Welcome!

Machine Learning Authors: Yeshim Deniz, Zakia Bouachraoui, Elizabeth White, Pat Romanski, Liz McMillan

Related Topics: Java IoT, Linux Containers, Machine Learning , Recurring Revenue

Java IoT: Article

Oracle Customers Secure Critical Encryption Keys with Oracle Key Vault

New solution enables centralized management of Oracle Database Encryption Master Keys, Java KeyStores, and more

Encryption is widely recognized as the gold standard for protecting data privacy, but encryption is only as strong as its key management. Critical credential files such as Oracle wallet files, Java KeyStores, Secure Shell (SSH) key files, and Secure Sockets Layer (SSL) certificate files are often widely distributed across servers and server clusters that use error-prone synchronization and backup mechanisms. As organizations increasingly encrypt data at rest and on the network, securely managing all the encryption keys and credential files in the data center has become a major challenge.

At the same time, organizations also need to comply with stringent regulatory requirements for managing keys and certificates. Many global regulations and industry standards call for audits demonstrating that keys are routinely rotated, properly destroyed, and accessed solely by authorized entities.

To address the need for robust key management, Oracle today introduced Oracle Key Vault, a software appliance designed to securely manage encryption keys and credential files in the enterprise data center.

News Facts

  • Oracle Key Vault, the latest addition to the Oracle Database security portfolio, provides secure, centralized management of encryption keys and credential files in the data center, including Oracle wallet files, Java KeyStores, Kerberos keytab files, SSH key files, and SSL certificate files.
  • Optimized for the Oracle technology stack, including Oracle Database and Oracle Fusion Middleware, Oracle Key Vault can be deployed seamlessly in existing environments.
  • Built for x86-64 hardware, the fully integrated software appliance uses Oracle Linux and Oracle Database technology for security, availability, and scalability.
  • Oracle Key Vault is the industry's most modern solution for managing keys and metadata. Features include the following:
    • Easy archival and recovery. The new solution archives Oracle wallet files, Java KeyStores, and other credential files in a master repository, supporting fast, easy file sharing and recovery.
    • Centralized management. Oracle Key Vault's browser-based management console offers point-and-click administration, simplified server enrollment, and audit reports.
    • Streamlined sharing. Organizations can securely share Oracle wallet files -- standards-based encrypted files that securely store keys and related metadata used by components of the Oracle stack -- across database clusters or disaster recovery environments. The product works seamlessly with Oracle Real Application Clusters, Oracle Active Data Guard, and Oracle GoldenGate.
    • Flexibility. In Oracle Database environments using Oracle Advanced Security with Transparent Data Encryption (TDE), Oracle Key Vault manages TDE keys over a direct network connection as an alternative to a local Oracle wallet.
    • Standards Compliance. Based on the OASIS Key Management Interoperability Protocol (KMIP), Oracle Key Vault can manage keys from KMIP-compliant clients.

More Stories By Liz McMillan

News Desk compiles and publishes breaking news stories, press releases and latest news articles as they happen.

CloudEXPO Stories
​Blockchain, also known as Distributed Ledger Technology (DLT), can be used for more than just crypto currencies. This presentation discusses how blockchain and the Internet of Things (IOT) can be used for several supply chain management and logistics use cases. Real world examples that utilize the open source project Hyperledger will be discussed.
This session describes how Professional Services organisations can deliver within Technology-as-a-Service (IaaS) constructs, in private and public enterprise cloud scenarios. See how professional services can be packaged and funded by IaaS cash flows, based upon consumption of technology services. Learn how significant, IT infrastructure transformations can be funded through OPEX spending models with multi-year As-a-Services based contracts. Understand how the automation of repeatable services can positively impact the commercial viability of Professional Services within As-a-Service constructs. Hear how innovative IT infrastructure service offerings can elevate the impact of professional services engagements, and accelerate positive business outcomes.
Gym Solutions is a software as a service (SaaS) solution purpose-built to service the fitness industry, with over 1000 clients servicing over 2 million gym members across 40 countries making Perfect Gym Solutions one of the largest and fastest growing SaaS applications in the fitness industry. Their platform is a comprehensive package of modern modular products for the management of fitness clubs, sports facilities and gyms an end- to end solution, revolutionising the way that gyms are managed.
There's no doubt that blockchain technology is a powerful tool for the enterprise, but bringing it mainstream has not been without challenges. As VP of Technology at 8base, Andrei is working to make developing a blockchain application accessible to anyone. With better tools, entrepreneurs and developers can work together to quickly and effectively launch applications that integrate smart contracts and blockchain technology. This will ultimately accelerate blockchain adoption on a global scale.
As the fourth industrial revolution continues to march forward, key questions remain related to the protection of software, cloud, AI, and automation intellectual property. Recent developments in Supreme Court and lower court case law will be reviewed to explain the intricacies of what inventions are eligible for patent protection, how copyright law may be used to protect application programming interfaces (APIs), and the extent to which trademark and trade secret law may have expanded relevance to the cloud. Best practices for intellectual property protection, licensing, and other topics will be presented, including checklists for engineers, product managers, sales/marketing, and other constituencies. Drawing upon his pre-lawyer life as a product manager for cloud based products, the presenter will emphasize those topics believed to be most practically relevant.