WatchGuard’s New Tabletop UTM Appliances Deliver Speed and Security for Small and Distributed Offices

WatchGuard® Technologies, a leader in advanced network security solutions, today announced hardware upgrades for the Firebox T Series of unified threat management (UTM) appliances. The throughput improvements and added features in WatchGuard’s new T15, T35 and T55 tabletop appliances allow users at small offices, home offices and distributed enterprises to experience blazing-fast internet speeds, and the most advanced enterprise-grade security protections and controls.

“Hackers no longer discriminate based on location or the size of a business,” said Brendan Patterson, Director of Product Management at WatchGuard Technologies. “Small offices and home offices are just as likely to be targeted as enterprise locations, which is why they need access to the same enterprise-grade protection, including services like APT Blocker and Threat Detection and Response (TDR). As internet speeds continue to increase, we continue to improve the performance of our tabletop Fireboxes to ensure that security doesn’t restrict network performance or interfere with business goals.”

WatchGuard’s tabletop appliances offer leading price-to-performance while running full UTM features, including: APT Blocker, TDR, IPS, Anti-Virus, and Application Control. In addition to offering a broad range of security services to keep smaller sites safe, the Firebox T Series appliances are easy to configure and deploy in small offices, branch offices, and distributed enterprise locations.


  • Significantly Improved Performance: Faster throughput across the board gives the new T Series models the highest-performing security inspection in its class. Administrators can confidently enable protections against a wide variety of advanced malware without slowing network speeds.
  • Integrated 802.11ac Wireless: Wi-Fi-enabled T35 and T55 Series appliances feature integrated 802.11ac wireless adapters, allowing users to inspect and secure wireless traffic using the latest standards
  • Power Over Ethernet: The T35 and T55 include a Power over Ethernet plus port, which eliminates the need to run AC power to peripheral devices like security cameras or wireless access points.

Replacing WatchGuard’s T10, T30 and T50 products, respectively, the T15, T35 and T55 models are available now.


XL Catlin Offers Cyber and Technology Insurance Clients Free 90-day Third-Party Security Through Clarium Managed Services

To help thwart cyber security breaches, XL Catlin is offering its primary cyber & technology insurance clients in the US a 90-day free trial of Security as a Service (SECS) from Clarium Managed Services.

Clarium, a Palo Alto Networks NextWave partner with a Traps™ specialization, will provide the services through a simple download process to XL Catlin clients who choose to participate. The services can include a host of risk management benefits and next-generation security capabilities, including Palo Alto Traps™ advanced endpoint protection and Palo Alto Networks WildFire™ cloud-based threat analysis, the industry’s most advanced analysis and prevention engine for highly evasive zero-day exploits and malware.

According to John Coletti, chief underwriting officer, Cyber & Technology, “Nearly 90% of breaches today occur at the endpoint. Studies have shown that organizations that prepare for a cyber event suffer less financial and reputational loss than organizations with no preparation.  It’s an opportune time to announce this new benefit for our clients, as we mark National Cyber Security Awareness Month and look to raise awareness of cyber threats and solutions.”

“Clarium offers the full spectrum of breach prevention down to where it counts, the endpoints, with prevention delivered to your company via the cloud.   Traps replaces legacy antivirus and secures endpoints with a multi-method prevention approach that blocks malware and exploits, both known and unknown, before they have a chance to compromise those endpoints” said Bill Kelly, Director of Clarium.

In a recent test by AV-TEST, a third-party testing organization, Palo Alto Networks Traps™

advanced endpoint protection version 4.0 achieved maximum protection and performance scores using its standard methodology. Traps achieved 100 percent detection of real-world attacks and a maximum performance score.

At the end of the 90-day trial period, Clarium is offering their services to XL Catlin cyber insurance clients for a promotional discount for two years. The service fee includes enterprise level endpoint protection through Traps™ and WildFire™, 24/7 monitoring, customized compliance reporting, and threat hunting with industry leading behavioral analysis programs. Subscribers also receive free quarterly Security Reviews showing regulatory compliance as well as a snapshot of their cybersecurity program.

XL Catlin’s cyber insurance policy — CyberRiskConnect — provides broad coverage for data protection and privacy risks, both for third-party claims and first-party mitigation costs following a technology or cyber event. Coverage is tailored for businesses across various industries. Several breach preparedness tools are available via our online resource- — as well as through XL Catlin’s preferred vendor network

Barracuda Study Reveals Office 365 Active Usage Surging, Ransomware Remains Top of Mind for Customers

Barracuda Networks, Inc. (NYSE: CUDA), a leading provider of cloud-enabled security and data protection solutions, today released findings from a recent global study, “Office 365 Adoption Survey: Drivers, Risks, and Opportunities.” Over 1,100 organizations ranging from single-person businesses to companies with more than 10,000 employees participated in the survey from various regions around the globe including North AmericaEurope, the Middle East, and Africa. The survey aimed to measure trends around the adoption and use of Microsoft Office 365, including contributing factors for decisions about migration versus remaining with an existing platform. Additional information was gathered about customer use of third-party security and data protection solutions with Office 365, and their engagement with VARs and MSPs.


Adoption rates have increased significantly in one year
63 percent of respondents are currently using Office 365, while 49 percent of the remaining respondents are planning to move as well. In a similar Barracuda study from 2016, only 42 percent of respondents were using Office 365, equaling over a 20 percent increase in adoption in just over a year.

Concerns over advanced email threats cited for not migrating to Office 365
Of those respondents who haven’t migrated, nearly 44 percent cited security concerns when deciding against migrating to Office 365. Nearly 70 percent of active users reported significant concerns about advanced threats, and of those planning to migrate, 76 percent expressed the same concerns.

Fear about phishing, spear phishing, or social engineering, but little prevention
Despite an overwhelming 89 percent of respondents expressing concerns over phishing, spear phishing, and social engineering, less than 36 percent of respondents said that they use a third-party solution to help mitigate these threats. 46 percent of respondents reported that they have already been targeted by such attacks.

Ransomware is a top concern
More than 92 percent of respondents are worried about ransomware, and more than 47 percent reported that they have been a victim of a ransomware attack. Of those victimized, 76 percent identified email as the affected threat vector.

Layered security is the chosen implementation path for the majority of customers
57 percent of respondents stated that they were augmenting Office 365 deployments with a layered-security approach, as well as additional archiving, or backup solutions. Of those intending to migrate, 72 percent said that they plan to take the layered approach as well.

“These findings indicate the growing security awareness we’re seeing from customers, and the necessity to take a layered approach moving forward,” said Sanjay Ramnath, vice president of security products and business strategy, Barracuda. “Barracuda customers and channel partners deploying Barracuda Sentinel and Barracuda Essentials for Office 365 are able to move core business processes to the cloud, and at the same time feel confident that they’re protected against ransomware, spear phishing, and other advanced threats.”

Barracuda Essentials for Office 365 is a multi-layer, cloud-based email security, backup, and archiving solution that helps to protect organizations against advanced email-based attacks and data loss, while minimizing business disruptions.

Barracuda Sentinel combines three powerful layers including artificial intelligence technology, domain fraud visibility using DMARC authentication, and anti-fraud training, into a solution that guards against today’s personalized attacks. The solution integrates directly with the Office 365 API for easier deployment without hardware or software to maintain.

For access to the full study please follow the blog link below.


Barracuda Blog – Office 365 Active Usage Soars — Some Still Unclear On Security:
Barracuda Essentials for Office 365 –
Barracuda Sentinel –

INsecurity Announces Robust Keynote Lineup featuring Former US Government CISO and Representatives from Sallie Mae, PSCU and More

INsecurity, a conference produced by Dark Reading, announces its Keynote lineup for its inaugural event taking place November 29-30. Three top cybersecurity executives – including Greg Touhillthe United States’ first Federal Chief Information Security Officer and now president of Cyxtera Federal Group; Jerry Archer, CISO of financial leader Sallie Mae; and Gene Fredriksen, CISO of PSCU and author of the new book, “The CISO Journey” – will headline a lineup of speakers and session leaders that features 10 current CISOs of large enterprises and 10 others who have headed IT security organizations at large enterprises.

INsecurity will take place November 29-30, 2017 at the Gaylord National Resort in National Harbor, MD. For more information, please visit:

“INsecurity is a conference that focuses on the practice of enterprise cybersecurity, so we wanted our keynoters and speakers to be managers and thought leaders of the security practices in their own organizations,” said Tim Wilson, co-founder and editor-in-chief of Dark Reading, who is driving the content for the conference. “We think INsecurity will be a conference unlike any other, in that it will be led by speakers who’ve been in the trenches and know what it’s like to fight the enterprise’s battle against online attackers every day.”

At INsecurity, attendees will have a unique opportunity to not only listen to presentations by top cybersecurity executives and topical experts, but to interact with them and discuss practical solutions to today’s pressing industry issues. All three keynoters will be available to answer questions and interact with audience members. Half of the sessions at INsecurity will be Chatham House Rules discussions that allow security professionals to talk about key issues in a safe environment. There will also be opportunities for attendees to join (or form their own) small-group roundtables to explore important challenges with experts and colleagues.

Day 1: Wednesday, November 29, 9 – 10 AM

Greg Touhill – President, Cyxtera Federal Group and Former CISO for the US Federal Government: one of the nation’s premier cybersecurity and information technology senior executives. Prior to Cyxtera, Touhill was selected by President Obama as the US government’s first Chief Information Security Officer (CISO). His other civilian government service includes duties as the Deputy Assistant Secretary for Cybersecurity and Communications in the US Department of Homeland Security and as Director of the National Cybersecurity and Communications Integration Center, where he led national programs to protect the United States and its critical infrastructure.

Day 2: Thursday, November 30, 9 – 9:30 AM & 4:15 – 5 PM

Jerry Archer – CISO, Sallie Mae: responsible for securing and protecting all of Sallie Mae’s systems and offerings, and for security initiatives across the company. Prior to Sallie Mae, Archer was the Chief Information Security Officer at Intuit and the senior vice president for Global Interoperability at Visa International. For his work in the U.S. Intelligence Community, Archer earned the National Performance Review Hammer Award and a Distinguished Service Award from the Central Intelligence Agency.

Gene Fredriksen – CISO, PSCU: responsible for the development information protection and technology risk programs for PSCU. Fredriksen has more than 25 years of Information Technology experience, with the last twenty focused specifically in the area of Information Security. Gene previously held the position of Global CISO for Tyco International, and served as the Chair of the Security and Risk Assessment Steering Committee for BITS. He recently published “The CISO Journey,” a highly acclaimed book through CRC Press.

To learn more about this year’s Keynotes and view the current 2017 program lineup, visit:

2017 INsecurity Sponsors: Diamond Sponsor: PhishMe; Platinum Sponsor: NTT Security (US) Inc.; Gold Sponsors:CyberVista, Demisto, FunCaptcha, LogRhythm, Skybox Security, ThreatConnect, Vectra Networks; Silver Sponsors: Black Duck Software, Darktrace, DomainTools, Kryptowire, Sepio Systems, Syncurity, Versive.

Cybersecurity Startup Verodin Wins Security Current’s Security Shark Tank® Palo Alto

Security Current, the premier information and collaboration community by CISOs for CISOs, selected Verodin as the winner of its Security Shark Tank Palo Alto competition. The event brought security solution providers face-to-face with potential security buyers.

“The Verodin solution addresses a key industry challenge of identifying the effectiveness of our cybersecurity tools,” said Matt Hollcraft, Maxim Integrated Chief Cyber Risk Officer. “Verodin’s innovative approach stands out for its potential value to the industry. Congratulations on winning three Security Shark Tanks in a row.”

Participating vendors were given 15 minutes each to pitch their solution in a rapid-fire question and answer format to a panel of information security executives interested in innovative technologies. The executives scored each vendor based on innovation and vision, ease of use and implementation, value to the industry, and the presenter’s ability to clearly and effectively articulate their solution’s value.

GoPro CISO Todd Barnum served as the event host and moderator of the panel.

The panel included:
Alameda Alliance for Health CISO Scott J. Wright
CalPERS Privacy Officer Tom McCreary
Contra Costa County Health Services CISO Patrick Wilson
DocuSign Senior Director of Security Engineering John Heasman
Federal Home Loan Bank AVP of Information Security Van Nguyen
GE Digital Senior Director of Cyber Security Al Ghous
Hitachi Vantara Christophe Jacquet
Maxim Integrated Chief Cyber Risk Officer Matt Hollcraft
Maxim Integrated Chief Information Officer Walter Curd
Ross Stores Chief Security Architect (CSA) BG Badriprasad
Samsung Semiconductor CISO Jay Gonzales
Square Security Engineer Neal Harris
Visa CSA Bill Yue Chen
Whisker Labs CISO Anshu Gupta

“It was my pleasure to host the Security Shark Tank Palo Alto event,” said Todd Barnum, GoPro, Inc. CISO. “The fast-paced interaction between the CISOs and the security solution vendors created a great platform to learn new ways to protect the enterprise.  Security Current, the event sponsor, has a winning format making the event educational and enjoyable for everyone in attendance.”

“Security Current has really listened to what we need with the Security Shark Tank,” said GE Digital Senior Director of Cyber Security, Al Ghous. “Security is evolving so quickly, and we security executives are constantly striving to bolster our arsenal to stay ahead of the threats. Security Shark Tank is a great and unique way to be able to evaluate the caliber of potential technology partners while at the same time providing them candid feedback. I am looking forward to future events.”

Verodin is a leading business platform purpose-built to measure, manage and improve cybersecurity effectiveness. By demonstrating the impact of modern threats and malicious activities within the context of an enterprise’s production environment, the Verodin Security Instrumentation Platform (SIP) proves the effectiveness of an enterprise’s investments, proactively identifies configuration issues in the defensive stack and exposes true gaps across a company’s people, process and technology. Verodin has scored the highest in three consecutive Security Shark Tank competitions — NYCChicago and now, Palo Alto. It’s clear that the value of Security Instrumentation is resonating with CISOs across every major vertical.

Alameda Alliance for Health CISO Scott Wright added, “Security Shark Tank is a great event for CISOs as it provides exposure to innovative vendors in a rapid-fire format. Having so many seasoned security executives participate allowed for insightful question and answer sessions. The diversity of thought leadership in the room brought by executives from so many industry sectors is invaluable.”

BG Badriprasad, Ross Stores CSA agreed, adding: “The Security Shark Tank event is a valuable gathering of security minds that provides an opportunity for startups to get a collective perspective of needs and challenges that the security leaders are looking to solve.”

New England Regional Cyber Range Opens At Devens

New England Regional Cyber Range, announced the opening of the new facility at the Devens Innovation Center. This new facility was created to support the training and education of cyber security professionals. The range will include cyber warfare training, incident response simulations and reverse engineering classes.

Joe Provost, managing partner and owner of Syncstate stated, “This state-of-the-art training and development facility is comprised of Live, Virtual, and Simulated (LVS) technologies. It is being used to address the critical skills gap and need for highly specialized cyber security individuals within the New England region with a specific focus on Massachusetts.”

The range provides a realistic copy of the Internet, several corporate networks, hacker sites, nation state actors, simulated users, and other tools and technologies designed for training and exercises, product testing, threat modeling, and software testing and development.

The training scenarios and exercises combine both commercial and open source technologies. Syncstate and its partners make use of this platform to model threat events pulled directly from the headlines. The combined effects immerse individuals into complicated cyber warfare activities to train how to properly detect, respond, and mitigate a variety of threats. “We use the same hacking tools and tactics as the adversary. You will be required to protect the business processes and systems while working in a contested environment,” said Provost.

The range can be specifically tailored to represent a Security Operations Center (SOC) to support complex cyber security exercises to a Business Intelligence (BI) Center for senior leaders to exercise crisis communications (media, interviews).

The new Remote Connection Pod means that facilities that are geographically separate can actively participate in large scale exercises and testing scenarios. Universities who participate can provide hands-on experience for the student body that would not otherwise be available.

The range makes it possible to create a custom cyber exercise and operating environment. This type of exercise demands careful and thoughtful planning, preparation, and targeted evaluation. This is critical to creating the custom environment.

Requests for this level of granularity are reviewed on a case-by-case basis. The range can be tailored to represent specific networks, systems, and services to conduct live cyber warfare exercises.

Encryption Software Market Worth 12.96 Billion USD by 2022

ccording to a new market research report “Encryption Software Market by Component (Solution and Services), Application (Disk Encryption, File/Folder Encryption, Communication Encryption, and Cloud Encryption), Deployment Type, Organization Size, Vertical, and Region – Global Forecast to 2022”, published by MarketsandMarkets™, the market size is expected to grow from USD 3.87 Billion in 2017 to USD 12.96 Billion by 2022, at a Compound Annual Growth Rate (CAGR) of 27.4%.

Browse 69 Market Data Tables and 34 Figures spread through 151 Pages and in-depth TOC on Encryption Software Market

Early buyers will receive 10% customization on this report

The demand for encryption software is majorly driven by stringent government regulations and the need to protect critical organizational. With the increasing demand for cloud and virtualization across different verticals, the adoption rate of encryption software among enterprises is expected to gain a major traction during the forecast period.

Ask for PDF Brochure @

The disk encryption application is expected to hold the largest market share during the forecast period

Disk encryption, also known as hard drive encryption, full disk encryption, and whole disk encryption, refers to the encryption of the entire disk. The importance of encrypting a disk is that, if the encrypted disk is lost or stolen, the encrypted state of the drive remains unchanged, and only an authorized user will be able to access its contents. With the increase in the Bring Your Own Device (BYOD) trend, employees have the freedom to carry their own devices, and the exchange of critical data is made possible on their devices. Therefore, the adoption of strong encryption can protect the confidential data, even if the device is lost or stolen.

The telecom and IT vertical is expected to grow at the fastest rate during the forecast period

The telecom and IT vertical is a key target for hackers, due to the vast and increasing amount of personal data being managed on cell phones, satellites, and the internet. Companies in this vertical are adopting encryption software, so as to provide risk-free services to their customers. The usage of encryption software has allowed users to save the important information on their mobile devices and use that information on the cloud without any risk. Therefore, encryption software is helping the telecom and IT companies in enhancing their services and providing secure information to customers, while also complying with regulations.

North America is expected to hold the largest market share, whereas Asia Pacific (APAC) is expected to grow at the fastest rate during the forecast period

North America is believed to be the foremost potential market, due to the presence of a large number of players offering encryption software in this region. This region is expected to hold the largest market size during the forecast period, as organizations in this region are more focused on securing the data at rest, data in transit, as well as data in use. Furthermore, the organizations have made huge investments in advanced technologies to gain a competitive advantage and improve the business operations. The APAC region is in its initial growth phase; however, it is believed to be the fastest growing region in the global Encryption Software Market. The increasing adoption of encryption software in this region is due to the wide-spread presence of Small and Medium-sized Enterprises (SMEs) that are implementing enhanced encryption solutions to prevent the unauthorized access to critical business data residing on the enterprise networks and databases, and the unethical use of such information.

The major vendors providing encryption software solution and services are Thales e-Security (La Defense, France), Gemalto (Amsterdam, Netherlands), Symantec (California, US), Dell (Texas, US), Sophos (Abingdon, UK), McAfee (California, US), Trend Micro (Tokyo, Japan), IBM (New York, US), Microsoft (Washington, US), PKWARE (Wisconsin, US), CipherCloud (California, US), ESET (Bratislava, Slovakia).

Enquiry before Buying @

Browse Related Reports

Cybersecurity Market by Solution (IAM, Encryption, DLP, UTM, Antivirus/Anti-Malware, Firewall, IDS/IPS, Disaster Recovery, DDOS Mitigation, SIEM), Service, Security Type, Deployment Mode, Organization Size, Vertical, and Region – Global Forecast to 2022

Cloud Encryption Market by Component (Solution and Service), Service Model (Infrastructure-as-a-Service, Software-as-a-Service, and Platform-as-a-Service), Organization Size, Vertical, and Region – Global Forecast to 2022

Know More About our Knowledge Store @

Tevora Releases Free, Open-Source Penetration Testing Tool, SecSmash

Tevora, a leading provider of security, governance and compliance solutions, announced the launch of a free, open-source penetration testing tool, SecSmash. The tool, first teased at information security conference BSIDES in July, was designed for security teams, namely, penetration testers and is intended to support existing security systems.

About SecSmash

Organizations face many cybersecurity challenges today, one being how can they prevent attackers from using their own security products against them? Many times, the poor deployment of a product can leave critical pieces of infrastructure unprotected. Weak passwords or failing to use two-factor authentication can leave security products intended to protect an organization exposed. The SecSmash framework helps penetration testers identify any such weaknesses and correct them before an attacker poses a threat by turning centralized management, monitoring and security tools into command and control, aka C2, infrastructure. Attackers frequently use the C2 approach to commandeer security systems.

“SecSmash enables penetration testers to use this same C2 approach to better assess the risk of an organizations security system,” said Lead Penetration Tester and SecSmash designer, Kevin Dick. “This tool is the result of the shared knowledge of the penetration testing community, and we wanted to give back.”

Availability and Supporting Technology

SecSmash is available free of charge on GitHub. Its modular framework allows for integration with any available technology solutions. Additional details about the tool can be found on the Tevora Threat Blog.

About Tevora

Tevora is an enterprise consulting firm specializing in information assurance, governance and compliance services and solutions. We work with some of the world’s leading companies, institutions and governments to ensure the safety of their information and their compliance with applicable regulations. With a distinctive combination of proven products and services, Tevora aids enterprises in protecting their most important assets from external and internal threats.

Granite AppGuard Announces the Launch of Its Patented, Proven and Award Winning Anti-Malware Solution

Granite AppGuard, in partnership with AppGuard LLC, a Blue Planet-works company, today announced the launch of Granite AppGuard, a personal and small business version of Blue Planet-work’s patented, proven, award-winning anti-malware solution, for an annual subscription price of $29.95 per year. Granite AppGuard is a patented, proven anti-malware solution that Government Security News has awarded the Homeland Security Award for the Best Anti-Malware Platform for three consecutive years — 2014, 2015 and 2016.  In addition, the anti-malware solution has been recognized by American Security Today and the US Army has granted it a Certificated of Net Worthiness for 2017.

Mark Stachiw, Granite AppGuard’s CEO and a successful serial entrepreneur, said, “The growing menace of cyber-attacks and ransomware is not limited to large corporations. Small business and individuals need to protect their sensitive information as well and many of the solutions in the market today fall woefully short.  With Granite AppGuard, we are launching the most comprehensive, user-friendly anti-malware protection solution in the market today in conjunction with National Cybersecurity Awareness Month.”

Stachiw added “I have been looking for a solution for some time that stops today’s malware and ransomware attacks and we partnered with Blue Plant-works to introduce Granite AppGuard, a cost-effective consumer and small business version of this patented, proven and award-winning anti-malware solution that protects users against the threats of today.”

Mike Fumai, President and Chief Operating Officer for AppGuard LLC said, “We have looked for partners to launch our patented, proven, award-winning anti-malware software solution to consumers and small businesses.  We have chosen Granite AppGuard as a partner because of the extensive background of its founder with consumer products and growing businesses.  We are excited about the launch of this unique, patented, proven, and award-winning anti-malware software solution through Granite AppGuard.”

What separates Granite AppGuard’ s awarding patented, proven, and winning technology is that it stops known and unknown threats before they can corrupt your system. Using its patented process protection application, Granite AppGuard does not try to identify malware; it recognizes when your computer or system is trying to do something that is not consistent with the application you are using and immediately stops the threat without shutting down your computer or system.

This software has been utilized for the past several years on over a hundred thousand high-risk computers and has stopped millions of threats including the notorious WannaCry ransomware virus that infected hundreds of thousands of systems and cost business an estimated $5 billion dollars.

We are now offering Granite AppGuard for consumers and small business for an annual subscription of only $29.95 per year per computer. To learn more about the Granite AppGuard and to subscribe and download our award-winning software, please visit our website at

Oracle Transforms IT Security and Management with New Machine Learning Capabilities

Oracle Executive Chairman and CTO Larry Ellisontoday demonstrated new cyber security machine learning capabilities that transform IT security and management. The new machine learning powered security capabilities form an integral part of enhancements to Oracle Management Cloud, a complete and integrated solution for IT security and management that enables organizations to monitor and analyze their operational and security data in a single solution.

“Existing approaches to security and management are no longer sufficient, which is why the headlines are now full of security breaches and performance outages,” said Ellison. “Our vision for security and management is very simple. We need all of the data in one place. We need purpose-built machine learning that can be used by security and operations professionals, not data scientists. We need automated remediation that does not require human effort. And that’s what we’ve built with Oracle Management Cloud.”

Ellison contrasted Oracle Management Cloud with the security and management capabilities delivered by Splunk. The analysis highlighted that Splunk lacks the key data needed for operations and optimal security.

  • Oracle Management Cloud delivers a complete data architecture through a unified entity model that spans topology, associations, telemetry and threats. In contrast, Splunk has no real entity model and leaves data in many disparate vendor silos.
  • Oracle Management Cloud provides real-time insight through out-of-the-box applied machine learning that is easy to operate and use. In contrast, Splunk provides a machine learning toolkit that requires data scientists.
  • Oracle Management Cloud delivers integrated and automated remediation that helps eliminate human error. In contrast, Splunk has no remediation capability.

Quotes from Larry Ellison’s keynote presentation:

  • “Companies are losing the cyber war. And it gets worse every year. Companies have to defend themselves against nation-states who are stealing their data, and very sophisticated cyber criminals who are stealing their data.”
  • “We have to reprioritize and re-think about how we defend our information. We need new systems. It can’t be our people versus their computers. We’re going to lose that war. It’s got to be our computers versus their computers. And make no mistake: it’s a war.”
  • “The way to secure our data, the way to prevent data theft is more automation. And we need a cyber defense system that automatically detects vulnerabilities and attacks.”
  • “And these two systems, the Oracle Autonomous Database and our highly, highly automated cyber defense systems are designed to stop data theft.”
  • “The Autonomous Database and our automated security system, is based on a new technology called machine learning. Machine learning is the most important new technology to show up for a long time. It looks at all of these logons with all the IP addresses and URLs, distinguishes normal behavior from abnormal, risky behavior.”
  • “The database automatically provisions itself, upgrades itself, patches itself, backs itself up, and tunes itself while running. And because there is no human intervention, there is no human error.”
  • “The Oracle Management Cloud has a unified data architecture. Manage anyone’s technology — on-premise, other clouds, our cloud, no integration required. We engineered all of these pieces to fit together. We unify the data, we analyze the data, we detect the anomalies and we automatically remediate it. It’s one system. And it’s relatively easy to use, much easier to use than the other systems.”
  • “It is not simply an analytical system, like Splunk. It is a security monitoring and management system designed to detect and remediate the problem.”

About Oracle
The Oracle Cloud offers complete SaaS application suites for ERP, HCM and CX, plus best-in-class database Platform as a Service (PaaS) and Infrastructure as a Service (IaaS) from data centers throughout the Americas, Europe and Asia. For more information about Oracle (NYSE: ORCL), please visit us at