Oracle Cloud Infrastructure Edge Services
Oracle's Cloud Infrastructure Edge Services provide capabilities for web application security, DDoS protection, DNS, traffic management, email delivery. Services are delivered securely through a network of 40 high-capacity edge locations and protect customers from external and internal threats. It also incorporates management of events, alerts, and orchestration of mitigations.
Features
- Responds to DNS queries in less than 30 milliseconds worldwide
- Propagates DNS records in under a minute for dependable performance
- Intelligently routes traffic across internet control plane with low latency
- Global anycast network of multiple data centres
- Redundant internet transit providers for ultimate resiliency
- Protection against DDoS attacks
- Web application security suite managed 24x7x365 by our cybersecurity experts
- Bot management, malware protection and API security solutions
- Monitor the availability and performance of public-facing services
- Supports varying email sending volumes from small to large
Benefits
- DDoS protection built-in
- Most standards-compliant DNS platform
- Service level objectives of minimum of 99.95 percent availability
- Global resolution, performance, reliability and security
- DNS network operating for over 10+ years
- Industry-leading propagation time to ensure fast response to DNS changes
- WAF filters out malicious requests to your web application, API
- Detection techniques for IP rate limiting, CAPTCHA, device fingerprinting
- Easy to configure OCI Health Checks also for external monitoring
- Support for primary and secondary DNS services, unlike other solutions
Pricing
£0.67 a unit a month
Service documents
Request an accessible format
Framework
G-Cloud 13
Service ID
7 0 6 2 9 6 7 9 2 9 5 6 7 9 4
Contact
Oracle Corporation UK Limited
Adrienne Belton
Telephone: +44 (0) 7824 836641
Email: Uk-publicsector_gb@oracle.com
Service scope
- Service constraints
- N/A
- System requirements
- N/A
User support
- Email or online ticketing support
- Email or online ticketing
- Support response times
- Oracle's response times are determined by the severity level of the service request. Oracle will use reasonable efforts to respond to Severity 1 service requests within fifteen (15) minutes. However, for other severity levels (2-4) no response time is defined. The severity level of a service request is selected by both the customer and Oracle, and must be based on defined severity definitions.
- User can manage status and priority of support tickets
- Yes
- Online ticketing support accessibility
- None or don’t know
- Phone support
- Yes
- Phone support availability
- 24 hours, 7 days a week
- Web chat support
- Web chat
- Web chat support availability
- 24 hours, 7 days a week
- Web chat support accessibility standard
- None or don’t know
- How the web chat support is accessible
- Accessible from cloud.oracle.com main page by clicking on Chat tab.
- Web chat accessibility testing
- N/A
- Onsite support
- Yes, at extra cost
- Support levels
- Online support is built into the price of the service for the license-included CPU SKU and provided through standard Support payments for the BYOL CPU SKU. This provides access to Oracle's extensive Cloud Support network for issues and questions. Customer sets the initial severity of reported issues and Oracle support responds according to the same guidelines provided for on-premises support.
- Support available to third parties
- Yes
Onboarding and offboarding
- Getting started
- Onsite and online training is available as well as insturctional videos and documentation.
- Service documentation
- Yes
- Documentation formats
-
- HTML
- End-of-contract data extraction
- For a period of no less than 60 days after the termination or expiration of the services, Oracle will make available your production data via secured protocols, or keep the service system accessible, for the purpose of data retrieval by you. During this period, the service system should not be used for production activities. Oracle has no obligation to retain your content after this 60 day period.
- End-of-contract process
- For a period of 60 days upon termination of the Oracle Cloud Services, Oracle will make available via secure protocols, your content residing in the production environment, or keep the service system accessible, for the purpose of data retrieval by you. During this retrieval period, Oracle’s Cloud Service Level Objective Policy does not apply and the service system may not be used for any production activities. Oracle has no obligation to retain your content after this retrieval period.
Using the service
- Web browser interface
- Yes
- Using the web interface
- All service functions can be controlled via the web interface. See the user guide for details.
- Web interface accessibility standard
- None or don’t know
- How the web interface is accessible
- Oracle's web interface follows Oracle accessibility philosophy and policies found at www.oracle.com/us/corporate/accessibility/policies/index.html. The Oracle Accessibility Guidelines are based on the 2017 Revised Section 508 of the Rehabilitation Act of 1973 as amended, and the World Wide Web Consortium's (W3C) Web Content Accessibility Guidelines version 2.0 guidelines at the AA level (WCAG 2.0 AA). Oracle is committed to developing new products in conformance with Revised Section 508 and the WCAG 2.0 AA standards to the extent practicable. Our online documentation follows OAG 3.0, by fully adopting the Revised Section 508 standards. In 2017 the U.S. Access Board announced the Revised Section 508 standard that is based on the WCAG 2.0 AA standards. In 2014, the European Union standard EN 301 549 ‘Accessibility requirements suitable for public procurement of ICT products and services in Europe’ was issued in response to Mandate 376, and it too was based on the WCAG 2.0 AA standards. Oracle has been an active participant in the development of these guidelines and is closely tracking their progress.
- Web interface accessibility testing
- Oracle products are tested for accessibility using a variety of techniques including automated tools, expert heuristic review, visual inspection, manual operation, and testing with various AT by both disabled and nondisabled users. We report the outcome of that testing using the Voluntary Product Accessibility Template (VPAT), which was developed by the Information Technology Industry (ITI) Council in partnership with the U.S. government's central procurement office, the General Services Administration (GSA), to assist Federal contracting officials and other buyers in making preliminary assessments regarding the availability of commercial ICT products and services with features that support accessibility.
- API
- Yes
- What users can and can't do using the API
- All service functions can be controlled via RESTful APIs. See the User Guide for full details.
- API automation tools
-
- Ansible
- Chef
- SaltStack
- Terraform
- Puppet
- Other
- Other API automation tools
- Any tools that provides a RESTful API interface
- API documentation
- Yes
- API documentation formats
-
- HTML
- Command line interface
- Yes
- Command line interface compatibility
-
- Linux or Unix
- Windows
- MacOS
- Using the command line interface
- All service functions can be controlled via the command line interface (CLI). See the user guide for details.
Scaling
- Scaling available
- Yes
- Scaling type
-
- Automatic
- Manual
- Independence of resources
- Commencing at Oracle’s activation of your production service, Oracle works to meet the Target Service Availability Level, or Target Service Uptime, of 99.5%. Oracle will provide you with access to a customer notifications portal. This portal will provide metrics on the Service Availability Level for Oracle Cloud Services that you purchased under your order. For those Oracle Cloud Services for which such metrics are not available via the customer notifications portal, Oracle will provide metrics on the Service Availability Level upon receipt of a Service Request submitted by you to Oracle requesting the metrics.
- Usage notifications
- Yes
- Usage reporting
Analytics
- Infrastructure or application metrics
- Yes
- Metrics types
-
- CPU
- Disk
- HTTP request and response status
- Memory
- Network
- Number of active instances
- Reporting types
-
- API access
- Real-time dashboards
Resellers
- Supplier type
- Not a reseller
Staff security
- Staff security clearance
- Staff screening not performed
- Government security clearance
- None
Asset protection
- Knowledge of data storage and processing locations
- Yes
- Data storage and processing locations
-
- United Kingdom
- European Economic Area (EEA)
- Other locations
- User control over data storage and processing locations
- Yes
- Datacentre security standards
- Complies with a recognised standard (for example CSA CCM version 3.0)
- Penetration testing frequency
- At least once a year
- Penetration testing approach
- Another external penetration testing organisation
- Protecting data at rest
-
- Physical access control, complying with SSAE-16 / ISAE 3402
- Physical access control, complying with another standard
- Scale, obfuscating techniques, or data storage sharding
- Data sanitisation process
- Yes
- Data sanitisation type
- Deleted data can’t be directly accessed
- Equipment disposal approach
- Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001
Backup and recovery
- Backup and recovery
- Yes
- What’s backed up
- N/A
- Backup controls
- Oracle periodically makes backups of your production data in the Oracle Cloud Services for Oracle's sole use to minimize data loss in the event of an incident. Backups are stored at the primary site used to provide the Oracle Cloud Services, and may also be stored at an alternate location for retention purposes. A backup is typically retained online or offline for a period of at least 60 days after the date that the backup is made.
- Datacentre setup
- Multiple datacentres with disaster recovery
- Scheduling backups
- Supplier controls the whole backup schedule
- Backup recovery
- Users contact the support team
Data-in-transit protection
- Data protection between buyer and supplier networks
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection between networks
- Oracle Cloud Infrastructure provides the customer with multiple forms of encryption for data in transit. All Oracle Cloud Infrastructure Application Programming Interface (API) requests must support HTTPS and SSL protocol TLS 1.2.
- Data protection within supplier network
-
- TLS (version 1.2 or above)
- IPsec or TLS VPN gateway
- Other
- Other protection within supplier network
- For data in transit, customers can enable encryption for traffic between their own VMs and end users. Oracle Cloud Infrastructure (OCI) protects data in transit, such as between two virtual networks. Oracle Cloud Infrastructure uses industry standard transport protocols such as TLS between devices and OCI data centers, and within data centers themselves.
Availability and resilience
- Guaranteed availability
- Commencing at Oracle’s activation of your production Oracle Cloud Service, Oracle works to meet the Target Service Availability Level, or Target Service Uptime, of 99.5%. Oracle will provide you with access to a customer notifications portal. This portal will provide metrics on the Service Availability Level for Oracle Cloud Services that you purchased under your order. For those Oracle Cloud Services for which such metrics are not available via the customer notifications portal, Oracle will provide metrics on the Service Availability Level upon receipt of a Service Request submitted by you to Oracle requesting the metrics.
- Approach to resilience
- Oracle Cloud Infrastructure is hosted in regions and availability domains. A region is a localised geographic area, an availability domain is one or more datacentres located within a region. A region is composed of several availability domains. Most Oracle Cloud Infrastructure resources are either region-specific, such as a VCN, or availability domain-specific, such as a compute instance. Availability domains are isolated from each other, fault tolerant, and designed against failing simultaneously. Because availability domains do not share infrastructure such as power or cooling or the internal availability domain network, a failure at one availability domain is designed to not impact the availability of the others. All the availability domains in a region are connected to each other by a low-latency, high-bandwidth network, which makes it possible for the customer to provide high-availability connectivity to the Internet and customer premises, and to build replicated systems in multiple availability domains for both high availability and disaster recovery. Regions are completely independent of other regions and can be separated by vast distances across countries or even continents.
- Outage reporting
- Oracle will provide you with access to a customer notifications portal. This portal will provide metrics on the Service Availability Level for Oracle Cloud Services that you purchased under your order. For those Oracle Cloud Services for which such metrics are not available via the customer notifications portal, Oracle will provide metrics on the Service Availability Level upon receipt of a Service Request submitted by you to Oracle requesting the metrics.
Identity and authentication
- User authentication
- Other
- Other user authentication
- The customer controls access to and use of its applications, workloads and data. The OCI Identity and Access Management (IAM) service is built to meet the requirements of enterprises, and it provides authentication and authorization for all their OCI resources and services. All customer calls to access Oracle Cloud Infrastructure resources are first authenticated by the IAM service (or federated provider) and then authorised based on IAM policies. A customer can create a policy that gives a set of users permission to access the infrastructure resources (i.e., network, compute, storage, etc.) within a compartment in the tenancy.
- Access restrictions in management interfaces and support channels
- Access to network devices and servers supporting the services requires multi-factor authentication by Oracle engineers, with approvals required for every access right. The network is a multi-tiered Demilitarised Zone (DMZ) environment inside a dedicated extranet that is isolated from Oracle's internal corporate network and VPNs for non-cloud services. The second step in the authentication path is authenticating to the relevant bastion server. Operator access is only permitted from bastion servers. Only approved engineers with the required entitlement can access the bastion servers. The public/private SSH key of authorised users is used in conjunction with UNIX username and authenticated via LDAP.
- Access restriction testing frequency
- At least every 6 months
- Management access authentication
-
- 2-factor authentication
- Public key authentication (including by TLS client certificate)
- Dedicated link (for example VPN)
- Username or password
- Other
- Description of management access authentication
- Access to network devices, servers supporting the services requires Oracle users to use multi-factor authentication and traverse three levels of access control. The network is a multi-tiered Demilitarised Zone (DMZ) environment inside a dedicated extranet that is isolated from Oracle's internal corporate network and VPNs for non-cloud services. The second step in the authentication path is authenticating to the relevant bastion server. Operator access is only permitted from bastion servers. Only approved engineers with the required entitlement can access the bastion servers. The public/private SSH key of authorised users is used in conjunction with UNIX username and authenticated via LDAP.
- Devices users manage the service through
- Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)
Audit information for users
- Access to user activity audit information
- You control when users can access audit information
- How long user audit data is stored for
- User-defined
- Access to supplier activity audit information
- You control when users can access audit information
- How long supplier audit data is stored for
- At least 12 months
- How long system logs are stored for
- At least 12 months
Standards and certifications
- ISO/IEC 27001 certification
- Yes
- Who accredited the ISO/IEC 27001
- EY/CertifyPoint BV, Amsterdam, Netherlands, accredited by Raad voor Accreditatie (RvA)
- ISO/IEC 27001 accreditation date
- 29/3/2019
- What the ISO/IEC 27001 doesn’t cover
- Scope covers Oracle Cloud Infrastructure services and underlying infrastructure. A detailed listing of in-scope services is available to customers upon request. All listed services are in scope for this certification.
- ISO 28000:2007 certification
- No
- CSA STAR certification
- No
- PCI certification
- Yes
- Who accredited the PCI DSS certification
- Schellman & Company, LLC
- PCI DSS accreditation date
- 5/1/2019
- What the PCI DSS doesn’t cover
- Scope covers Oracle Cloud Infrastructure services and underlying infrastructure. A detailed listing of in-scope services is available to customers upon request.
- Cyber essentials
- Yes
- Cyber essentials plus
- Yes
- Other security certifications
- Yes
- Any other security certifications
-
- ISO/IEC 27018:2014
- ISO/IEC 27017:2015
- Cyber Essentials Plus
- SSAE 18 & ISAE 3402 SOC 1 Type 2 Report
- SOC2 Type2 Report for the Security, Availability, Confidentiality principles
- HIPAA 1996 3rd party assessment and report
Security governance
- Named board-level person responsible for service security
- Yes
- Security governance certified
- Yes
- Security governance standards
-
- CSA CCM version 3.0
- ISO/IEC 27001
- Information security policies and processes
- Oracle security policies cover the management of security for both Oracle’s internal operations as well as the services Oracle provides to its customers. The policies apply to all Oracle employees. These policies, which are aligned with the ISO/IEC 27001:2013, govern all areas of security applicable to Oracle Cloud Infrastructure. Standards may exceed requirements mandated by the Oracle security policies, thus enforcing further controls within Oracle Cloud Infrastructure operations and systems. Oracle's Global Information Security (GIS) organization conducts security reviews, assessments, and audits periodically to confirm compliance with the Oracle information security policies, procedures, and practices. Where non-compliance is found, GIS works with the relevant lines of business to resolve those issues in a timely a manner. GIS reserves the right to intervene as deemed necessary and to isolate environments in non-compliance that put infrastructure or other environments at serious risk. Oracle employees who fail to comply with Oracle information security policies, procedures, and practices may be subject to disciplinary action, up to and including termination.
Operational security
- Configuration and change management standard
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Configuration and change management approach
- Oracle Cloud Infrastructure has a comprehensive change management process, including both prevent and detect controls, as a core requirement of its commitment to security, availability, and confidentiality. The change management process is reviewed annually, at minimum, and outlines the processes and procedures to be followed for each change. The process incorporates segregation of duties (SoD) and requires changes to be approved and tested prior to implementation. All change requests are documented in an electronic, access-controlled ticketing system. The workflow prevents the ticket from being moved into the 'scheduled for implementation' phase without the required review and approvals.
- Vulnerability management type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Vulnerability management approach
- Penetration tests of the system are conducted at least annually. A commercial vulnerability scanning tool is configured to scan all external IP addresses and internal nodes at least quarterly. The results of vulnerability scans and penetration tests are reviewed by management. Vulnerabilities and threats are assessed, documented and tracked through resolution. Oracle Cloud Infrastructure has deployed security information and event monitoring (SIEM) solution which ingests and stores security-related logs and alerts from networking devices, hosts and other components within the infrastructure. SIEM is monitored 24x7x365 basis designed to defend and protect against unauthorised intrusions and activity in the production environment.
- Protective monitoring type
- Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
- Protective monitoring approach
- OCI's deployed SIEM ingests logs and alerts from networking devices, and hosts. SIEM is monitored 24x7x365 basis designed to defend and protect against unauthorised intrusions and activity in the production environment. In the event of a security incident, Oracle Cloud Infrastructure activates an agreed protocol which includes GIS, Global Product Security, and Privacy & Security Legal, as applicable, to provide specialist subject matter expertise to respond to the incident. In the event that Oracle determines that it is required to report an incident involving the breach of personal information to a customer, Oracle will promptly notify the affected customer.
- Incident management type
- Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
- Incident management approach
- Incidents, including incidents reported directly to a customer’s account manager, are recorded via an internal access-controlled electronic ticketing system. Routing, communication, and escalation of incidents vary depending on a number of factors including urgency and impact to customers. The severity definitions are detailed below. Incidents reported via My Oracle Support (MOS) or through the external user incident reporting process are routed to Oracle Cloud Infrastructure personnel and tracked in the electronic ticketing system in the same manner as an internally identified incident.
Secure development
- Approach to secure software development best practice
- Supplier-defined process
Separation between users
- Virtualisation technology used to keep applications and users sharing the same infrastructure apart
- Yes
- Who implements virtualisation
- Supplier
- Virtualisation technologies used
- KVM hypervisor
- How shared infrastructure is kept separate
- Each customer has one or many software defined networks that are isolated from other customers. Isolation occurs at the hypervisor layer or on a bare metal host depending on the shape that is chosen during instance initiation. Your Content is logically or physically segregated from the content of other customers hosted in the Oracle Cloud Services environments. OCI responsibility includes hypervisor security and the configuration of the permissions and network access controls required to ensure that hosts can communicate correctly and that devices are able to attach or mount the correct storage devices.
Energy efficiency
- Energy-efficient datacentres
- Yes
- Description of energy efficient datacentres
- Our colocation providers in the UK state alignment with the EU Code of Conduct for Energy Efficient datacentres on their website.
Social Value
- Fighting climate change
-
Fighting climate change
We know that technology is critical in meeting the ambitious United Nations Sustainable Development Goals. At Oracle, all the data centres used in delivering G-Cloud contracts, including the dedicated private dual-region cloud for use by the UK public sector, operate an energy-efficient circular cloud and run entirely using 100% renewable energy. We have programs in place to maximise the efficiency of our datacentres providing the services under this framework, including: • Operating dense computing environments and attaining high utilisation rates • Leveraging state-of-the-art intelligent energy management and cooling technologies • Managing an elastic computing platform eliminating excess capacity builds • Designing and deploying highly efficient servers and storage equipment. Thanks to these initiatives, our data centres worldwide have achieved power usage effectiveness (PUE) as low as 1.15. In 2019 we achieved the Energy Star® certification for our X7-2L and X8-2L series of engineered systems. Colocation providers supporting Oracle’s Cloud Infrastructure are ISO14001, ISO9001 certified and complied with the EU Code of Conduct for Data Centres. We track, calculate and report greenhouse gas emissions according to the Government’s updated Environmental Reporting Guidelines and publish a Carbon Reduction Plan (PDF). We have publicly committed to being Net-Zero by 2050 with a 50% reduction by 2030, and our environmental goals include Carbon Neutrality for Scope 1 and Scope 2 emissions by 2025, a Net Zero Target including Scope 1, Scope 2 and Scope 3 emissions by 2050 and a 50% reduction in total emissions by 2030. Oracle continues to invest in the Oracle Design for the Environment (DfE) program to achieve a more' circular' supply chain. This applies reverse logistics to recover and reuse hardware retired by customers and from Oracle’s cloud data centres. In 2020 we collected 1.1 million kilos of retired hardware assets, of which 99.6% were recycled. Read more (https://www.oracle.com/uk/industries/government/climate-action/) - Covid-19 recovery
-
Covid-19 recovery
Weathering the pandemic has necessitated levels of resilience and collaboration that are unmatched in most of our lifetimes. Though we continue to face disruption and challenges, Oracle and its employees remain steadfast and strong, stepping up to support our communities, colleagues, and customers. Read more about how Oracle has helped to strengthen public health here. We operate in a high growth sector, and we believe we can play a vital role in contributing to the UK’s economic recovery from Covid 19. Cloud computing and management services were the number one for employer growth within the software industry in the past year. We will focus our social value activities on supporting young people aged 16-24 who are currently facing higher unemployment rates than other age groups because of the impact of the pandemic and people with barriers to employment. We will demonstrate inclusive recruitment and targeted recruitment activities by: • Ensuring our job descriptions are written inclusively and in an accessible way. As an example of our expertise in this area, we encouraged and helped the Business Disability Forum develop a Neurodiversity Toolkit, now available to all its members. • Posting all Oracle job vacancies on widely accessible websites like oracle.com and LinkedIn. • Working in partnership with VCSEs explicitly supporting people with barriers to employment, such as the National Autistic Society, to ensure our opportunities are advertised appropriately and accessibly and are disseminated through their networks. • Running online and virtual recruitment sessions with education establishments located throughout the country. We will develop partnerships with education establishments and offer free computing and technology resources for teaching and learning. This includes curriculum, learning resources, Oracle Cloud technologies, Oracle APEX, and a wide range of software, support, and certification resources. - Tackling economic inequality
-
Tackling economic inequality
Oracle is committed to tackling economic inequality at the root, from creating new businesses and new employment opportunities to improving education and training. Our overriding vision is to help lower the unequal distribution of income and opportunity between different groups in society. Oracle’s commitment to working with small, diverse, high-quality suppliers is essential for our procurement vision. The team is always looking for small and various suppliers that can deliver innovative, high-quality products and services. Ultimately, our goal is to diversify our supplier base by encouraging these small and diverse suppliers to compete for business. We are also a signatory to the Prompt Payment Code, committing Oracle to pay suppliers on time, giving suppliers clear guidance, and encouraging good payment practices. To support growing companies' access to the technology and business support they need to thrive, we offer Oracle for Startups without taking equity. The program allows startups to reach a new audience of enterprise customers and Oracle and its customers the chance to tap into exciting new technologies. Oracle for Startups provides free cloud credits, offering startups a 70% discount on Oracle Cloud Infrastructure and access to migration support, mentorship, marketing exposure, and introductions to some of Oracle’s 430,000+ customers. The program supports London-based Skin Analytics, for example, in the development of advanced image processing techniques to map, analyse, and manage skin lesions and provide an early warning of skin cancer. Read more: https://www.oracle.com/uk/industries/government/economic-inequality/ - Equal opportunity
-
Equal opportunity
Oracle believes that innovation starts with inclusion. That’s why we’re committed to creating a workplace where all kinds of people can do their best work. To provide equal opportunity, we will: • Deliver mandatory unconscious bias training for all employees. The course now forms part of the annual global compulsory compliance training programme; • Change behaviour and cultures in our own business, networks, and communities as a Disability Confident Employer; • Focus on embracing total inclusivity and belonging within Oracle’s progressive modern workplace. Our Cultural Harmony Network strives to raise awareness and share best practices for improving broader representations amongst ethnic minority employees; • Deliver a Reverse Mentoring Programme where employees from our BAME demographic mentor our senior leaders to learn the lived experiences better. This will better shape decisions made at a senior level from career progression, recruitment, and training; • Continue to pioneer neurodiversity awareness and inclusion, respecting and valuing people with neurological differences such as autism, attention deficit hyperactivity, and dyslexia. We have three objectives: improve understanding and inclusion for existing neurodiverse staff; enable the potential to recruit neurodiverse staff; identify support resources and networks for employees with neurodiversity in the family; • Create accessible technologies and products that enhance the overall workplace environment and contribute to the productivity of our employees and our customers. Our Accessibility Program Office is responsible for defining the corporate standards for accessibility and developing materials to train all employees so that they can successfully create products that meet those standards; • Not tolerate or condone human trafficking or slavery and adopt the measures outlined in the 2021 Oracle Statement against Modern Slavery (PDF) have been adopted. These values are aligned with the UK Government Social Value Model for public procurement. Read more: https://www.oracle.com/uk/industries/government/equal-opportunity/ - Wellbeing
-
Wellbeing
‘My Wellbeing, My Life’ is Oracle’s wellness programme, open to all Oracle UK employees. The programme encompasses an array of initiatives, from physical and mental health, nutrition, and sleep programmes, to financial and legal support, stress management, and support during periods of home working. Our priority is to be proactive, so employees can gain awareness, education, and support to successfully function at work and home, free from factors which may negatively affect their health. ‘My Wellbeing, My Life’ content is tailored to ensure it remains valid, accessible, and relevant. This includes initiatives to better support working from home, homeschooling, other caring responsibilities, and financial wellbeing. Oracle regularly delivers both manager and employee training on various well-being topics, including mental health, which is available in real-time and on-demand. We also provide employees and their dependents with access to a free and confidential Employee Assistance Programme, offering emotional and practical support should they need it 24/7 and in confidence. Oracle has also been working towards implementing the core standards as set out in the Stevenson Farmer Review on Mental Health and Employers. We have successfully implemented five of the six core standards and one enhanced standard. Read more: https://www.oracle.com/uk/industries/government/wellbeing/ Every year, Oracle Volunteers design and participate in volunteering projects to support charities and public entities close to their hearts—from mentoring students in less-advantaged communities to donating and distributing food and critical supplies to those in need. Within the UK, all Oracle employees can volunteer up to 40 hours per year during work hours and as much as they would like outside of work. We team up with The Prince’s Trust, MacMillan Cancer Support, and others to support health, wellness, and opportunity. Read more: https://www.oracle.com/corporate/citizenship/volunteering/
Pricing
- Price
- £0.67 a unit a month
- Discount for educational organisations
- No
- Free trial available
- Yes
- Description of free trial
- The free trial allows for up to US$300 usage, and expires after 30 days. The free trial is limited to a total of 5TB of block, object and archive storage capacity.
- Link to free trial
- https://www.oracle.com/uk/cloud/free/