SlideShare a Scribd company logo
F5 Adds Solutions for Oracle Database
Announcement Highlights, February 14F5 adds to its portfolio of solutions for Oracle DatabaseNew solution combines F5 BIG-IP Application Security Manager with Oracle Database FirewallSolution provides:Strong protection against SQL injection attacks around the web application and databaseAudit data to correlate security events reported by the web application firewall and database firewallLogs user information for attacks and out-of-policy behavior
Application Trends and Drivers “Webification” of applicationsIntelligent browsers and applicationsIncreasing regulatory requirements (PCI)Untargeted attacks – BOTsTargeted attacks – (D)DoSPublic awareness of breach attempts and data securityTough economy = constrained resources and budgets cuts increased security risks; reduced compliance
Web applications are at risk SANS reportFocused on patching Operating Systems80% of vulnerabilities are in web apps60% of the attack vectors are web basedReports from 7Safe and Web Hacking Incidents Database stat that 60% of all breach incidents examined involved SQL injection
F5 and Oracle Solutionsare Engineered to WorkTogether
F5 and Oracle Solutions areEngineered to Work Together
F5 BIG-IP Application Security ManagerProvides comprehensive protection of all web application vulnerabilitiesLogs and reports all application traffic and attacksEnables Layer 2 through Layer 7 protectionLearning and Blocking ModesWeb attack typesSQL Injection
Oracle Database FirewallReal-time database activity monitoring and blockingResponds to each type of threat via either logging, monitoring, alerting, blocking, or substitutingDeployed out-of-band or in-band with heterogeneous database environmentsAvailable as a virtual appliance
F5 and Oracle Integrated SolutionMonitor and block traffic at the web and database layersApplication sessions tracked from client, to web, to database, and backWhen anomalies are detected by ASM, they are logged by both ASM and Oracle DBFWASM provides user and web context of the attack enabling complete visibility of attack from source IP address, through HTTP page and session to SQL transaction.DBFW can analyze the full SQL transaction to see if the query is out of policy, rather than just a fragment.Ensures that administrators are always able to get consistent, correlated application monitoring dataWeb tier attacks are blocked by ASMUndetected attacks that get to the database are blocked by DBFW
www.acme.com?id=%27+OR+1%3D1+-How Does it Work?ASM EventUser IdentityExternal UsersAdministratorsAPPLICATIONSInternalUsersNETWORKDATABASESIntegrated LogDBFW Management Server Correlated Syslog EventSIEMWeb Application traffic is secured with ASM,Database traffic is secured with Database Firewall
Example Report
Case Study: Large Financial in the UK
F5 Networks and OracleDeliver application and database security event correlationUnity security information managementMonitor security more easilyProtect applications and databases from unauthorized accessDriving joint customer engagementsAvailable now
F5 Networks Adds To Oracle Database

More Related Content

PDF
F5 TLS & SSL Practices
PPTX
F5 EMEA Webinar Oct'15: http2 how to ease the transition
PDF
Web Socket ASM support lior rotkovitch
PPTX
F5's IP Intelligence Service
PPTX
F5 - BigIP ASM introduction
PDF
F5 DDoS Protection
PDF
Bezpečnostní architektura F5
PDF
F5 TLS & SSL Practices
F5 EMEA Webinar Oct'15: http2 how to ease the transition
Web Socket ASM support lior rotkovitch
F5's IP Intelligence Service
F5 - BigIP ASM introduction
F5 DDoS Protection
Bezpečnostní architektura F5

What's hot (20)

PDF
F5 Networks: architecture and risk management
PDF
F5 Cloud Story
PDF
Decrypting and Selectively Inspecting Modern Traffic
PPTX
What's New in StealthWatch v6.5
PDF
Taking the Fear out of WAF
PPTX
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
PDF
F5 Web Application Security
PDF
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
PPTX
User Expert forum Wildfire configuration
PDF
Novinky F5 pro rok 2018
PDF
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
PPTX
Cryptzone AppGate Technical Architecture
PDF
Palo Alto Networks CASB
PPTX
Cryptzone: What is a Software-Defined Perimeter?
PPTX
Cisco Network Insider: Three Ways to Secure your Network
PDF
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
PDF
Alternatives and Enhancements to CAs for a Secure Web
PPTX
AppGate: Achieving Compliance in the Cloud
PDF
GDPR v pojetí F5
PPTX
NGINX Plus R18: What's new
F5 Networks: architecture and risk management
F5 Cloud Story
Decrypting and Selectively Inspecting Modern Traffic
What's New in StealthWatch v6.5
Taking the Fear out of WAF
Cisco Wireless LAN Controller Palo Alto Networks Config Guide
F5 Web Application Security
Cisco Connect Toronto 2017 - Cloud and On Premises Collaboration Security Exp...
User Expert forum Wildfire configuration
Novinky F5 pro rok 2018
F5 Scale n and BIG-IP v11 3 for Scalar Partner Event June 4 2013 Toronto
Cryptzone AppGate Technical Architecture
Palo Alto Networks CASB
Cryptzone: What is a Software-Defined Perimeter?
Cisco Network Insider: Three Ways to Secure your Network
Cisco Connect Toronto 2017 - Security Through The Eyes of a Hacker
Alternatives and Enhancements to CAs for a Secure Web
AppGate: Achieving Compliance in the Cloud
GDPR v pojetí F5
NGINX Plus R18: What's new
Ad

Viewers also liked (20)

PPTX
F5 Networks- Why Legacy Security Systems are Failing
PPSX
Virtualization / Cloud / SDN
PDF
20071015 Architecting Enterprise Security
PPTX
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
PDF
Замена Microsoft TMG решением от F5 Networks
PPTX
F5 Networks: миграция c Microsoft TMG
PPTX
VIPRION Solutions - April 2012
PDF
Cisco Trustsec & Security Group Tagging
PDF
HK VForum F5 apps centric security nov 4, 2016 - final
PPTX
F5 Offers Advanced Web Security With BIG-IP v10.1
PDF
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
PPTX
VIPRION 2400 and vCMP
PPTX
CCNA RS_ITN - Chapter 7
PPTX
Best Practice TLS for IBM Domino
PDF
The F5 DDoS Protection Reference Architecture (Technical White Paper)
PPTX
CCNA RS_NB - Chapter 5
PPT
Internetworking Overview
PPTX
Transport layer security (tls)
PDF
Building the Mobile Internet
PDF
F5 study guide
F5 Networks- Why Legacy Security Systems are Failing
Virtualization / Cloud / SDN
20071015 Architecting Enterprise Security
TechEd Africa 2011 - OFC308: SharePoint Security in an Insecure World: Unders...
Замена Microsoft TMG решением от F5 Networks
F5 Networks: миграция c Microsoft TMG
VIPRION Solutions - April 2012
Cisco Trustsec & Security Group Tagging
HK VForum F5 apps centric security nov 4, 2016 - final
F5 Offers Advanced Web Security With BIG-IP v10.1
Multipathed, Multiplexed, Multilateral Transport Protocols - Decoupling trans...
VIPRION 2400 and vCMP
CCNA RS_ITN - Chapter 7
Best Practice TLS for IBM Domino
The F5 DDoS Protection Reference Architecture (Technical White Paper)
CCNA RS_NB - Chapter 5
Internetworking Overview
Transport layer security (tls)
Building the Mobile Internet
F5 study guide
Ad

Similar to F5 Networks Adds To Oracle Database (20)

PPTX
Varhol oracle database_firewall_oct2011
PDF
AV/DF Advanced Security Option
PPTX
Oracle Database Firewall - Pierre Leon
PDF
Presentation database security audit vault & database firewall
PPTX
Security Inside Out: Latest Innovations in Oracle Database 12c
PPTX
Introducing Oracle Audit Vault and Database Firewall
PDF
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
PPTX
F5 Networks Application Ready Solution for Oracle Database Technologies
PDF
2010 report data security survey
PPTX
Oracle 11g security - 2014
PPTX
Data and network security the basic concept of firewall
PPTX
Oracle Database Security
PDF
Best Practices for implementing Database Security Comprehensive Database Secu...
PDF
Data Base
PPTX
Oracle database threats - LAOUC Webinar
PDF
Database Private Security Jurisprudence: A Case Study using Oracle
PPT
Guardium Presentation
PDF
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
PDF
MySQL Security
PPTX
The Spy Who Loathed Me - An Intro to SQL Server Security
Varhol oracle database_firewall_oct2011
AV/DF Advanced Security Option
Oracle Database Firewall - Pierre Leon
Presentation database security audit vault & database firewall
Security Inside Out: Latest Innovations in Oracle Database 12c
Introducing Oracle Audit Vault and Database Firewall
Oracle Database 11g Security and Compliance Solutions - By Tom Kyte
F5 Networks Application Ready Solution for Oracle Database Technologies
2010 report data security survey
Oracle 11g security - 2014
Data and network security the basic concept of firewall
Oracle Database Security
Best Practices for implementing Database Security Comprehensive Database Secu...
Data Base
Oracle database threats - LAOUC Webinar
Database Private Security Jurisprudence: A Case Study using Oracle
Guardium Presentation
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
MySQL Security
The Spy Who Loathed Me - An Intro to SQL Server Security

More from F5 Networks (20)

PDF
Using Docker container technology with F5 Networks products and services
PPTX
F5 Networks Quick Poll Research: HTTP/2 Survey Results
PPTX
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
PPTX
F5 Networks: Introduction to Silverline WAF (web application firewall)
PDF
F5 networks the_expectation_of_ssl_everywhere
PPTX
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
PPTX
Ensure Application Availability Between Hybrid Data Centers
PDF
F5 Networks: The Internet of Things - Ready Infrastructure
PDF
F5 Networks Threat Analysis: Madness
PDF
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
PDF
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
PPTX
F5 Certified! Program Overview and Update
PPTX
Key Findings from the State of Application Delivery 2015
PPTX
F5 Application Services Reference Architecture (Audio)
PPTX
F5 Application Services Reference Architecture
PDF
The F5 Networks Application Services Reference Architecture (White Paper)
PDF
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
PDF
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
PPTX
F5 Networks Intelligent DNS Scale
PDF
DNS: Challenges in a Changing Landscape (Infographic)
Using Docker container technology with F5 Networks products and services
F5 Networks Quick Poll Research: HTTP/2 Survey Results
Integrated SDN/NFV Framework for Transitioning to Application Delivery Model
F5 Networks: Introduction to Silverline WAF (web application firewall)
F5 networks the_expectation_of_ssl_everywhere
Intrinsic Security—The Key to Effective Hybrid DDoS Protection
Ensure Application Availability Between Hybrid Data Centers
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks Threat Analysis: Madness
Company Profile: F5 Networks’ Traffix Signaling Delivery Controller and BIG-I...
Scaling Mobile Network Security for LTE: A Multi-Layer Approach
F5 Certified! Program Overview and Update
Key Findings from the State of Application Delivery 2015
F5 Application Services Reference Architecture (Audio)
F5 Application Services Reference Architecture
The F5 Networks Application Services Reference Architecture (White Paper)
An Evolving Threat Needs an Evolved Defense (F5 Networks Infographic)
F5 Networks: The Right Way to Protect Against DDoS Attacks (Business White Pa...
F5 Networks Intelligent DNS Scale
DNS: Challenges in a Changing Landscape (Infographic)

Recently uploaded (20)

PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Cloud computing and distributed systems.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Approach and Philosophy of On baking technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
KodekX | Application Modernization Development
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
Cloud computing and distributed systems.
“AI and Expert System Decision Support & Business Intelligence Systems”
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Approach and Philosophy of On baking technology
Review of recent advances in non-invasive hemoglobin estimation
Understanding_Digital_Forensics_Presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25 Week I
KodekX | Application Modernization Development
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx

F5 Networks Adds To Oracle Database

  • 1. F5 Adds Solutions for Oracle Database
  • 2. Announcement Highlights, February 14F5 adds to its portfolio of solutions for Oracle DatabaseNew solution combines F5 BIG-IP Application Security Manager with Oracle Database FirewallSolution provides:Strong protection against SQL injection attacks around the web application and databaseAudit data to correlate security events reported by the web application firewall and database firewallLogs user information for attacks and out-of-policy behavior
  • 3. Application Trends and Drivers “Webification” of applicationsIntelligent browsers and applicationsIncreasing regulatory requirements (PCI)Untargeted attacks – BOTsTargeted attacks – (D)DoSPublic awareness of breach attempts and data securityTough economy = constrained resources and budgets cuts increased security risks; reduced compliance
  • 4. Web applications are at risk SANS reportFocused on patching Operating Systems80% of vulnerabilities are in web apps60% of the attack vectors are web basedReports from 7Safe and Web Hacking Incidents Database stat that 60% of all breach incidents examined involved SQL injection
  • 5. F5 and Oracle Solutionsare Engineered to WorkTogether
  • 6. F5 and Oracle Solutions areEngineered to Work Together
  • 7. F5 BIG-IP Application Security ManagerProvides comprehensive protection of all web application vulnerabilitiesLogs and reports all application traffic and attacksEnables Layer 2 through Layer 7 protectionLearning and Blocking ModesWeb attack typesSQL Injection
  • 8. Oracle Database FirewallReal-time database activity monitoring and blockingResponds to each type of threat via either logging, monitoring, alerting, blocking, or substitutingDeployed out-of-band or in-band with heterogeneous database environmentsAvailable as a virtual appliance
  • 9. F5 and Oracle Integrated SolutionMonitor and block traffic at the web and database layersApplication sessions tracked from client, to web, to database, and backWhen anomalies are detected by ASM, they are logged by both ASM and Oracle DBFWASM provides user and web context of the attack enabling complete visibility of attack from source IP address, through HTTP page and session to SQL transaction.DBFW can analyze the full SQL transaction to see if the query is out of policy, rather than just a fragment.Ensures that administrators are always able to get consistent, correlated application monitoring dataWeb tier attacks are blocked by ASMUndetected attacks that get to the database are blocked by DBFW
  • 10. www.acme.com?id=%27+OR+1%3D1+-How Does it Work?ASM EventUser IdentityExternal UsersAdministratorsAPPLICATIONSInternalUsersNETWORKDATABASESIntegrated LogDBFW Management Server Correlated Syslog EventSIEMWeb Application traffic is secured with ASM,Database traffic is secured with Database Firewall
  • 12. Case Study: Large Financial in the UK
  • 13. F5 Networks and OracleDeliver application and database security event correlationUnity security information managementMonitor security more easilyProtect applications and databases from unauthorized accessDriving joint customer engagementsAvailable now

Editor's Notes

  • #11: User logs into a web applicationF5 identifies possible SQL injection eventSecurity event containint use and web app info is sent from ASM to DBFW via an iRuleDBFW correlates the ASM event with the database traffic logDBFW take an appropriate action (block, alert, pass)Correlated even data is sent to SIEM logEnriched data is available for reporting and forensic analysisIntegrated report is available for distributionIntegrated log entry is generated and stored in DBFW