{"id":1593,"date":"2010-05-21T00:00:00","date_gmt":"2010-05-21T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/21\/oracle-buys-database-firewall-firm-secerno\/"},"modified":"2021-12-30T11:39:40","modified_gmt":"2021-12-30T11:39:40","slug":"oracle-buys-database-firewall-firm-secerno","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/21\/oracle-buys-database-firewall-firm-secerno\/","title":{"rendered":"Oracle Buys Database Firewall Firm Secerno"},"content":{"rendered":"<p>Oracle said it will buy Secerno, a provider of database firewall software, to help customers protect their sensitive business data and comply with regulatory compliance standards.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Secerno&#8217;s products are expected to expand Oracle&#8217;s portfolio of security solutions to ensure data privacy, protect against insider threats, and enable regulatory compliance,&#8221; Vipin Samar, vice president of Oracle&#8217;s (NASDAQ: ORCL) database security group, wrote in a letter to both companies&#8217; customers.<\/p>\n<p>In November, IBM paid $225 million to acquire Guardium, a privately held database security software developer that competed with the likes of Secerno and Imperva.<\/p>\n<p>http:\/\/www.databasejournal.com\/features\/oracle\/article.php\/3883496\/Oracle-Buys-Database-Firewall-Firm-Secerno.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1593","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1593","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1593"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1593\/revisions"}],"predecessor-version":[{"id":4080,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1593\/revisions\/4080"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1593"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1593"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1593"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}