Transcript
Page 1: Database Protector for Oracle Exadata - Amazon S3 · *Protegrity Database Protector for Oracle Exadata was tested on Exadata machine with half rack, 4 db servers, 8 CPU, Core 12,

DATA SHEET

Database Protector for Oracle Exadata

Organizations face an extraordinary challenge protecting sensitive data

according to compliance mandates while also retaining accessibility and

high performance. Protegrity, the leading innovator of advanced data

security solutions, offers the most secure, comprehensive, and transparent

data security available in an Oracle-certified solution.

Discover Oracle-certified data security for Oracle Exadata with unparalleled performance

The Protegrity Database Protector for Oracle Exadata seamlessly enhances the security of any Oracle data warehouse with industry leading high performance encryption and tokenization combined with centralized policy-based protection, auditing, and reporting.

Key Benefits

Proven Security

Organizations of all sizes rely on the Protegrity Database Protector for

Oracle Exadata to protect their sensitive data, leveraging centrally

controlled data security policy, keys, and auditing. Protegrity’s state-of-

the-art security simplifies compliance with ever-changing regulatory

requirements while maintaining critical accessibility and transparency for

infrastructure management and business insight.

Flexible Deployment

Designed for large and small deployments, the Protegrity Database

Protector for Oracle Exadata applies the data security policy

consistently across all clusters. Audit and security event log collection is

optimized and can be reviewed in real-time via the Protegrity Enterprise

Security Administrator (ESA) central auditing, alerting, and reporting

interface.

Data Security Policy

Access Control

Hackers

PrivilegedUsers(DBA, SA, Admins)

AuthorizedUsers

Oracle Exadatawith Protegrity Database Protector

Dabas

ta is

Datae Acc

acUNREADA

ess H

BLkedE

!*@#&*#)!U@*#(!##@#!ffa2as

Database

Bypa

Access

is UN*#(

!##@#

!!ffREADABssed

Data!*@

#&

a2as

LE

Database Access PermittedData is READABLEJane Doe, 123-45-6789

Page 2: Database Protector for Oracle Exadata - Amazon S3 · *Protegrity Database Protector for Oracle Exadata was tested on Exadata machine with half rack, 4 db servers, 8 CPU, Core 12,

Scalable Performance

Enterprise-Wide Security

As part of the Protegrity Data Security platform, the Protegrity Database

Protector for Oracle Exadata works in concert with Protegrity’s other Data

Protectors (e.g. File Protector, Application Protector, Big Data Protector) to

provide comprehensive data security that easily integrates with all enterprise

systems. The Protegrity Database Protector for Oracle Exadata is also

certified to run on cloud and virtual environments including VMware, Xen,

and Hyper-V.

Separation of Duties (SoD)

The Protegrity Database Protector for Oracle Exadata fully supports

separation of duties (SoD), enabling organizations to prevent unauthorized

technologists, such as DBAs, programmers, or system engineers from

accessing sensitive data in the clear. Security administrators can also be

prevented from viewing sensitive data as part of SoD objectives.

Protegrity provides the only unified data security platform that protects diverse sensitive data across the enterprise - in applications, data warehouses, mainframes, big data and cloud environments. We help organizations manage risk, achieve compliance, and safeguard data using encryption and tokenization technologies that integrate seamlessly into the business.

USA (HQ) 333 Ludlow StSouth Tower, 8th FloorStamford, CT 06902 USA Tel + 1 203 326 7200

UK Suite 2First FloorBraywick House WestWindsor RoadMaidenhead, Berkshire SL6 1DNTel + 44 1494 857762

www.protegrity.com

The Protegrity Database Protector for Oracle Exadata leverages Oracle Exadata’s parallel processing and massive scalability, scaling up along

with Oracle Exadata and providing strong, flexible security with optimal

performance and availability. Protegrity Vaultless Tokenization servers

deployed directly on the node allow for high performance in-process

data tokenization without bottlenecks in performance or scalability.

DATA SHEET

Methods of Protection

Protegrity provides a variety of data security methods for protecting data in

Oracle environments, including patented Protegrity Vaultless Tokenization

(PVT), masking, strong encryption, data-type preserving encryption, and

monitoring.

De-identified masked data or tokens embedded with business intelligence

allow for secure storage and seamless analysis without the need to re-

identify the data. Native Oracle access controls are combined with

Protegrity’s centrally managed, fine-grained data security to provide

multiple layers of protection.

“Protegrity has demonstrated its

Protegrity Database Protector is

tested and tuned to work with

Oracle Exadata Database Machine,

Oracle SuperCluster, Oracle

Exalogic Elastic Cloud, Oracle

Exalytics In-Memory Machine,

Oracle Database Appliance and

Oracle Big Data Appliance to

help deliver optimum performance,

scalability, and reliability to their

customers.

— David Hicks, VP, Oracle Corporation

*

*Protegrity Database Protector for Oracle Exadata was tested on Exadata machine with half rack, 4 db servers, 8 CPU, Core 12, 2.7 GHz,

each having 256GB of RAM with 7 storage servers vs AIX 6.1 Dual Processors, 1.5 GHz with 4GB of RAM and also Sun Solaris 11, Dual

Processors with 4GB of RAM.

During Oracle lab testing, the Protegrity Database Protector for Oracle Exadata achieved 7x performance gain during heavy workloads,

15x faster on data warehouse queries and 15x increase in concurrent user connections over single high-end Linux servers and baseline

Unix servers running AIX or Solaris, all while securing data using encryption and tokenization.


Top Related