SlideShare une entreprise Scribd logo
1  sur  89
Télécharger pour lire hors ligne
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Street Warrior. Mobile Sicherheit auf unseren Straße
• DOAG2015
• 17. November 2015
Dr. Nadine Schöne
Systemberaterin, Oracle
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for
information purposes only, and may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole discretion of Oracle.
3
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Steckbrief
4
Systemberaterin bei Oracle in Potsdam seit 2,5 Jahren
Middleware, insbesondere:
• Mobile
• Cloud
Datenbank: Oracle R Enterprise (Datenanalysen)
Hintergrund
Naturwissenschaftlerin (Biologie, Mathematik, Bioinformatik)
@schoenenadine
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Agenda
Einleitung
Mobile Enterprise Architektur
Mobile Security
Demo
Weitere Informationen
Q&A
1
2
3
4
5
5
6
Einleitung
6
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Mobile Enterprise Challenges
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 8
Enterprise Mobility Challenges
Mobile
Security
Multi OS / Device
support
Delivery & Organization Challenges
Data & Service
Integration
ON-PREMISE
PACKAGED
APPLICATIONS
CUSTOM APPLICATIONS
CLOUD
Mobile Enterprise Architektur
9
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Beispiel: Mobile Enterprise Architektur
Oracle DB
User
API Gateway
DMZ Fachanwendungen
Secure: Identity Management
Deploy: WebLogic Server
Connect: Service Bus
Mobile Cloud Service
Secure Workspace
Mobile Security Manager (MSM)Mobile Apps
Mobile Security
Access Server MSAS)
Mobile Security
11
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Informationssicherheit als Prozess
Sicherheitsprozess
Initialaktivitäten
Laufende Aktivitäten
Umsetzungen / Betrieb
Prozesse
Sicherheitsstrategie
Risikomanagement
Sicherheitsmgmt.
Schutz Informationswerte
(Vetraulichkeit, Integrität)
Sicherstellung der
Verfügbarkeit
Disaster Recovery
/Business Continuity
Planning
Monitoring
Auditing
Bereiche
Technisch
Physisch Organisatorisch
Systeme (HW&
OS)
Netze Software Daten
Build
Operate
Ablauf
Schwachstellenanalyse, Bedrohungsprofil, Risikobewertung, Maßnahmenpriorisierung
Risikomanagement
Security Policy, Standards & Procedures
Sicherheits-
organisation
Zugriffssicherung, Authentisierung, Kryptographie, PKI, VPN Sicherheitszonen
Zugangskontrollen
Zutrittsicherungs-
syteme
Firewalls
Netzwerkdesign
Clustering
Netzwerkmgmt.
Virenschutz-
management
Sichere OS
System-Aktualisierung
SW-Design
Verbindlichkeit
Datenklassifik.
Datenträger
System-performance
Monitoring
CM
Hot-Backup Gebäudesicherheit
Personelle Sicherheit
Arbeitsplatz
Schutz vor Elem-
entarereignissen
Notfallpläne
(Contingency Plans)
Intrusion Detection Systems
Gebäude-überwachung
Videoaufzeichnung
Activity Logging
Sicherheitsaudits
Vulnerability Checks
Sicherheitsmanagement
Security Vision, Strategie für den Umgang mit unternehmenskritischen Infrastrukturen und Informationswerten
Governance
HR-Prozesse
Betriebl. Praktiken
Awareness
Training
Backup, Backup-Facitilites
Logging, Evaluierung, Behandlung von Sicherheitsvorfällen
System Recovery
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
INFORMATIONSSICHERHEIT als Prozess
Sicherheitsprozess
Initialaktivitäten
Laufende Aktivitäten
Umsetzungen / Betrieb
Prozesse
Sicherheitsstrategie
Risikomanagement
Sicherheitsmgmt.
Schutz Informationswerte
(Vetraulichkeit, Integrität)
Sicherstellung der
Verfügbarkeit
Disaster Recovery
/Business Continuity
Planning
Monitoring
Auditing
Bereiche
Technisch
Physisch Organisatorisch
Systeme (HW&
OS)
Netze Software Daten
Build
Operate
Ablauf
Schwachstellenanalyse, Bedrohungsprofil, Risikobewertung, Maßnahmenpriorisierung
Risikomanagement
Security Policy, Standards & Procedures
Sicherheits-
organisation
Zugriffssicherung, Authentisierung, Kryptographie, PKI, VPN Sicherheitszonen
Zugangskontrollen
Zutrittsicherungs-
syteme
Firewalls
Netzwerkdesign
Clustering
Netzwerkmgmt.
Virenschutz-
management
Sichere OS
System-Aktualisierung
SW-Design
Verbindlichkeit
Datenklassifik.
Datenträger
System-performance
Monitoring
CM
Hot-Backup Gebäudesicherheit
Personelle Sicherheit
Arbeitsplatz
Schutz vor Elem-
entarereignissen
Notfallpläne
(Contingency Plans)
Intrusion Detection Systems
Gebäude-überwachung
Videoaufzeichnung
Activity Logging
Sicherheitsaudits
Vulnerability Checks
Sicherheitsmanagement
Security Vision, Strategie für den Umgang mit unternehmenskritischen Infrastrukturen und Informationswerten
Governance
HR-Prozesse
Betriebl. Praktiken
Awareness
Training
Backup, Backup-Facitilites
Logging, Evaluierung, Behandlung von Sicherheitsvorfällen
System Recovery
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
MDM and MAM
Enterprise
Data
Enterprise
Mobile
App
Personal
Data
Personal
Mobile
App
Security
Policies
Mobile Device Management Mobile Application Management
Remote
Device
Wipe
Remote
Container
Wipe
Enterprise
Data
Enterprise
Mobile
App
Personal
Data
Personal
Mobile
App
Security
Policies
Container
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Oracle’s Mobile Security Plan
Securely Separate And Manage Corporate Apps And Data On Devices
Secure Container For App
Security And Control
Secure Controls And Management For
Enterprise Apps
Extend IDM Services To Avoid
Redundancy And Overlaps
 Separate, protect and wipe corporate
applications and data
 Strict policies to restrict users from
viewing/moving data out of container
 Consistent support across multiple mobile
platforms
• Secure communication with
enterprise application servers
• Corporate app store
• Common users, roles, policies, access
request, cert etc.
• SSO for native and browser apps
• Risk/policy based step up and strong
authentication
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Avoiding silos in access & identity
management… (1)
Benefits
WebSSO Access Management
(WAM)
Mobile Access
Management
Mobile App Management, iOS built-in
Kerberos
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Avoiding silos in access & identity
management… (2)
Benefits
Unified Access
Management
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
3 steps to secure your app.Containerization
c14n -c inject -i Candidate.ipa -o injected.ipa -conf c14n.conf
-cert 'iPhone Distribution: Acme Corp Inc.' -p
dist.mobileprovision -v
Injecting security
services
‣ Secure data
transport
‣ Authentication
‣ Secure data
storage
‣ Data leakage
control
‣ Dynamic policy
engine
yourapp.zip yourapp.ipa
1. Get an unsigned copy of the
app. This is typically an unsigned
ipa or zip file. We don’t require
the source code.
2. Run the Oracle c14n tool. This
is a command line tool which is
included in Oracle Mobile
Security Services.
3. Upload the app (ftp) to your
enterprise App Store. This can reside
on a file server. The Catalog app to
browse the enterprise app store is
included in Oracle Mobile Security
Services. Access to apps can be
controlled via Group membership.
Demo
19
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
User
Installation des Secure Workspace
• Sicherheitszertifikate herunterladen: MSAS und MSM
• Installation der Secure Workspace App
20Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 21Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 22Oracle Confidential – Internal
Donwload MSAS Certificate
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 23Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 24Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 25Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 26Oracle Confidential – Internal
Register MDM Profile
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 27Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 28Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 29Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 30Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 31Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 32Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 33Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 34Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 35Oracle Confidential – Internal
VORHER
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
User
Installation des Secure Workspace
• Sicherheitszertifikate herunterladen: MSAS und MSM
• Installation der Secure Workspace App
36Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
User
Erste Nutzung der Secure Workspace App
• Erste Konfiguration
• Einloggen: Authentifizierung, Challenging Question,
Authorisierung
• Location
• App Katalog
37Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 38Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 39Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 40Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 41Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 42Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 43Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 44Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 45Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 46Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 47Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
User
Erste Nutzung der Secure Workspace App
• Erste Konfiguration
• Einloggen: Authentifizierung, Challenging Question,
Authorisierung
• Location
• App Katalog
48Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Admin
Deployment einer App in den App Katalog (Oracle Access Manager)
• Laden der App in den App Katalog
• App zu Mobile Security Policy hinzufügen
49Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 50Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 51Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 52Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 53Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 54Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Admin
Deployment einer App in den App Katalog (Oracle Access Manager)
• Laden der App in den App Katalog
• App zu Mobile Security Policy hinzufügen
55Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 56Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 57Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 58Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 59Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 60Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 61Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 62Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 63Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 64Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
65
Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 66Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Admin
Deployment einer App in den App Katalog (Oracle Access Manager)
• Laden der App in den App Katalog
• App zu Mobile Security Policy hinzufügen
67Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
User
Neue App aus App Katalog installieren
• App istallieren
• App testen – API Gateway
68Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 69Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 70Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 71Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 72Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 73Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 74Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 75Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 76Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 77Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 78Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
User
Neue App aus App Katalog installieren
• App istallieren
• App testen – API Gateway
79Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Admin
API Gateway Policy
80Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 81Oracle Confidential – Internal
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Zusammenfassung Demo
• User: Installation des Secure Workspace
• User: Erste Nutzung des Secure Worspace
• Admin: Deployment einer App in den App Katalog (incl Security Policy)
• User: Neue App aus App Katalog installieren
• Admin: Policies im API Gateway
82Oracle Confidential – Internal
Weitere Informationen
83
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Device Platformen
Google, Samsung, HTC, LG, ...
Surface
Windows PhoneIOS
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Oracle Mobile Enterprise
http://www.oracle.com/us/technologies/mobile/overview/index.html
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Social Login
Single Sign-On
Reporting &
Analytics
Oracle & 3rd Party
Connectors
ID Admin &
Self Service
Strong
Authentication
Oracle Identity Cloud Services
86
Employees
Partners
Customers
Enables Secure Access by Anyone, from Anywhere, on Any Device
Mobile Identity
Mobile Application
ManagementMobile Device
Management
Mobile Content
Management
Multi-channel Application Security
Mobile Security
Cloud Service
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Weitere Vorträge zu Mobile und Security
• The Unforgettable. Der nichts vergisst… Rechte- und Rollenprinzipien, Di 13 Uhr, Foyer Tokio
• Oracle Cloud Day - Mobile Developers erste Schritte in die Cloud, Di 16 Uhr, Riga
• Oracle Cloud Day - Unternehmensweite Mobile Lösung aus der Cloud, Di 15 Uhr, Budapest
• Mobile Cloud Service im Einsatz, Di 17 Uhr, Kopenhagen
• Without a mobile strategy you don‘t have a strategy, Mi 9 Uhr, Kopenhagen
• Go Digital Native – Extending Oracle ADF to Mobile and Cloud, Mi 11 Uhr, Kopenhagen
• Integrating calls to Oracle MCS in Oracle MAF applications, Mi 17 Uhr, Kopenhagen
• Oracle Mobile Cloud Service: Demo eines Anwendungsfalls, Do 12 Uhr, Riga
• Umsetzung von Mobile Security, Do 16 Uhr, Kopenhagen
87
Ohne Anspruch auf Vollständigkeit!
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Kontakt
Dr. Nadine Schöne| Systemberaterin
Email: nadine.schoene@oracle.com
Tel: +49 331 200 7190
Oracle Deutschland B.V. & Co. KG
Schiffbauergasse 14
14467 Potsdam
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
Engage Build
IntegrateAnalyze
Operate
Manage
Secure

Contenu connexe

Tendances

Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionCipherCloud
 
Security concerns in web erp
Security concerns in web erpSecurity concerns in web erp
Security concerns in web erpManoj Jhawar
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallTroy Kitch
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…SecureAuth
 
SplunkLive! Houston IT Service Intelligence Hands On Version
SplunkLive! Houston IT Service Intelligence Hands On VersionSplunkLive! Houston IT Service Intelligence Hands On Version
SplunkLive! Houston IT Service Intelligence Hands On VersionSplunk
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksDevOps.com
 
Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring UBA Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring UBA Splunk
 
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk
 
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfPpt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfMelody Liu
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Securitycentralohioissa
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint e-Xpert Solutions SA
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Erin Sweeney
 
Csslp Launch Presentation
Csslp Launch PresentationCsslp Launch Presentation
Csslp Launch Presentationgueste35899
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarImperva
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpointe-Xpert Solutions SA
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookIftikhar Ali Iqbal
 
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Andrejs Prokopjevs
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerZscaler
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSMAU
 

Tendances (20)

Salesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data ProtectionSalesforce Security with Visibility, Control & Data Protection
Salesforce Security with Visibility, Control & Data Protection
 
CSSLP Course
CSSLP CourseCSSLP Course
CSSLP Course
 
Security concerns in web erp
Security concerns in web erpSecurity concerns in web erp
Security concerns in web erp
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
 
What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…What's New in IdP 9.0 Behavioral Biometrics and more…
What's New in IdP 9.0 Behavioral Biometrics and more…
 
SplunkLive! Houston IT Service Intelligence Hands On Version
SplunkLive! Houston IT Service Intelligence Hands On VersionSplunkLive! Houston IT Service Intelligence Hands On Version
SplunkLive! Houston IT Service Intelligence Hands On Version
 
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto NetworksSecurity Across the Cloud Native Continuum with ESG and Palo Alto Networks
Security Across the Cloud Native Continuum with ESG and Palo Alto Networks
 
Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring UBA Splunk for Enterprise Security featuring UBA
Splunk for Enterprise Security featuring UBA
 
Splunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBASplunk for Enterprise Security Featuring UBA
Splunk for Enterprise Security Featuring UBA
 
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfPpt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
 
Sam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload SecuritySam Herath - Six Critical Criteria for Cloud Workload Security
Sam Herath - Six Critical Criteria for Cloud Workload Security
 
2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint 2018 06 Presentation Cloudguard SaaS de Checkpoint
2018 06 Presentation Cloudguard SaaS de Checkpoint
 
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
 
Csslp Launch Presentation
Csslp Launch PresentationCsslp Launch Presentation
Csslp Launch Presentation
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
 
2018 06 Presentation Cloudguard IaaS de Checkpoint
2018 06  Presentation Cloudguard IaaS de Checkpoint2018 06  Presentation Cloudguard IaaS de Checkpoint
2018 06 Presentation Cloudguard IaaS de Checkpoint
 
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - TechbookMcAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
McAfee - McAfee Application Control (MAC) - Whitelisting - Techbook
 
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...
 
Migration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscalerMigration to microsoft_azure_with_zscaler
Migration to microsoft_azure_with_zscaler
 
Smau Padova 2018 - Cisco
Smau Padova 2018 - CiscoSmau Padova 2018 - Cisco
Smau Padova 2018 - Cisco
 

En vedette

la comunicacion y sus elementos
la comunicacion y sus elementosla comunicacion y sus elementos
la comunicacion y sus elementoseinito
 
Revista punto d octubre 2014
Revista punto d octubre 2014Revista punto d octubre 2014
Revista punto d octubre 2014DepauSistemas
 
Cambio climático 2 columnas
Cambio climático 2 columnasCambio climático 2 columnas
Cambio climático 2 columnasAurii Hernández
 
Atrabajo virtual enseñanza aprendizaje
Atrabajo virtual enseñanza aprendizajeAtrabajo virtual enseñanza aprendizaje
Atrabajo virtual enseñanza aprendizajeSarai Lopez Fonseca
 
Presentacion%20fenomeno[1]
Presentacion%20fenomeno[1]Presentacion%20fenomeno[1]
Presentacion%20fenomeno[1]Joselin Bolivar
 
Estrategias didácticas para la enseñanza de escritura en
Estrategias didácticas para la enseñanza  de escritura enEstrategias didácticas para la enseñanza  de escritura en
Estrategias didácticas para la enseñanza de escritura en11101978
 
Ensayo pink tomate
Ensayo pink tomateEnsayo pink tomate
Ensayo pink tomateANYIMORALES
 
Curso de liderazgo y técnicas de dirección con caballos
Curso de liderazgo y técnicas de dirección con caballosCurso de liderazgo y técnicas de dirección con caballos
Curso de liderazgo y técnicas de dirección con caballosJosé Manuel Simarro
 
El cáncer (enfermedad mortal)
El cáncer (enfermedad mortal)El cáncer (enfermedad mortal)
El cáncer (enfermedad mortal)Virginia Tubay
 
Como se predice el estado del agua
Como se predice el estado del aguaComo se predice el estado del agua
Como se predice el estado del aguaRamon Reyes Garcia
 
Abecedario para niños definitivo parasubir
Abecedario para niños definitivo parasubirAbecedario para niños definitivo parasubir
Abecedario para niños definitivo parasubirRoiRA
 
Presentacion trabajo final
Presentacion trabajo finalPresentacion trabajo final
Presentacion trabajo finalEneriMarvel
 
Sistema operativo chrome os
Sistema operativo chrome osSistema operativo chrome os
Sistema operativo chrome osKike Merida
 
La calidad de la salud en colombia
La calidad de la salud en colombiaLa calidad de la salud en colombia
La calidad de la salud en colombiaJuan Fernando Mesa
 
Polinomios 3eso
Polinomios 3esoPolinomios 3eso
Polinomios 3esoruco69
 

En vedette (20)

la comunicacion y sus elementos
la comunicacion y sus elementosla comunicacion y sus elementos
la comunicacion y sus elementos
 
Fab mb
Fab mbFab mb
Fab mb
 
Revista punto d octubre 2014
Revista punto d octubre 2014Revista punto d octubre 2014
Revista punto d octubre 2014
 
Invitación Jornada en Oración de Ayuno - Agosto 30 de 2014
Invitación Jornada en Oración de Ayuno  - Agosto 30 de 2014Invitación Jornada en Oración de Ayuno  - Agosto 30 de 2014
Invitación Jornada en Oración de Ayuno - Agosto 30 de 2014
 
Cambio climático 2 columnas
Cambio climático 2 columnasCambio climático 2 columnas
Cambio climático 2 columnas
 
Atrabajo virtual enseñanza aprendizaje
Atrabajo virtual enseñanza aprendizajeAtrabajo virtual enseñanza aprendizaje
Atrabajo virtual enseñanza aprendizaje
 
Biografias
BiografiasBiografias
Biografias
 
Presentacion%20fenomeno[1]
Presentacion%20fenomeno[1]Presentacion%20fenomeno[1]
Presentacion%20fenomeno[1]
 
Estrategias didácticas para la enseñanza de escritura en
Estrategias didácticas para la enseñanza  de escritura enEstrategias didácticas para la enseñanza  de escritura en
Estrategias didácticas para la enseñanza de escritura en
 
Actividad 2.1
Actividad 2.1Actividad 2.1
Actividad 2.1
 
Ensayo pink tomate
Ensayo pink tomateEnsayo pink tomate
Ensayo pink tomate
 
Curso de liderazgo y técnicas de dirección con caballos
Curso de liderazgo y técnicas de dirección con caballosCurso de liderazgo y técnicas de dirección con caballos
Curso de liderazgo y técnicas de dirección con caballos
 
El cáncer (enfermedad mortal)
El cáncer (enfermedad mortal)El cáncer (enfermedad mortal)
El cáncer (enfermedad mortal)
 
Como se predice el estado del agua
Como se predice el estado del aguaComo se predice el estado del agua
Como se predice el estado del agua
 
Abecedario para niños definitivo parasubir
Abecedario para niños definitivo parasubirAbecedario para niños definitivo parasubir
Abecedario para niños definitivo parasubir
 
Presentacion trabajo final
Presentacion trabajo finalPresentacion trabajo final
Presentacion trabajo final
 
Socket cpu
Socket cpuSocket cpu
Socket cpu
 
Sistema operativo chrome os
Sistema operativo chrome osSistema operativo chrome os
Sistema operativo chrome os
 
La calidad de la salud en colombia
La calidad de la salud en colombiaLa calidad de la salud en colombia
La calidad de la salud en colombia
 
Polinomios 3eso
Polinomios 3esoPolinomios 3eso
Polinomios 3eso
 

Similaire à Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - DOAG2015

Slidedeck MCS Demo eines Anwendungsfalles - DOAG2015
Slidedeck MCS Demo eines Anwendungsfalles - DOAG2015Slidedeck MCS Demo eines Anwendungsfalles - DOAG2015
Slidedeck MCS Demo eines Anwendungsfalles - DOAG2015Nadine Schoene
 
Secure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperClusterSecure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperClusterRamesh Nagappan
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
OOW-CON3656-EA
OOW-CON3656-EAOOW-CON3656-EA
OOW-CON3656-EABen Duan
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewGuatemala User Group
 
Let's Talk Mobile
Let's Talk MobileLet's Talk Mobile
Let's Talk MobileChris Muir
 
Modern App Development with Oracle Cloud
Modern App Development with Oracle CloudModern App Development with Oracle Cloud
Modern App Development with Oracle CloudJuan Carlos Ruiz Rico
 
Capgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database SecurityCapgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database SecurityJohan Louwers
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsEric Vétillard
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudMarketingArrowECS_CZ
 
360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration SecurityDevOps.com
 
BUSTED! How to Find Security Bugs Fast!
BUSTED! How to Find Security Bugs Fast!BUSTED! How to Find Security Bugs Fast!
BUSTED! How to Find Security Bugs Fast!Parasoft
 
JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...
JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...
JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...terrencebarr
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...IBM Security
 
Sailpoint vs Okta.pdf
Sailpoint vs Okta.pdfSailpoint vs Okta.pdf
Sailpoint vs Okta.pdfVishnuGone
 

Similaire à Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - DOAG2015 (20)

Slidedeck MCS Demo eines Anwendungsfalles - DOAG2015
Slidedeck MCS Demo eines Anwendungsfalles - DOAG2015Slidedeck MCS Demo eines Anwendungsfalles - DOAG2015
Slidedeck MCS Demo eines Anwendungsfalles - DOAG2015
 
Secure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperClusterSecure Multitenancy on Oracle SuperCluster
Secure Multitenancy on Oracle SuperCluster
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Oracle Mobile Cloud Service
Oracle Mobile Cloud ServiceOracle Mobile Cloud Service
Oracle Mobile Cloud Service
 
OOW-CON3656-EA
OOW-CON3656-EAOOW-CON3656-EA
OOW-CON3656-EA
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
 
Let's Talk Mobile
Let's Talk MobileLet's Talk Mobile
Let's Talk Mobile
 
Modern App Development with Oracle Cloud
Modern App Development with Oracle CloudModern App Development with Oracle Cloud
Modern App Development with Oracle Cloud
 
Capgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database SecurityCapgemini technology vision for Oracle Database Security
Capgemini technology vision for Oracle Database Security
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
 
360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security360° Kubernetes Security: From Source Code to K8s Configuration Security
360° Kubernetes Security: From Source Code to K8s Configuration Security
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
SOACS-Overview.pdf
SOACS-Overview.pdfSOACS-Overview.pdf
SOACS-Overview.pdf
 
BUSTED! How to Find Security Bugs Fast!
BUSTED! How to Find Security Bugs Fast!BUSTED! How to Find Security Bugs Fast!
BUSTED! How to Find Security Bugs Fast!
 
Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016Oracle Cloud Café IOT 12 avril 2016
Oracle Cloud Café IOT 12 avril 2016
 
Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016
 
JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...
JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...
JavaOne 2015: CON3434 - Bringing IoT Cloud Services ...
 
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...IBM Security AppExchange Spotlight: Threat Intelligence &  Monitoring Microso...
IBM Security AppExchange Spotlight: Threat Intelligence & Monitoring Microso...
 
Sailpoint vs Okta.pdf
Sailpoint vs Okta.pdfSailpoint vs Okta.pdf
Sailpoint vs Okta.pdf
 

Dernier

Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7Pooja Nehwal
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceanilsa9823
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Niamh verma
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Pooja Nehwal
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...wyqazy
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRnishacall1
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceanilsa9823
 

Dernier (9)

Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Arkansas, AR (310) 882-6330 Bring Back Lost Lover
 
9892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x79892124323 | Book Call Girls in Juhu and escort services 24x7
9892124323 | Book Call Girls in Juhu and escort services 24x7
 
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Saharaganj Lucknow best sexual service
 
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
Chandigarh Call Girls Service ❤️🍑 9115573837 👄🫦Independent Escort Service Cha...
 
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 71 Noida Escorts >༒8448380779 Escort Service
 
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
Call US Pooja 9892124323 ✓Call Girls In Mira Road ( Mumbai ) secure service,
 
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
哪里有卖的《俄亥俄大学学历证书+俄亥俄大学文凭证书+俄亥俄大学学位证书》Q微信741003700《俄亥俄大学学位证书复制》办理俄亥俄大学毕业证成绩单|购买...
 
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCRFULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
FULL ENJOY - 9999218229 Call Girls in {Mahipalpur}| Delhi NCR
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best Night Fun service
 

Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - DOAG2015

  • 1.
  • 2. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Street Warrior. Mobile Sicherheit auf unseren Straße • DOAG2015 • 17. November 2015 Dr. Nadine Schöne Systemberaterin, Oracle
  • 3. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3
  • 4. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Steckbrief 4 Systemberaterin bei Oracle in Potsdam seit 2,5 Jahren Middleware, insbesondere: • Mobile • Cloud Datenbank: Oracle R Enterprise (Datenanalysen) Hintergrund Naturwissenschaftlerin (Biologie, Mathematik, Bioinformatik) @schoenenadine
  • 5. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Agenda Einleitung Mobile Enterprise Architektur Mobile Security Demo Weitere Informationen Q&A 1 2 3 4 5 5 6
  • 7. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Mobile Enterprise Challenges
  • 8. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 8 Enterprise Mobility Challenges Mobile Security Multi OS / Device support Delivery & Organization Challenges Data & Service Integration ON-PREMISE PACKAGED APPLICATIONS CUSTOM APPLICATIONS CLOUD
  • 10. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Beispiel: Mobile Enterprise Architektur Oracle DB User API Gateway DMZ Fachanwendungen Secure: Identity Management Deploy: WebLogic Server Connect: Service Bus Mobile Cloud Service Secure Workspace Mobile Security Manager (MSM)Mobile Apps Mobile Security Access Server MSAS)
  • 12. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Informationssicherheit als Prozess Sicherheitsprozess Initialaktivitäten Laufende Aktivitäten Umsetzungen / Betrieb Prozesse Sicherheitsstrategie Risikomanagement Sicherheitsmgmt. Schutz Informationswerte (Vetraulichkeit, Integrität) Sicherstellung der Verfügbarkeit Disaster Recovery /Business Continuity Planning Monitoring Auditing Bereiche Technisch Physisch Organisatorisch Systeme (HW& OS) Netze Software Daten Build Operate Ablauf Schwachstellenanalyse, Bedrohungsprofil, Risikobewertung, Maßnahmenpriorisierung Risikomanagement Security Policy, Standards & Procedures Sicherheits- organisation Zugriffssicherung, Authentisierung, Kryptographie, PKI, VPN Sicherheitszonen Zugangskontrollen Zutrittsicherungs- syteme Firewalls Netzwerkdesign Clustering Netzwerkmgmt. Virenschutz- management Sichere OS System-Aktualisierung SW-Design Verbindlichkeit Datenklassifik. Datenträger System-performance Monitoring CM Hot-Backup Gebäudesicherheit Personelle Sicherheit Arbeitsplatz Schutz vor Elem- entarereignissen Notfallpläne (Contingency Plans) Intrusion Detection Systems Gebäude-überwachung Videoaufzeichnung Activity Logging Sicherheitsaudits Vulnerability Checks Sicherheitsmanagement Security Vision, Strategie für den Umgang mit unternehmenskritischen Infrastrukturen und Informationswerten Governance HR-Prozesse Betriebl. Praktiken Awareness Training Backup, Backup-Facitilites Logging, Evaluierung, Behandlung von Sicherheitsvorfällen System Recovery
  • 13. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | INFORMATIONSSICHERHEIT als Prozess Sicherheitsprozess Initialaktivitäten Laufende Aktivitäten Umsetzungen / Betrieb Prozesse Sicherheitsstrategie Risikomanagement Sicherheitsmgmt. Schutz Informationswerte (Vetraulichkeit, Integrität) Sicherstellung der Verfügbarkeit Disaster Recovery /Business Continuity Planning Monitoring Auditing Bereiche Technisch Physisch Organisatorisch Systeme (HW& OS) Netze Software Daten Build Operate Ablauf Schwachstellenanalyse, Bedrohungsprofil, Risikobewertung, Maßnahmenpriorisierung Risikomanagement Security Policy, Standards & Procedures Sicherheits- organisation Zugriffssicherung, Authentisierung, Kryptographie, PKI, VPN Sicherheitszonen Zugangskontrollen Zutrittsicherungs- syteme Firewalls Netzwerkdesign Clustering Netzwerkmgmt. Virenschutz- management Sichere OS System-Aktualisierung SW-Design Verbindlichkeit Datenklassifik. Datenträger System-performance Monitoring CM Hot-Backup Gebäudesicherheit Personelle Sicherheit Arbeitsplatz Schutz vor Elem- entarereignissen Notfallpläne (Contingency Plans) Intrusion Detection Systems Gebäude-überwachung Videoaufzeichnung Activity Logging Sicherheitsaudits Vulnerability Checks Sicherheitsmanagement Security Vision, Strategie für den Umgang mit unternehmenskritischen Infrastrukturen und Informationswerten Governance HR-Prozesse Betriebl. Praktiken Awareness Training Backup, Backup-Facitilites Logging, Evaluierung, Behandlung von Sicherheitsvorfällen System Recovery
  • 14. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | MDM and MAM Enterprise Data Enterprise Mobile App Personal Data Personal Mobile App Security Policies Mobile Device Management Mobile Application Management Remote Device Wipe Remote Container Wipe Enterprise Data Enterprise Mobile App Personal Data Personal Mobile App Security Policies Container
  • 15. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Oracle’s Mobile Security Plan Securely Separate And Manage Corporate Apps And Data On Devices Secure Container For App Security And Control Secure Controls And Management For Enterprise Apps Extend IDM Services To Avoid Redundancy And Overlaps  Separate, protect and wipe corporate applications and data  Strict policies to restrict users from viewing/moving data out of container  Consistent support across multiple mobile platforms • Secure communication with enterprise application servers • Corporate app store • Common users, roles, policies, access request, cert etc. • SSO for native and browser apps • Risk/policy based step up and strong authentication
  • 16. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Avoiding silos in access & identity management… (1) Benefits WebSSO Access Management (WAM) Mobile Access Management Mobile App Management, iOS built-in Kerberos
  • 17. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Avoiding silos in access & identity management… (2) Benefits Unified Access Management
  • 18. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 3 steps to secure your app.Containerization c14n -c inject -i Candidate.ipa -o injected.ipa -conf c14n.conf -cert 'iPhone Distribution: Acme Corp Inc.' -p dist.mobileprovision -v Injecting security services ‣ Secure data transport ‣ Authentication ‣ Secure data storage ‣ Data leakage control ‣ Dynamic policy engine yourapp.zip yourapp.ipa 1. Get an unsigned copy of the app. This is typically an unsigned ipa or zip file. We don’t require the source code. 2. Run the Oracle c14n tool. This is a command line tool which is included in Oracle Mobile Security Services. 3. Upload the app (ftp) to your enterprise App Store. This can reside on a file server. The Catalog app to browse the enterprise app store is included in Oracle Mobile Security Services. Access to apps can be controlled via Group membership.
  • 20. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | User Installation des Secure Workspace • Sicherheitszertifikate herunterladen: MSAS und MSM • Installation der Secure Workspace App 20Oracle Confidential – Internal
  • 21. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 21Oracle Confidential – Internal
  • 22. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 22Oracle Confidential – Internal Donwload MSAS Certificate
  • 23. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 23Oracle Confidential – Internal
  • 24. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 24Oracle Confidential – Internal
  • 25. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 25Oracle Confidential – Internal
  • 26. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 26Oracle Confidential – Internal Register MDM Profile
  • 27. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 27Oracle Confidential – Internal
  • 28. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 28Oracle Confidential – Internal
  • 29. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 29Oracle Confidential – Internal
  • 30. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 30Oracle Confidential – Internal
  • 31. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 31Oracle Confidential – Internal
  • 32. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 32Oracle Confidential – Internal
  • 33. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 33Oracle Confidential – Internal
  • 34. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 34Oracle Confidential – Internal
  • 35. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 35Oracle Confidential – Internal VORHER
  • 36. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | User Installation des Secure Workspace • Sicherheitszertifikate herunterladen: MSAS und MSM • Installation der Secure Workspace App 36Oracle Confidential – Internal
  • 37. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | User Erste Nutzung der Secure Workspace App • Erste Konfiguration • Einloggen: Authentifizierung, Challenging Question, Authorisierung • Location • App Katalog 37Oracle Confidential – Internal
  • 38. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 38Oracle Confidential – Internal
  • 39. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 39Oracle Confidential – Internal
  • 40. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 40Oracle Confidential – Internal
  • 41. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 41Oracle Confidential – Internal
  • 42. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 42Oracle Confidential – Internal
  • 43. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 43Oracle Confidential – Internal
  • 44. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 44Oracle Confidential – Internal
  • 45. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 45Oracle Confidential – Internal
  • 46. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 46Oracle Confidential – Internal
  • 47. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 47Oracle Confidential – Internal
  • 48. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | User Erste Nutzung der Secure Workspace App • Erste Konfiguration • Einloggen: Authentifizierung, Challenging Question, Authorisierung • Location • App Katalog 48Oracle Confidential – Internal
  • 49. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Admin Deployment einer App in den App Katalog (Oracle Access Manager) • Laden der App in den App Katalog • App zu Mobile Security Policy hinzufügen 49Oracle Confidential – Internal
  • 50. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 50Oracle Confidential – Internal
  • 51. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 51Oracle Confidential – Internal
  • 52. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 52Oracle Confidential – Internal
  • 53. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 53Oracle Confidential – Internal
  • 54. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 54Oracle Confidential – Internal
  • 55. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Admin Deployment einer App in den App Katalog (Oracle Access Manager) • Laden der App in den App Katalog • App zu Mobile Security Policy hinzufügen 55Oracle Confidential – Internal
  • 56. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 56Oracle Confidential – Internal
  • 57. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 57Oracle Confidential – Internal
  • 58. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 58Oracle Confidential – Internal
  • 59. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 59Oracle Confidential – Internal
  • 60. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 60Oracle Confidential – Internal
  • 61. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 61Oracle Confidential – Internal
  • 62. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 62Oracle Confidential – Internal
  • 63. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 63Oracle Confidential – Internal
  • 64. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 64Oracle Confidential – Internal
  • 65. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 65 Oracle Confidential – Internal
  • 66. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 66Oracle Confidential – Internal
  • 67. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Admin Deployment einer App in den App Katalog (Oracle Access Manager) • Laden der App in den App Katalog • App zu Mobile Security Policy hinzufügen 67Oracle Confidential – Internal
  • 68. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | User Neue App aus App Katalog installieren • App istallieren • App testen – API Gateway 68Oracle Confidential – Internal
  • 69. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 69Oracle Confidential – Internal
  • 70. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 70Oracle Confidential – Internal
  • 71. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 71Oracle Confidential – Internal
  • 72. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 72Oracle Confidential – Internal
  • 73. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 73Oracle Confidential – Internal
  • 74. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 74Oracle Confidential – Internal
  • 75. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 75Oracle Confidential – Internal
  • 76. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 76Oracle Confidential – Internal
  • 77. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 77Oracle Confidential – Internal
  • 78. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 78Oracle Confidential – Internal
  • 79. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | User Neue App aus App Katalog installieren • App istallieren • App testen – API Gateway 79Oracle Confidential – Internal
  • 80. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Admin API Gateway Policy 80Oracle Confidential – Internal
  • 81. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | 81Oracle Confidential – Internal
  • 82. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Zusammenfassung Demo • User: Installation des Secure Workspace • User: Erste Nutzung des Secure Worspace • Admin: Deployment einer App in den App Katalog (incl Security Policy) • User: Neue App aus App Katalog installieren • Admin: Policies im API Gateway 82Oracle Confidential – Internal
  • 84. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Device Platformen Google, Samsung, HTC, LG, ... Surface Windows PhoneIOS
  • 85. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Oracle Mobile Enterprise http://www.oracle.com/us/technologies/mobile/overview/index.html
  • 86. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Social Login Single Sign-On Reporting & Analytics Oracle & 3rd Party Connectors ID Admin & Self Service Strong Authentication Oracle Identity Cloud Services 86 Employees Partners Customers Enables Secure Access by Anyone, from Anywhere, on Any Device Mobile Identity Mobile Application ManagementMobile Device Management Mobile Content Management Multi-channel Application Security Mobile Security Cloud Service
  • 87. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Weitere Vorträge zu Mobile und Security • The Unforgettable. Der nichts vergisst… Rechte- und Rollenprinzipien, Di 13 Uhr, Foyer Tokio • Oracle Cloud Day - Mobile Developers erste Schritte in die Cloud, Di 16 Uhr, Riga • Oracle Cloud Day - Unternehmensweite Mobile Lösung aus der Cloud, Di 15 Uhr, Budapest • Mobile Cloud Service im Einsatz, Di 17 Uhr, Kopenhagen • Without a mobile strategy you don‘t have a strategy, Mi 9 Uhr, Kopenhagen • Go Digital Native – Extending Oracle ADF to Mobile and Cloud, Mi 11 Uhr, Kopenhagen • Integrating calls to Oracle MCS in Oracle MAF applications, Mi 17 Uhr, Kopenhagen • Oracle Mobile Cloud Service: Demo eines Anwendungsfalls, Do 12 Uhr, Riga • Umsetzung von Mobile Security, Do 16 Uhr, Kopenhagen 87 Ohne Anspruch auf Vollständigkeit!
  • 88. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Kontakt Dr. Nadine Schöne| Systemberaterin Email: nadine.schoene@oracle.com Tel: +49 331 200 7190 Oracle Deutschland B.V. & Co. KG Schiffbauergasse 14 14467 Potsdam
  • 89. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | Engage Build IntegrateAnalyze Operate Manage Secure