Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/5/2017
04:35 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

Oracle Brings Machine Learning to its CASB Service

Machine learning is a next step for cloud systems, as Oracle integrates new capabilities into its CASB offering to discern and leverage user behavior.

Oracle and other companies are integrating new technologies into their cloud access security broker (CASB) offerings to ratchet up security.

Database giant Oracle today announced that it has integrated machine learning, artificial intelligence, and contextual awareness in its CASB service. The idea is to address the growth of security incidents targeting privileged and end-user credentials.

Cloud vendors are competing to address two important issues, says Andy Smith, senior director of product development for Oracle's security portfolio. They are trying to figure out how to bring their products to the cloud, and how to develop the tech to secure their own clouds.

CASB providers are under pressure to create new technologies for better cloud management. These systems sit between cloud service customers and cloud providers to consolidate the enforcement of security policies.

In the past, mostly large businesses demanded CASB systems. "The larger you are, the more complex you are, you have hundreds of cloud services," says Cloud Security Alliance CEO Jim Reavis.

However, as more information and key data assets are moved off-premise, small- and medium-sized businesses are looking into CASB adoption for greater visibility into their organizations.

Oracle's new approach uses supervised and unsupervised machine learning for advanced threat detection. The system detects and stores user actions and compares them with established patterns to determine abnormal activity on each cloud service.

The user behavior analytics (UBA) engine sets historical baselines for each user and service (Box, Office 365, etc.). When it finds behavior derives from the norm, it launches incident response options such as incident management systems and automated remediation.

Unsupervised machine learning compares users' behavior with their previous actions to determine risk. "It creates its own normal" by using algorithms to verify whether activity is anomalistic, says Smith. This "normal" continuously changes based on data it receives.

Supervised machine learning is more customizable: Administrators can specify personal attributes or CRM activity they want to analyze, and create a correlation to look for actions that are against policy. The system had always integrated unsupervised machine learning, but now users can identify what they want to look for, he says.

Say an employee has been put on notice and the business is worried about data theft, for example, he says. Admins can monitor correlations between when someone is put on notice and whether they attempt to steal data before they leave the company.

"They can use it for any kind of risky behavior and apply it to any types of threats," says Smith. "The main one we always think about is compromised accounts," or those that people are concerned about because of phishing or credential theft."

To better monitor risk, the company is bringing what it calls adaptive access to its Identity-Based Security Operations Center (SOC). This new approach to access control will use machine learning to combat fraud across cloud applications by analyzing each login attempt and data on location, device, and time of day.

"The concept of adaptive access isn't new," says Smith. "Doing it where it's built into the cloud service and integrated into other risk services -- that's what's new."

Oracle's CASB is introducing security monitoring and threat detection for several applications, including its own Oracle Human Capital Management (HCM) Cloud, Oracle Enterprise Resource Planning (ERP) Cloud, and Oracle Customer Experience (CX) Cloud Suite. This is in addition to tools like Slack, Office 365, Box, Google G-Suite, AWS, ServiceNow, GitHub, and Rackspace.

Smith emphasizes the importance of ensuring the CASB integrates with the rest of the security fabric. For him, the key is making sure the system covers SaaS, PaaS, and IaaS so the business isn't using multiple CASB systems to get full security coverage.

Related Content:

Black Hat USA returns to the fabulous Mandalay Bay in Las Vegas, Nevada, July 22-27, 2017. Click for information on the conference schedule and to register.

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Tips for Infosec Pros Considering A Lateral Career Move
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2020
For Mismanaged SOCs, The Price Is Not Right
Kelly Sheridan, Staff Editor, Dark Reading,  1/22/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
IT 2020: A Look Ahead
Are you ready for the critical changes that will occur in 2020? We've compiled editor insights from the best of our network (Dark Reading, Data Center Knowledge, InformationWeek, ITPro Today and Network Computing) to deliver to you a look at the trends, technologies, and threats that are emerging in the coming year. Download it today!
Flash Poll
How Enterprises are Attacking the Cybersecurity Problem
How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-3154
PUBLISHED: 2020-01-27
CRLF injection vulnerability in Zend\Mail (Zend_Mail) in Zend Framework before 1.12.12, 2.x before 2.3.8, and 2.4.x before 2.4.1 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via CRLF sequences in the header of an email.
CVE-2019-17190
PUBLISHED: 2020-01-27
A Local Privilege Escalation issue was discovered in Avast Secure Browser 76.0.1659.101. The vulnerability is due to an insecure ACL set by the AvastBrowserUpdate.exe (which is running as NT AUTHORITY\SYSTEM) when AvastSecureBrowser.exe checks for new updates. When the update check is triggered, the...
CVE-2014-8161
PUBLISHED: 2020-01-27
PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to obtain sensitive column values by triggering constraint violation and then reading the error message.
CVE-2014-9481
PUBLISHED: 2020-01-27
The Scribunto extension for MediaWiki allows remote attackers to obtain the rollback token and possibly other sensitive information via a crafted module, related to unstripping special page HTML.
CVE-2015-0241
PUBLISHED: 2020-01-27
The to_char function in PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 allows remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via a (1) large number of digits when processing a numeric ...