Beruflich Dokumente
Kultur Dokumente
KEY FEATURES Oracle Audit Vault and Database Firewall can also consolidate audit data
from Microsoft Active Directory, Microsoft Windows, Oracle Solaris, Oracle
• Performs activity monitoring and
blocking on the network and Linux, Oracle ASM Cluster File System, and IBM AIX. A plug-in
consolidates audit data from architecture enables deployment of custom agents to consolidate audit
Oracle, MySQL, Microsoft SQL data from application tables and other sources.
Server, SAP Sybase, and IBM
DB2 databases Database Firewall for Activity Monitoring and Blocking
• White list, black list, and Oracle Database Firewall incorporates a sophisticated next-generation
exception list based enforcement
SQL grammar analysis engine that inspects SQL statements going to the
on the network
database and determines with high accuracy whether to allow, log, alert,
• Collects audit data from systems substitute, or block the SQL. Oracle Database Firewall supports white list,
deployed on-premise and in the
black list, and exception list-based polices. A white list is simply the set of
cloud
approved SQL statements that the database firewall expects to see. These
• Built with an extensible audit can be learned over time or developed in a test environment. A black list
collection framework with
includes SQL statements from specific users, IP addresses, or specific
templates for XML and table-
based audit data types of statements that are not permitted for the database. Exception list-
based policies provide additional deployment flexibility by overriding white
• Includes dozens of built-in
list or black list policies. Policies can be enforced based on a number of
customizable compliance reports
and delivers proactive alerting query attributes, including SQL category, program name, user, and IP
and notification address. This flexibility, combined with highly accurate SQL grammar
analysis, enables organizations to minimize false alerts and collect only
• Supports interactive, PDF, and
Excel reports important data. Database Firewall events are logged to the Audit Vault
Server, enabling reports to span information observed on the network in
• Incorporates a fine grained audit
combination with audit data.
data access authorization model
• Highly scalable architecture
supports large number of
Enterprise Audit Data Consolidation and Lifecycle
databases with high traffic Management
volumes By collecting and managing native audit data, Oracle Audit Vault provides
• Delivered as a secure, pre- a complete view of database activity along with full execution context
configured software appliance irrespective of whether statements were executed directly, through
for convenience and reliability dynamic SQL, or through stored procedures. In addition to consolidating
• Supports high availability audit data from databases, operating systems, and directories, the Audit
deployment options Collection Plug-in can be used to collect audit data from application tables
or XML files and securely transfer them to the Audit Vault Server. Audit
data from databases is automatically purged after it has been moved to the
RELATED PRODUCTS Audit Vault Server freeing up space on the system. Audit Vault Server’s
repository is encrypted and protected by Oracle Database Vault, ensuring
Oracle Database 12c Defense-in-
Depth Security Solutions: security and integrity of the audit data while enforcing separation of duties
for Audit Vault administration. Audit Vault supports data retention policies
• Oracle Advanced Security spanning months, or years, on a per source basis, making it possible to
• Oracle Data Masking and meet internal or external compliance requirements.
Subsetting
• Oracle Database Vault Fine Grained, Customizable Reporting and Alerting
• Oracle Key Vault Dozens of out-of-the-box reports provide easy, customized reporting for
• Oracle Label Security regulations such as SOX, PCI DSS, and HIPAA. The reports aggregate
both network events and audit data from the monitored systems. For
detailed analysis of trends, specific systems, or events consolidated data
can be combined, filtered and presented interactively or in PDF and Excel
formats. Security Managers can define threshold based alert conditions on
CONTACT US
For more information about Oracle Audit Vault and Database Firewall, visit oracle.com or call
+1.800.ORACLE1 to speak to an Oracle representative.
CONNECT W ITH US
blogs.oracle.com/oracle Copyright © 2018, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only, and the
contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other
warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or
facebook.com/oracle fitness for a particular purpose. We specifically disclaim any liability with respect to this document, and no contractual obligations are
formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any
twitter.com/oracle means, electronic or mechanical, for any purpose, without our prior written permission.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
oracle.com
Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and
are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are
trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. 0318