Prevent attacks on customer tenancies with isolated network virtualization. A foundational element of Oracle Cloud infrastructure’s security-first architecture, Isolated network virtualization stops malware in its tracks with a custom-designed SmartNIC to isolate and virtualize the network.
See how security is fundamental to the architecture of Oracle Cloud Infrastructure with tiered defenses and highly secure operations.
Reduce the risk of attacks with isolated network virtualization, a key design of Oracle Cloud Infrastructure’s security architecture.
In first-generation cloud offerings, if a successful attack compromises a virtual machine instance and subsequently a hypervisor, there are no barriers to prevent an attacker’s attempts to modify the network. The networking function is managed by the same hypervisor that has been compromised: a virtual machine escape that gains access to the hypervisor also has access to the network. This can lead to several threats to hosts on the network and could expose private tenant data.
Amanda OCallaghan, Oracle Content Strategist
As companies transition to the cloud for greater speed and agility, they’re also starting to see security as a cloud benefit rather than a risk. But with today’s larger and more diversified threat landscape, businesses need to be absolutely sure of the depth of their security before they trust the cloud with such important workloads. At Oracle, we anticipated this need and built our cloud from the ground up to address it.
Read the complete postBuild, test, and deploy applications on Oracle Cloud for free. Sign up once, get access to two free offers.
Read the architecture technical brief paper.
Read our isolated network virtualization expert’s blog.
Take advantage of Oracle Cloud Free Tier.
Learn more about Oracle Cloud Infrastructure security differentiators.