Attacks on businesses in the digital environment have increased. The threat is spreading to a scale never seen and putting pressure on the ability of organizations to identify and prevent the use of identity theft-based techniques. For this reason, the detection of anomalies in the digital environment is the only way to detect the needle in the haystack. The ability to correlate an abnormal network,application, and user behaviors events is key to early detection and containment of potential threats.
To address security in the digital environment, Oracle has developed a technology framework called Oracle Identity SOC (Security Operations Center), which enables enterprises to develop a security operations system based on identity management, combining data analytics, machine learning, learning and artificial intelligence to anticipate and prevent attacks. This solution is presented at the Oracle Cloud Security Summit held on April 19 in Madrid.
This event discusses how to deal with the management and monitoring of the IT assets of all types of organizations in the digital age. The event is involved by Mauricio Gumiel, Security Sales Director at Oracle, together with mountaineer Araceli Segarra – who sets out her vision on how to manage security in risky environments –, and Silvia Barrera, former Inspector of the Police, CIA writer and lecturer. Representatives of Santander Consumer Finance, SERMAS, and Telefónica also participate to showcase their experiences in the field of security.
To address security in the digital environment, Oracle has developed or a technology framework called Oracle Identity SOC.
“The traditional model of a network-centric security system and perimeter protection is no longer enough,” explains Mauricio Gumiel, Director of Oracle Ibérica’s Security Solutions area. “In the age of cloud solutions, identity is the bridge between user worlds, applications, and network controls. It is therefore imperative that organizations incorporate the most advanced technologies to make sure that it is the one who accesses a system is the one who has access.”