database protector for oracle exadata - amazon s3 *protegrity database protector for oracle exadata

Download Database Protector for Oracle Exadata - Amazon S3 *Protegrity Database Protector for Oracle Exadata

Post on 12-Mar-2020

0 views

Category:

Documents

0 download

Embed Size (px)

TRANSCRIPT

  • DATA SHEET

    Database Protector for Oracle Exadata

    Organizations face an extraordinary challenge protecting sensitive data

    according to compliance mandates while also retaining accessibility and

    high performance. Protegrity, the leading innovator of advanced data

    security solutions, offers the most secure, comprehensive, and transparent

    data security available in an Oracle-certified solution.

    Discover Oracle-certified data security for Oracle Exadata with unparalleled performance

    The Protegrity Database Protector for Oracle Exadata seamlessly enhances the security of any Oracle data warehouse with industry leading high performance encryption and tokenization combined with centralized policy-based protection, auditing, and reporting.

    Key Benefits 

    Proven Security

    Organizations of all sizes rely on the Protegrity Database Protector for

    Oracle Exadata to protect their sensitive data, leveraging centrally controlled data security policy, keys, and auditing. Protegrity’s state-of-

    the-art security simplifies compliance with ever-changing regulatory

    requirements while maintaining critical accessibility and transparency for

    infrastructure management and business insight.

    Flexible Deployment

    Designed for large and small deployments, the Protegrity Database

    Protector for Oracle Exadata applies the data security policy consistently across all clusters. Audit and security event log collection is

    optimized and can be reviewed in real-time via the Protegrity Enterprise

    Security Administrator (ESA) central auditing, alerting, and reporting

    interface.

    Data Security Policy

    Access Control

    Hackers

    Privileged Users (DBA, SA, Admins)

    Authorized Users

    Oracle Exadata with Protegrity Database Protector

    Da bas

    ta is

    Data e Acc

    ac UNREADA

    ess H

    BL ked E

    !*@#&*#)!U@*#(!##@#!ffa2as

    D ata

    ba se

    By pa

    Ac ces

    s

    is UN

    *#( !##

    @# !!ffRE

    AD AB

    sse d

    Da ta

    !*@ #&

    a2 as

    LE

    Database Access Permitted Data is READABLE Jane Doe, 123-45-6789

  • Scalable Performance

    Enterprise-Wide Security

    As part of the Protegrity Data Security platform, the Protegrity Database

    Protector for Oracle Exadata works in concert with Protegrity’s other Data Protectors (e.g. File Protector, Application Protector, Big Data Protector) to

    provide comprehensive data security that easily integrates with all enterprise

    systems. The Protegrity Database Protector for Oracle Exadata is also certified to run on cloud and virtual environments including VMware, Xen,

    and Hyper-V.

    Separation of Duties (SoD)

    The Protegrity Database Protector for Oracle Exadata fully supports separation of duties (SoD), enabling organizations to prevent unauthorized

    technologists, such as DBAs, programmers, or system engineers from

    accessing sensitive data in the clear. Security administrators can also be

    prevented from viewing sensitive data as part of SoD objectives.

    Protegrity provides the only unified data security platform that protects diverse sensitive data across the enterprise - in applications, data warehouses, mainframes, big data and cloud environments. We help organizations manage risk, achieve compliance, and safeguard data using encryption and tokenization technologies that integrate seamlessly into the business.

    USA (HQ) 333 Ludlow St South Tower, 8th Floor Stamford, CT 06902 USA Tel + 1 203 326 7200

    UK Suite 2 First Floor Braywick House West Windsor Road Maidenhead, Berkshire SL6 1DN Tel + 44 1494 857762

    www.protegrity.com

    The Protegrity Database Protector for Oracle Exadata leverages Oracle Exadata’s parallel processing and massive scalability, scaling up along

    with Oracle Exadata and providing strong, flexible security with optimal performance and availability. Protegrity Vaultless Tokenization servers

    deployed directly on the node allow for high performance in-process

    data tokenization without bottlenecks in performance or scalability.

    DATA SHEET

    Methods of Protection

    Protegrity provides a variety of data security methods for protecting data in

    Oracle environments, including patented Protegrity Vaultless Tokenization

    (PVT), masking, strong encryption, data-type preserving encryption, and

    monitoring.

    De-identified masked data or tokens embedded with business intelligence

    allow for secure storage and seamless analysis without the need to re-

    identify the data. Native Oracle access controls are combined with

    Protegrity’s centrally managed, fine-grained data security to provide

    multiple layers of protection.

    “Protegrity has demonstrated its Protegrity Database Protector is

    tested and tuned to work with

    Oracle Exadata Database Machine,

    Oracle SuperCluster, Oracle

    Exalogic Elastic Cloud, Oracle

    Exalytics In-Memory Machine,

    Oracle Database Appliance and

    Oracle Big Data Appliance to

    help deliver optimum performance,

    scalability, and reliability to their

    customers.

    — David Hicks, VP, Oracle Corporation

    *

    *Protegrity Database Protector for Oracle Exadata was tested on Exadata machine with half rack, 4 db servers, 8 CPU, Core 12, 2.7 GHz, each having 256GB of RAM with 7 storage servers vs AIX 6.1 Dual Processors, 1.5 GHz with 4GB of RAM and also Sun Solaris 11, Dual

    Processors with 4GB of RAM.

    During Oracle lab testing, the Protegrity Database Protector for Oracle Exadata achieved 7x performance gain during heavy workloads, 15x faster on data warehouse queries and 15x increase in concurrent user connections over single high-end Linux servers and baseline

    Unix servers running AIX or Solaris, all while securing data using encryption and tokenization.

Recommended

View more >