Automated database from Oracle patches security flaws without suffering downtime

Automated database from Oracle patches security flaws without suffering downtime

Automated database from Oracle patches security flaws without suffering downtime

Oracle has launched a new automated database that can patch cyber security flaws on its own without having to schedule a downtime.

Oracle is offering an automated database capable of handling a large workload and costing less than half than Amazon's Redshift.

Oracle's new database, which the company calls the Oracle 18c, will not only be able to handle more workload because of its ability to increase the number of active processors but will also be able to patch existing cyber security flaws during runtime.

In short, enterprises using the new database will not have to schedule downtimes to update it or to download new patches to fix existing security issues, thereby utilising the database more efficiently.

Delivering a keynote address at Oracle's OpenWorld conference in San Francisco, Larry Ellison, CEO of Oracle, said that Oracle 18c will go a long way in ensuring cyber security of enterprises since scheduling downtime for databases handling a large number of operations is very difficult.

"It didn't work at Equifax. It doesn't work. We have to automate our cyber defenses. And you have to be able to defend yourselves without taking all of your computer systems offline or shutting down your databases," he said.

Ellison added that the automated database will be able to perform operations 99.95% of the time, which means that any unplanned downtime will not take more than 30 minutes in an entire year.

To make the database more alluring for enterprises, big or small, Ellison said that Oracle would sell it at less than half of what Amazon charges for Redshift, its database for enterprises, even though Oracle 18c will be able to perform more operations than Redshift is capable of.

"It will be less than one half of what Amazon charges you. We will write that in your contract," Ellison said at the conference.

Copyright Lyonsdown Limited 2021

Top Articles

Can you trust Zero Trust?

Enterprises seeking a singular authentication model are increasingly taking a Zero Trust approach to ensuring proper identity authentication.

Usability and email security

When employees understand how their behaviour impacts email security, they become much more efficient at detecting scams, preventing data breaches, and protecting sensitive information.

The pen testing guide you never thought you needed, until now…

Security testing should be at the centre of any cyber strategy,

Related Articles