Protect Sensitive Data While Using Oracle’s CRM Cloud Applications
Protect Your Data
PerspecSys’ data protection solution for Oracle’s Cloud CRM applications allows organizations to keep control of their sensitive business data while using some of the world’s most popular CRM services. See Oracle Partner Page. Any sensitive information that leaves a business’ environment and enters the Oracle cloud can be tokenized or encrypted, ensuring that data remains undecipherable when it is being processed or stored outside of the enterprise’s environment.
How Does It Work?
The PerspecSys PRS Server, which is the core of the solution, acts as forward proxy server operating between Oracle Fusion CRM and CRM On Demand end users. The enterprise configures its data protection policies (encryption and tokenization) within the PRS Server. The PerspecSys Oracle CRM Adapter interfaces with this server and, given its understanding of the application and data layer operations of the Oracle applications, plays the critical role of preserving end user functionality, such as the ability to “Search” and “Sort” data. A management console permits authorized users to maintain data protection, administrative and security policies (such as permissions and access control) for sensitive data so that it can be protected before it is stored or processed in Oracle’s Cloud.
Optional components that are also available are the Mail Transfer Agent Server (used to enable e-mail functionality for Oracle CRM and the Reverse Proxy Server, which provides flexibility in deployment options, such as the ability to deploy the solution in DMZs or in the facilities of an organization’s IaaS partners. The Reverse Proxy Server provides the additional benefit of providing secure access to the PRS Server for remote users (without requiring them to VPN into the PRS Server).
Key Capabilities for Oracle’s Cloud CRM:
- Ability, at the data field level, to encrypt, tokenize, or leave data in “the clear” when it is sent to the Oracle cloud (CRM On Demand and Fusion CRM).
- Identifies and restricts access to and use of sensitive data through black and whitelists, and optionally, through regional or group designations; also restricts which data can be transferred to and from cloud applications.
- Monitors data use for corporate and legal compliance requirements.
- Ensures that data stays where you prescribe (e.g., on a network server, within a building or within a country).