these concerns with next generation cloud infrastructure along with automated security patching, and always on data encryption. The next concern is protection from the cloud provider — obviously that’s us. We address this with strong separation of duties for our cloud administrators and activity monitoring. Their last big area of concern is about how they can secure their own data, users, and configurations, something that only they can do. They are worried about privileged users with broad access to all data, not knowing where their sensitive data is, lack of clarity regarding security policies for their data, and maintaining secure configuration.

Fred: People working on cloud security are becoming familiar with the shared responsibility model which distinguishes who is responsible for what in the context of cloud security yet there remains confusion. What can a cloud provider do to help customers in those areas of security where the customer has responsibility?

Vipin: At some level, we can all empathize with what is happening. It is difficult for cloud customers to detect all security gaps and understand how to turn all the security knobs and levers with their own data and users. Note that they often turned to the cloud because they didn’t have time or expertise in the first place. The motivation for Data Safe was to provide automated and integrated security capabilities so that the customers can more easily meet their share of the security responsibilities.

Vipin talks much more about Data Safe and its capabilities in a recent blog post and you can view a demo here.

Related:

Oracle Autonomous Data Warehouse: The world’s first and only self-securing database cloud service

Part 3 of 3-Post Series: The world’s first and only self-securing database cloud service

Just thinking about a data breach will make any IT or security professional sweat. And, for good reason. We know that the cost of a data breach goes far beyond a dollar figure. The loss of data impacts brand, customers, partnerships, and more. And, when you throw in managing data in the cloud, working with security can become even more complicated.

A recent security report from Oracle found that confusion about cloud and tenant ‘shared responsibility security models’ (SRSM) has come at a serious cost. Over a third of organizations participating in this year’s research shared that such confusion has led to the introduction of malware (34%) and a similar number of respondents (32%) noted it has exposed them to increased audit risk.

This lack of a clear understanding of the shared responsibility security model has also put data at risk, with 30% of organizations reporting that, as a result, unauthorized individuals accessed data. Additionally, 29% of respondents reported an unpatched or misconfigured system was compromised as a result of confusion, highlighting the fact that public-facing cloud infrastructure is constantly subject to botnet attacks exploiting improperly configured public services.

Remember, your cloud environment is only as secure as you design it. For example, according to recent statistics, as many as 7% of all S3 servers are completely publicly accessible without any authentication and 35% are unencrypted. And if the incidents of the past six months or so are any indication, (according to recent Risk Based Security research, in the first half of 2019 alone, 3,813 breaches were reported, exposing more than 4.1 billion records), these aren’t low-value data stores.

Before we go on too much further, it’s important that you take a look at Part 1 and Part 2 of our three-part series about the Oracle Autonomous Data Warehouse. But, if you’re skipping right to security, we don’t blame you — it’s an important and timely topic.

“Data is your most critical asset, but could become your biggest liability if not properly secured,” says Vipin Samar, senior vice president of Oracle Database Security. So, what makes working with the Oracle Autonomous Data Warehouse solution so unique? Based on my observations, it’s the security aspect. The security is built into the DNA of the entire architecture. I’ll explain how.

Oracle Autonomous Data Warehouse stores all data in encrypted format. Only authenticated users and applications can access the data when they connect to the database. From there, all connections to Autonomous Data Warehouse use certificate-based authentication and Secure Sockets Layer (SSL) encryption. This ensures that there is no unauthorized access to Autonomous Data Warehouse and that communications between the client and server are fully encrypted and cannot be intercepted or altered. So, if there is a malicious attack, a man-in-the-middle attack for example, the fully encrypted communications can never be accessed, keeping Autonomous Data Warehouse operating safely.

Here’s the other really cool part: You do not need to do any manual configuration to encrypt your data and the connections to your database. Autonomous Data Warehouse does this for you – autonomously. Why is this important? Because some cloud providers don’t actually encrypt your storage repositories or buckets. As mentioned earlier, statistics by security firm Skyhigh Networks indicate that 35% of all S3 buckets are unencrypted. And that lack of security has already impacted major organizations.

Beyond autonomous encryption, Autonomous Data Warehouse uses strong password complexity rules for all users based on Oracle Cloud security standards. Believe it or not, password policies are still a problem for a lot of organizations! As a result, you see breaches that could have been prevented if users updated their passwords more frequently and created ones that are more complex. Strong password complexity rules ensure that your most critical data points never waiver from a strict security policy.

You can further restrict connections by specifying a network Access Control List (ACL). By specifying a network ACL, only a specific Autonomous Data Warehouse database accepts connections from addresses on the ACL, rejecting all other client connections. This means that malicious access attempts and even spoofing attacks won’t get through. Network Access Control Lists can granularly lock down which devices have access to the ADW database.

Aside from implementing security best practices around your data, Oracle Autonomous Data Warehouse does something else that’s unique. It self-secures your data warehouse, which if you ask me, is pretty invaluable.

The World’s First and Only Self-Securing Autonomous Warehouse

We discuss this more in Part 1 and Part 2 of our Autonomous Data Warehouse blog series. But it’s important to note that there are a lot of powerful autonomous processes that the service will take care of for you.

  • The Oracle Autonomous Data Warehouse is self-driving means it’s a fully managed data warehouse cloud service that takes care of network configuration, storage, and database patching and upgrades for you. No customer DBA required.
  • The Oracle Autonomous Data Warehouse is also self-repairing, with high availability built into every component, and completely automated backups. This means that this architecture has built-in protection from downtime, purpose-built into the core of the design. You get your nights and weekends back knowing you’ve got a data platform that’s actively working to keep your database operating.

Oracle Autonomous Data Warehouse is Self-Securing.

As the very first self-securing automated warehouse database of its kind, self-securing starts with the security of the Oracle Cloud infrastructure and database service. Within the Autonomous Data Warehouse ecosystem that is built on Oracle Cloud infrastructure, security patches are automatically applied as needed, narrowing the window of vulnerability and mitigating the risk of an unpatched system.

Furthermore, patching includes the full stack: firmware, operating system [OS], clusterware, and database. There are no steps required from the customer side. Gone are the days of needing to manually track patch releases, or tracking down multiple patches across different layers of the stack. It is exactly what the term applies: self securing.

The Oracle Autonomous Data Warehouse self-securing service takes care of the security health of the infrastructure, including the database then automating the entire process, leaving nothing to chance or exposure to human error. From there, the ecosystem encrypts customer data everywhere: in motion, at rest, and in backups. The encryption keys are managed automatically, again without requiring any customer intervention. And, unlike some other data solutions in the market, encryption cannot be turned off and is set by default. In the age of rampant data breaches, your data is simply too important to be left unencrypted.

Finally, administrator activity on Oracle Autonomous Data Warehouse Cloud is logged centrally and monitored for any abnormal activities. Yes, you heard that correctly: the Autonomous Data Warehouse service will scan and evaluate abnormal behavior and anomalous user access. This means that the Autonomous Data Warehouse enables database auditing using predefined policies so that customers can view logs for any abnormal access.

As proactively and intelligently secure as the Autonomous Data Warehouse is, customers should still employ security best practices around the workloads and data they’re deploying. According to Vipin Samar, senior vice president of Oracle Database Security, “Securing databases in the cloud is a shared responsibility, with Oracle securing the infrastructure and network; monitoring the OS and network activity; applying OS and database patches and upgrades; and providing encryption, appropriate separation of duties, and various certifications.”

Samar goes on, adding, “The customer organization still needs to secure its applications, users, and data. It needs to ensure that its applications can thwart attacks targeted at the company, that its users follow security best practices, and that its sensitive data is protected using appropriate controls. In some sense, these requirements are no different from those for an organization’s current on-premises databases, except that Oracle has already handled the security infrastructure part.”

Automatically Secure, Autonomously Intelligent

The scale, speed, and ferocity of the modern threat vector will probably keep business leaders and technologies on edge for the foreseeable future. However, the automated security technologies included as part of the Oracle Autonomous Data Warehouse solution and cloud-based identity management can help organizations manage the risks.

Attacks against your data and infrastructure can come in many forms. Malicious actors like nation states, advanced persistent threats, organized crime, and even accidental (or disgruntled) insider threats can all have major repercussions on your business. They could attack your infrastructure, operating systems, applications, users, and certainly your databases.

As data sets grow and become even more valuable, now is the time to take a step back and really understand your databases and how you leverage data.

Believe it or not, in a data-driven world, many organizations still don’t really know how secure their databases are, where their sensitive data is located, or how much data they actually have. If you’re in that boat, don’t try to navigate the sea of data on your own.

For example, Oracle recently released the Oracle Database Security Assessment Tool feature of Oracle Autonomous Database, which lets organizations answer these questions. The tool looks at various security configuration parameters, identifies gaps, and discovers missing security patches. It checks whether security measures such as encryption, auditing, and access control are deployed, and how those controls compare against best practices.

The Assessment Tool helps organizations discover where their sensitive data is located and how much data they have. Oracle Database Security Assessment Tool searches database metadata for more than 50 types of sensitive data, including personally identifiable information, job data, health data, financial data, and information technology data. This helps businesses to understand the security risks for that data.

Finally, for those global organizations, the assessment tool also highlights findings and provides recommendations to assist with regulatory compliance. The findings and recommendations support both the European Union General Data Protection Regulation (EU GDPR) and the Center for Internet Security (CIS) benchmark.

When it comes to keeping your data (and reputation) secure, a great way to start your data security journey is by asking the right questions, knowing how your data is being used, and leveraging smart, autonomous solutions to revolutionize the way you manage data and approach a digital market. Remember, getting started means having a good awareness of your own data requirements. This means knowing things like:

  • Is my data growing and is it becoming more complex to manage?
  • Have I experienced security ‘scares’ where better policies were required?
  • Is there a general lack of intelligence around the current data systems I’m using?
  • Am I losing competitive advantages because I’m not leveraging my data analytics properly?
  • Do I have a good data visualization solution?
  • Am I looking to grow and distribute where my data lives?

These are just a few of the questions you can ask to help identify the right kind of data-driven architecture. With Oracle Autonomous Data Warehouse, you take a lot of the guesswork out of the equation. The self-driving, self-repairing, and even self-securing features are all designed to help you get the absolute most out of your data warehouse.

As I wrote about in post one, data is the lifeblood of your business. So is security. It’s simply too important to take any shortcuts. Most of all, don’t let a legacy architecture drag you down. When environments become complex and fragmented, they’re not only harder to manage, they pose even greater security risk. In fact, 85% of the time that a breach occurs, there’s a patch available that could have prevented it. Solutions like the Oracle Autonomous Data Warehouse, and the underlying self-securing architecture remove these kinds of threats and allow you to focus on what’s truly valuable – your users, your business, and your data.

Photo by Steven Su on Unsplash

Related:

Oracle Data Safe: Five Ways to Help Protect Your Digital Assets

Data is one of your most valuable assets. If you don’t protect it properly, this same data can become your biggest liability. Just ask any of the companies who have been in the news after they experienced a large breach. They lost not just highly sensitive personal, financial, health and IP data, but it also often impacted their brand and resulted in significant remediation expenses and fines.

With today’s cyber attackers using advanced, automated hacking tools, typical organizations with limited expertise, time, or tools do not stand a chance against this asymmetric warfare. The question for them becomes not if they will be breached, but when.

Without technology and automation, most organizations are sitting ducks. We need to rethink how to defend databases, the repository of most sensitive assets.

As breach awareness has gone up, our customers are increasingly asking about security as they move their databases to the cloud. First and foremost, they are concerned with the security of the underlying OS, VMs, and networking infrastructure. But they are also asking about protection and isolation from the cloud service providers as well.

As customers hear about our cloud security, along with the on-line security patching, strict separation of duties for our administrators, and always-on encryption options for cloud databases, those concerns are alleviated.

As we double-click into their remaining concerns, the following issues bubble up:

  • Are my databases configured securely? Are there any gaps?
  • Where is my sensitive data? Is it properly secured?
  • Who are my risky users? What are they doing? What could they do, given their privileges?
  • Can I meet my compliance requirements?

Customers want to protect their systems 24x7x365 because a single hit could lead to a total loss. But protecting is not straight forward without automation and unification.

In response to customer concerns, we created Oracle Data Safe – a modern, unified, and automated security service – to help defend customers’ databases on Oracle Cloud. Data Safe is designed to detect gaps in their defensive posture, give visibility into security issues with data, users, and applications, and provide recommendations on how to contain security risks.

Five Primary Features of Oracle Data Safe

At a high-level, Data Safe provides:

  • Database Security and Compliance Assessment: Data Safe helps ensure your databases are securely configured. It identifies drifts from best practices, offers recommendations for remediation, and helps you comply with regulations such as EU GDPR, DISA STIGs, and CIS Benchmarks. It categorizes and prioritizes these risks so that you can decide which ones to address first.
  • User Risk Assessment: Data Safe can create reports on your users, roles, and privileges, highlighting critical users you should closely monitor/control. It can further analyze static and dynamic user profiles highlighting last login times and IP addresses. As hackers typically target users, it is critical to understand the gaps they might exploit.
  • User Activity Auditing and Reporting: Data Safe can track database user activity and raise alerts on risky actions, a must-have requirement for many regulations. You can select from default audit policies for regular and privileged users and use one of many out-of-the-box audit reports for various database activities. You can retain the audit data for up to a year for forensics in case something were to go wrong.
  • Sensitive Data Discovery: Today most customers do not know what sensitive data they have and where it is located. Data Safe helps you discover the amount and location of 125+ different types of sensitive data across hundreds of columns spanning multiple databases. Customers can also add support for their own custom sensitive types easily. Once you know how much sensitive data you have and where it resides, it is easier to assess the risk and protect that data.
  • Data Masking: Data Safe can mask data while maintaining complex data relationships. Data Safe minimizes the amount of personal data and allows internal test, development, and analytics teams to operate with reduced risk in an environment where sensitive data has been removed.

Oracle Data Safe can give you full 360-degree insight into the security of all of your databases, including risks with security configuration, data, users, and open alerts. This unification helps simplify understanding the security posture, and the risk profile of the database.

Oracle Data Safe Console

Data Safe helps businesses gain insight into their data by helping them discover where their sensitive data is, what sensitive categories and types they have, and how much they have.

Identify Sensitive Data with Data Safe

We believe that keeping data secure by default is absolutely critical to help protect against the asymmetric cyber warfare. No “ifs, ands, or buts” about it. Organizations should not have to choose between security and performance, or security and complexity, or for that matter, security and expenses.

To this end, we have unified and simplified proven security technologies from our on-premises portfolio, and combined Oracle Data Safe with all Database as a Service offerings in the Oracle Cloud, including the Oracle Autonomous Database.

Data Safe scales from organizations with just one database to enterprises with hundreds. With Data Safe, you neither have to worry about any expensive setup, nor train any specialized resources. It can provide defaults based upon best practices, and allows customization. With Data Safe, there are no compromises!

In today’s world of rapidly evolving threats to the security of your data, Data Safe makes modern, unified, and automated security available to every single database customer on Oracle Cloud.

In the past, you may have been hesitant about moving to the cloud due to security concerns, but security is now the reason to move to the cloud. Learn how Oracle Data Safe can help your organization today. Be sure to tune in next Tuesday for the next blog in our series on Data Safe.

Related:

Moving Disaster Recovery to the Cloud – When Does it Make Sense?

If a business faces a disaster scenario and no longer has access to their data, it is imperative for companies to to be able to recover their data. According to a recent ESG research report, 40% of customers surveyed said they use their cloud infrastructure for disaster recovery.[1] Disaster Recovery (DR) in a traditional data center can be expensive, inefficient, and complex. Dell EMC, working with VMware and Amazon Web Services (AWS), can simplify these complexities through flexibility, scalability, integration, and automation to empower data owners for quick, efficient, and cost effective data recovery. Hans Ammitzbøll, … READ MORE

Related:

Take Control of your Cloud Strategy with a Data First Approach

The cloud can be a powerful tool for optimizing business outcomes, which is why our customers are actively mapping out their cloud strategies. When embarking on the journey to the cloud, you must carefully consider how your data is managed – as data is increasingly becoming the most valuable asset of your business today. A cloud strategy therefore requires a data first approach, where you can ensure your data is: secured, protected, available where and when you need it, delivered at the performance levels required by your applications, and within compliance of your company policies. Dell … READ MORE

Related:

Increasing tech is decreasing entry barrier for cyber criminals

Surendra Singh, Country Director, Forcepoint

Surendra Singh, Country Director, Forcepoint

Over the past few years, cloud technology has established itself as secure and modern alternate of old on-premise digital infrastructure but this has also increased the vector of cyber-attack and its impact. In an interview with Mohd Ujaley, Surendra Singh, Country Director, Forcepoint shares his views on security in the age of cloud and impact of artificial intelligence and cyber warfare on the physical world. He says, “As we move forward, the number of security breaches in the cloud will vastly increase than what they are today, so cloud providers and enterprises need to be careful about their asset security.”

There is growing adoption of cloud technology, what is your views on security in the cloud?

Technology is reducing the entry barrier for cyber-criminals. The reason why we say it because every organisation is talking about the cloud and most of the CIOs and CISOs feel that once things are in the cloud then their responsibility for security will reduce as the cloud service providers will be using specialist team to secure their assets. But in reality there is flip side to it, if all organisations go to one security provider for their cloud security, though there is a team of specialist to secure the cloud data but security breach can lead to a vast amount of data being stolen in one go. That is why, the cloud providers have to be careful about this.

As we move forward, the number of security breaches in the cloud will vastly increase than what they are today. So the cloud providers should be careful and also the organisations who are depending on the cloud should know this. There are a lot of automation happening with the help of Artificial Intelligence, this will enable organisations in finding out potential breaches quickly. Therefore, it is advisable to firms, if they are creating a new business, they should make security an integral part of their core business architecture.

In recent past, we saw nation states involved in cyber warfare. What impact do you see cybersecurity having on physical security?

You are right, the convergence of cyber and physical are impacting the foreign policies these days. We have seen small intercity cyber warfare happening especially between Russia and US or between US & China. This has a risk of nations getting into full fledge warfare because off late there are attempts to attack on the internal infrastructure of the country. Recent example is Russia that tried to completely crippled power system of Ukraine. Fortunately, Ukraine was able to avert it but any attack on national infrastructure could have a catastrophic impact.

In the cyber world it is very difficult to find the source of attack because attacker can manipulate. For example, ISIS can create a war between two countries just by creating cyberattacks. By creating such attacks the countries will be under the impression that the other country has done it. We have to be careful as these things can be easily manipulated.

And, you know this challenge is compounded by the fact that majority of personal details of the individual are available online with social media sites. Attacker can use combination of demographic details and Artificial Intelligence technology to impersonate.

There are more than 500 active cybersecurity solutions provider in the world, about 42 of them are aggressively working in India, still we see cyberattack, data breach happening regularly, why?

I agree with you, the buck must stop at industry and enterprises. They should take the responsibility. As a security firm our job is to make the life of our customer simple and easier. Today, most of the enterprise are dealing with multiple security vendors but unfortunately, security solutions of all the vendors does not integrate with each other – they do integrate but not fully. The result is customer and their security tool remain unmatched leading to loopholes.

We all have to work to integrate our own products rather than creating plans to secure different organs of the enterprises. Whole idea is more and more companies should merge and integrate their products and therefore give a unified solution to the customer. Companies should merger and integrate their products. Also at the company level, not only the CSO but other key heads should come together and use their mind to ensure robust security of their business, like most of them do for sales and taxation etc.

What kind of impact AI platform will have on cybersecurity?

With AI, more and more information is given in a digital form. And as it gets digitized it is vulnerable to external attack. What we will see is as artificial intelligence becomes mainstream, the security challenges will grow multi-fold and right in the beginning we have to track it and mitigate the issue. What is more important is that we should make security an easy thing to implement, so that customer and security team have more time to understanding the future threats that are coming. They will rather spend more time on analyzing the threats that is coming rather than resolving the one that has already happened.

Related:

Threat Hunting and the Cloud – A Dynamic Tension

EMC logo


In the 1920s, fitness innovator Charles Atlas developed and introduced the Dynamic Tension exercise method. The essence of Dynamic Tension is that it pits muscle against muscle, with a workout intensifying proportionally for both muscles as force increases. As generations of comic book fans have learned since, nobody kicked sand in Charles Atlas’s face after that!

The dynamic between cloud and IT security displays similar characteristics. The more cloud-focused an organization’s IT strategy is, the more stress is placed on its IT security posture. The reasons are pretty simple: the cloud creates a larger attack surface, with new and different data sources to monitor for threats. But it’s not just more data; in the current cloud environment, core security capabilities and APIs are typically less mature than on-premises counterparts, which have had much more time to evolve and harden.

That tension is not going to change the trajectory of cloud adoption – a disruption that’s underway and accelerating. Benefits of the Cloud are now apparent to all: less capital expense, greater business agility, more flexible computing capacity, fewer operational issues, and ease of innovation. Perhaps your organization is among those with an explicit “cloud first” IT strategy, requiring all new or expanding workloads to be evaluated first on the Cloud, rather than a traditional data center deployment mode.

While cloud computing makes security more difficult in many different ways, there are specific challenges for the threat detection and response function. Visibility is the key to full and effective threat detection, and accessing cloud data takes extra steps compared to on-premises data. In a cloud-centric world, for a threat detection solution to see everything, it must be able to run anywhere.

Without specific tools and approaches, the Cloud can create a substantial blind spot in an organization’s IT infrastructure. Indicators of compromise go unseen; ones that would be picked up easily if the same application were deployed on-premises. For alerts generated on-premises, critical correlation data can be missed, leaving an incomplete view of the full scope of an attack.

Integrating cloud data can be done, but remains a fairly complex process. Most cloud environments offer hypervisor-level system logs, which can be analyzed in the Cloud or sent to an on-premises solution. Security and application logs work much the same way, although with increasing data volumes the architectural considerations become more complex: performance and cost need to be balanced when considering which data to analyze, and where and how to process it.

Packets are trickier, as most cloud services have not yet exposed full packet capture capabilities. Independent services have cropped up to expose packets in ways that make analysis possible. Going forward we can expect packet access to become easier, with some level of capability exposed by the cloud vendors. Endpoint coverage in the Cloud is limited as well, at least without deploying specialized agent software to provide OS-level visibility and protect proprietary or personal information.

Additional complexity is introduced because organizations seldom have a single-cloud strategy. Therefore, threat detection solutions must “talk” to multiple clouds. The ability to capture, normalize, and enrich data across environments is a core requirement of an effective threat detection platform.

And then there’s the rapid pace of innovation on the Cloud itself. Containerization (e.g., Docker) is a good example. As more and more applications are containerized, you need a way to see and connect to these instances as they are continuously spun up and torn down.

All of these considerations inform the strategy behind our newest version of the RSA NetWitness® Suite, RSA’s market-leading threat detection and response platform. We’ve worked hand-in-hand with customers and industry analysts to design the most cloud-friendly solution on the market.

To start with, the modular structure of RSA NetWitness Suite conforms easily to any cloud deployment requirement. It’s the “run anywhere, see anything” principle, and enables the type of performance and cost optimizations discussed earlier. The solution can run on the Cloud, or data can be collected and enriched in the Cloud before transmitting it to an on-premises instance for analytics. RSA makes it easy with pre-built images available for customers in cloud marketplaces.

The radical visibility and scalability of RSA NetWitness Suite is also well-suited to the Cloud. Integration with hundreds of security and application solutions supports the most diverse IT infrastructures, wherever they’re deployed. And its distributed architecture can keep up with the largest cloud deployments, removing an important inhibitor presented by competitive offerings.

How are you handing the dynamic tension between cloud and security? As Charles Atlas taught us nearly a century ago, finding the balance is key. Find out more about how RSA NetWitness Suite can help your cloud strategy by visiting us at www.rsa.com/DoMore.

The post Threat Hunting and the Cloud – A Dynamic Tension appeared first on Speaking of Security – The RSA Blog.


Update your feed preferences


   

   


   


   

submit to reddit
   

Related:

WEBINAR: The Inside Scoop on Cloud Security Gateways Featuring Andras Cser, Independent Research Firm Analyst

Webinar: February 7, 2017

WEBINAR: The Inside Scoop on Cloud Security Gateways Featuring Andras Cser, Independent Research Firm Analyst

DATE: February 7, 2017

TIME: 1:00 PM (PST) / 4:00 PM (EST)

Get advice on evaluating cloud security products from our guest speaker, Andras Cser, primary author of Forrester’s first Wave Report on Cloud Security. He will discuss the risks associated with adopting cloud applications and services and how cloud security gateways (CSG), also known as CASBs, can help protect your organization with integrated data protection and activity monitoring. 

This webcast will include insights from the recently released report, The Forrester Wave™: Cloud Security Gateways Q4 2016, which evaluated 8 of the most significant CSG vendors against 23 different criteria.

You’ll hear from guest Andras Cser of Forrester and Deena Thomchick of Symantec on:

  • The state of the enterprise in today’s cyber threat world
  • Why organizations must take security precautions
  • The requirements for a Cloud Security Gateway
  • How Cloud Security Gateways operate
  • How to evalulate Cloud Security Gateways
  • The top ten aspects of cloud application security​  

Register Here

Related: