Live News, Features and Article Updates Covering Oracle Technologies

Oracle on Ulitzer

Subscribe to Oracle on Ulitzer: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Oracle on Ulitzer: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Oracle Authors: Elizabeth White, Yakov Fain, Liz McMillan, Pat Romanski, Carmen Gonzalez

Press Release

Making Compliance Easier

Mapping Requirements to an Integrated Cloud Security Platform

Regulatory compliance remains a critical and strategic business need for most companies.  And, the issues are clear. The layers of IT security necessary to address the myriad of audits, reports and processes are typically expensive. The expense is not limited to the technology applications and solutions, but to personnel, consulting, expertise retention, and resources. These requirements tax operational resources, reduce the ability to focus on core competencies or force reassessment on IT asset prioritization.

Cloud security leader CloudAccess and Kevin Nikkhoo present a brand new white paper that explores the strategic advantages of applying integrated (unified and collaborative) cloud security tools to cost-effectively and efficiently manage the complex labyrinth of compliance. The complimentary white paper can be downloaded at

It also shares specific best practices in terms of associating a broad swath of requirements with tactics that help you maneuver through the evolving IT threat-scape. If your organization is obligated to any of the 300 worldwide compliance agencies.

“As compliance is typically a compulsory bureaucratic construct, being compliant doesn’t necessarily make your network and other IP assets secure. However, being secure, does make one compliant,”  Nikkhoo noted.

The best practices contained in the white paper go well beyond the need to collect and review logs (a necessity for most compliance regulations)–it looks at the holistic need to actually create security policies. These include 24/7/365 real-time monitoring that includes intrusion detection and alerting, identity provisioning, enterprise access control, application management and identity credentialing. In that the solutions discussed are maintained and managed in the cloud, the issues of expense, time to market, TCO and scope are mitigated; as is risk.

According to Nikkhoo, the white paper is a strong road map to reducing the burden and creating better visibility across an enterprise.

More Stories By Kevin Nikkhoo

With more than 32 years of experience in information technology, and an extensive and successful entrepreneurial background, Kevin Nikkhoo is the CEO of the dynamic security-as-a-service startup Cloud Access. CloudAccess is at the forefront of the latest evolution of IT asset protection--the cloud.

Kevin holds a Bachelor of Science in Computer Engineering from McGill University, Master of Computer Engineering at California State University, Los Angeles, and an MBA from the University of Southern California with emphasis in entrepreneurial studies.