SlideShare une entreprise Scribd logo
1  sur  15
<Insert Picture Here>




Scaling Analytics to Thousands of Applications
Naresh Persaud
Director, Identity Management, Oracle
This document is for informational purposes. It is not a commitment
to deliver any material, code, or functionality, and should not be relied
upon in making purchasing decisions. The
development, release, and timing of any features or functionality
described in this document remains at the sole discretion of
Oracle. This document in any form, software or printed
matter, contains proprietary information that is the exclusive property
of Oracle. This document and information contained herein may not
be disclosed, copied, reproduced or distributed to anyone outside
Oracle without prior written consent of Oracle. This document is not
part of your license agreement nor can it be incorporated into any
contractual agreement with Oracle or its subsidiaries or affiliates.
Agenda

• Enterprise Certification Requirements

• The Scale Challenge

• How to Adapt

• Learning Experience
Enterprise Certification Requirements
   Who’s who & what can they do?

  Extract        Review       Correlate      Remediate
Entitlements   Entitlements    Results        Access
   Ad Hoc        Complex      Un-auditable   Non-verifiable
The Challenge is Scale




                         • A Few Administrators
                         • Handful of Help Desk Staff
Organizations Have to Adapt

                      • Optimize The Data ETL
                      • Simplify User Experience
                         • Prioritize Based on Risk
                      • Automate Remediation
                      • Sustainable Role Management
                      • Reduce Audit Findings
Optimize and Streamline ETL Process
   10K Resources
  50K Certs per Campaign   • Focus on Large Scale

250K Business Units        • Quick Extract Transform Load
                           • Flexible Data Mapping
  2M Users
                           • Rolling Data Import
10M Entitlements           • Large Volume Remediation
Simplify User Experience
Easily Available Identity Forensics and Business Views


                                       • Risk Based Reporting
                                       • Historical Data
                                       • Persona Dashboards
                                       • Business Glossary
                                       • Approval Notes
                                       • Delegation
Automate The Remediation

     Entitlement                 • Focus Loop Remediation
                                   Close on Large Scale
       Report
                                 • Quick Extract Desk Volume
                                   Reduce Help Transform Load
                   Entitlement   • Rolling Certifications
                                   Close Loop Reporting
   Auto-             Review
 Remediate                       • Rolling Data Import
                                   Complete Audit Trail
                                 • Large Volume Remediation
                                   Increase Throughput
Sustain With Role Management
     Enterprise Roles

                        • Reduce Workload

       Identity         • Simplify Certification
      Warehouse         • Model Roles
                        • Improve Audits
                        • Accurate Reporting
Reduce Audit Exposure

       User On-
       boarding                   SOD
                                             • Active Conflict Analysis
                                Checking
                                             • Simulation
                  User Access
                    Change
                                             • Risk Aggregation
 User Off-
                                Aggregate
  board
                                Risk Score
                                             • 360 Degree Visibility
                                             • On-going Reconciliation
Identity Management Evolves
              Authoritative ID    Access Via       User Lifecycle In      Certify Access        Monitor
               with Massive      Mobile & Social    Hybrid/Cloud          for Millions of     Behavior &
                   Scale           Channels         Environments             Users &        Detect Improper
                                                                           Entitlements         Access

   Cloud/
   Mobile


 Extranet
                                                                                            Risk Management
                                                                              Audit
Enterprise                                         Administration
                                  Authentication
               Identity

             Tools               Point Solutions                       Platform                 Intelligence
Oracle Identity Management Stack
   Complete, Innovative and Integrated

   Identity Governance                    Access Management                  Directory Services

• Password Management                  • Single Sign-On & Federation    • LDAP Storage
• Self-Service Request & Approval      • Web Services Security          • Virtualized Identity Access
• Roles based User Provisioning        • Authentication & Fraud         • LDAP Synchronization
                                         Prevention
• Analytics, Policy Monitoring                                          • Next Generation (Java) Directory
                                       • Authorization & Entitlements
• Risk-based Access Certification
                                       • Access from Mobile Devices




                                    Platform Security Services
                                    Identity Services for Developers
Platform Reduces Cost vs. Point Solutions
                                                                                       Oracle IAM Suite
                                                        Benefits
                                                                                          Advantage
                                            • Emergency Access                      • 11% faster

48%
                       Increased End-
      Cost Savings    User Productivity
                                            • End-user Self Service                 • 30% faster
                       Reduced Risk         • Suspend/revoke/de-provision
                                                                                    • 46% faster

46%
                                              end user access
      More
      Responsive      Enhanced Agility      • Integrate a new app faster
                                              with the IAM infrastructure           • 64% faster
                                            • Integrate a new end user role         • 73% faster

35%   Fewer Audit
      Deficiencies   Enhanced Security
                      and Compliance
                                              faster into the solution
                                            • Reduces unauthorized access           • 14% fewer
                                            • Reduces audit deficiencies            • 35% fewer
                     Reduced Total Cost     • Reduces total cost of IAM
                                                                                    • 48% lower
                                              initiatives


                              Source: Aberdeen “Analyzing point solutions vs. platform” 2011
Learning Experience

• Scale By Adapting
• Focus on Risk and Benchmark for Scale
• Closed Loop Remediation
• Prevent Exposure

Contenu connexe

Tendances

Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platformOracleIDM
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copyOracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-extOracleIDM
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0debbanerjee
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplifiedvraopolisetti
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingLicensingLive! - SafeNet
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCloudIDSummit
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst WaltherCardinaleWay Mazda
 
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CloudIDSummit
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionFlexera
 

Tendances (17)

Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
The Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based LicensingThe Revolution in Licensing - Cloud-Based Licensing
The Revolution in Licensing - Cloud-Based Licensing
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther2004 10 21 Rbac At Mazda Horst Walther
2004 10 21 Rbac At Mazda Horst Walther
 
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 

En vedette

Настоящий уровень инфляции
Настоящий уровень инфляцииНастоящий уровень инфляции
Настоящий уровень инфляцииalexeykonkov
 
Investment Support Network
Investment Support NetworkInvestment Support Network
Investment Support Networkisn_baku
 
Bronte, hardy
Bronte, hardyBronte, hardy
Bronte, hardyms_faris
 
Compiler design file
Compiler design fileCompiler design file
Compiler design fileUrvashi Tyagi
 
Рынок ипотеки 2011
Рынок ипотеки 2011Рынок ипотеки 2011
Рынок ипотеки 2011МИЭЛЬ
 
Asthma Presentation
Asthma PresentationAsthma Presentation
Asthma PresentationAC Tambago
 
Story board for ancillary
Story board for ancillaryStory board for ancillary
Story board for ancillaryaq101824
 
Gothic, Poe
Gothic, PoeGothic, Poe
Gothic, Poems_faris
 
Маркетинговая программа "Быстрого роста 3+3"
Маркетинговая программа "Быстрого роста 3+3"Маркетинговая программа "Быстрого роста 3+3"
Маркетинговая программа "Быстрого роста 3+3"Елена Шальнова
 
Setting FTP, SSH, NsLookup di linux
Setting FTP, SSH, NsLookup di linuxSetting FTP, SSH, NsLookup di linux
Setting FTP, SSH, NsLookup di linuxRobby Firmansyah
 
Egoera: La Economía de Bizkaia - Junio 2016 - nº23
Egoera: La Economía de Bizkaia - Junio 2016 - nº23Egoera: La Economía de Bizkaia - Junio 2016 - nº23
Egoera: La Economía de Bizkaia - Junio 2016 - nº23Cámara de Comercio de Bilbao
 
RMCC: A RESTful Mobile Cloud Computing Framework for Exploiting Adjacent Serv...
RMCC: A RESTful Mobile Cloud Computing Framework for Exploiting Adjacent Serv...RMCC: A RESTful Mobile Cloud Computing Framework for Exploiting Adjacent Serv...
RMCC: A RESTful Mobile Cloud Computing Framework for Exploiting Adjacent Serv...Saeid Abolfazli
 

En vedette (20)

FOCUS#5
FOCUS#5FOCUS#5
FOCUS#5
 
Настоящий уровень инфляции
Настоящий уровень инфляцииНастоящий уровень инфляции
Настоящий уровень инфляции
 
Investment Support Network
Investment Support NetworkInvestment Support Network
Investment Support Network
 
Bronte, hardy
Bronte, hardyBronte, hardy
Bronte, hardy
 
Compiler design file
Compiler design fileCompiler design file
Compiler design file
 
affTA10 - LampiranB
affTA10 - LampiranBaffTA10 - LampiranB
affTA10 - LampiranB
 
Agenda robert guzman
Agenda robert guzmanAgenda robert guzman
Agenda robert guzman
 
affTA02 - BAB II
affTA02 - BAB IIaffTA02 - BAB II
affTA02 - BAB II
 
Рынок ипотеки 2011
Рынок ипотеки 2011Рынок ипотеки 2011
Рынок ипотеки 2011
 
Asthma Presentation
Asthma PresentationAsthma Presentation
Asthma Presentation
 
Story board for ancillary
Story board for ancillaryStory board for ancillary
Story board for ancillary
 
World I: Module 6
World I: Module 6World I: Module 6
World I: Module 6
 
Gothic, Poe
Gothic, PoeGothic, Poe
Gothic, Poe
 
Маркетинговая программа "Быстрого роста 3+3"
Маркетинговая программа "Быстрого роста 3+3"Маркетинговая программа "Быстрого роста 3+3"
Маркетинговая программа "Быстрого роста 3+3"
 
Setting FTP, SSH, NsLookup di linux
Setting FTP, SSH, NsLookup di linuxSetting FTP, SSH, NsLookup di linux
Setting FTP, SSH, NsLookup di linux
 
Smm поддержка сети магазинов КОСМО
Smm поддержка сети магазинов КОСМОSmm поддержка сети магазинов КОСМО
Smm поддержка сети магазинов КОСМО
 
Ayuda 1 plan matematicas oct 12
Ayuda 1 plan matematicas oct 12Ayuda 1 plan matematicas oct 12
Ayuda 1 plan matematicas oct 12
 
Egoera: La Economía de Bizkaia - Junio 2016 - nº23
Egoera: La Economía de Bizkaia - Junio 2016 - nº23Egoera: La Economía de Bizkaia - Junio 2016 - nº23
Egoera: La Economía de Bizkaia - Junio 2016 - nº23
 
Antonia santos
Antonia santosAntonia santos
Antonia santos
 
RMCC: A RESTful Mobile Cloud Computing Framework for Exploiting Adjacent Serv...
RMCC: A RESTful Mobile Cloud Computing Framework for Exploiting Adjacent Serv...RMCC: A RESTful Mobile Cloud Computing Framework for Exploiting Adjacent Serv...
RMCC: A RESTful Mobile Cloud Computing Framework for Exploiting Adjacent Serv...
 

Similaire à Gartner iam 2011-analytics-aj-orig-recordednp-final

Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2OracleIDM
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle BH
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Infopulse presentation
Infopulse presentation Infopulse presentation
Infopulse presentation HI-TECH_Org_Ua
 
Terremark Intro
Terremark IntroTerremark Intro
Terremark Intromartyburks
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
2013 Enterprise Connect Avaya keynote Kevin Kennedy
2013 Enterprise Connect Avaya keynote Kevin Kennedy2013 Enterprise Connect Avaya keynote Kevin Kennedy
2013 Enterprise Connect Avaya keynote Kevin KennedyAvaya Inc.
 
Introduction to agility
Introduction to agilityIntroduction to agility
Introduction to agilityAVEVA
 
Oracle Application Management Suite
Oracle Application Management SuiteOracle Application Management Suite
Oracle Application Management SuiteOracleVolutionSeries
 
What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0Novell
 
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPTTaking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPTqualisystems
 
Using a private cloud to automate and govern enterprise development
Using a private cloud to automate and govern enterprise developmentUsing a private cloud to automate and govern enterprise development
Using a private cloud to automate and govern enterprise developmentWSO2
 

Similaire à Gartner iam 2011-analytics-aj-orig-recordednp-final (20)

Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Infopulse presentation
Infopulse presentation Infopulse presentation
Infopulse presentation
 
Terremark Intro
Terremark IntroTerremark Intro
Terremark Intro
 
Acuma Introduction
Acuma IntroductionAcuma Introduction
Acuma Introduction
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Oracle Xen Directions June09
Oracle Xen Directions June09Oracle Xen Directions June09
Oracle Xen Directions June09
 
Microsoft Service Manager 2010
Microsoft Service Manager 2010Microsoft Service Manager 2010
Microsoft Service Manager 2010
 
2013 Enterprise Connect Avaya keynote Kevin Kennedy
2013 Enterprise Connect Avaya keynote Kevin Kennedy2013 Enterprise Connect Avaya keynote Kevin Kennedy
2013 Enterprise Connect Avaya keynote Kevin Kennedy
 
Introduction to agility
Introduction to agilityIntroduction to agility
Introduction to agility
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Oracle Application Management Suite
Oracle Application Management SuiteOracle Application Management Suite
Oracle Application Management Suite
 
Dev ops intro
Dev ops  introDev ops  intro
Dev ops intro
 
What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0
 
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPTTaking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
Taking Lab Management to the Next Level - QualiSystems & Testwise in a joint PPT
 
Using a private cloud to automate and govern enterprise development
Using a private cloud to automate and govern enterprise developmentUsing a private cloud to automate and govern enterprise development
Using a private cloud to automate and govern enterprise development
 

Plus de OracleIDM

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 

Plus de OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 

Dernier

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Dernier (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

Gartner iam 2011-analytics-aj-orig-recordednp-final

  • 1. <Insert Picture Here> Scaling Analytics to Thousands of Applications Naresh Persaud Director, Identity Management, Oracle
  • 2. This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.
  • 3. Agenda • Enterprise Certification Requirements • The Scale Challenge • How to Adapt • Learning Experience
  • 4. Enterprise Certification Requirements Who’s who & what can they do? Extract Review Correlate Remediate Entitlements Entitlements Results Access Ad Hoc Complex Un-auditable Non-verifiable
  • 5. The Challenge is Scale • A Few Administrators • Handful of Help Desk Staff
  • 6. Organizations Have to Adapt • Optimize The Data ETL • Simplify User Experience • Prioritize Based on Risk • Automate Remediation • Sustainable Role Management • Reduce Audit Findings
  • 7. Optimize and Streamline ETL Process 10K Resources 50K Certs per Campaign • Focus on Large Scale 250K Business Units • Quick Extract Transform Load • Flexible Data Mapping 2M Users • Rolling Data Import 10M Entitlements • Large Volume Remediation
  • 8. Simplify User Experience Easily Available Identity Forensics and Business Views • Risk Based Reporting • Historical Data • Persona Dashboards • Business Glossary • Approval Notes • Delegation
  • 9. Automate The Remediation Entitlement • Focus Loop Remediation Close on Large Scale Report • Quick Extract Desk Volume Reduce Help Transform Load Entitlement • Rolling Certifications Close Loop Reporting Auto- Review Remediate • Rolling Data Import Complete Audit Trail • Large Volume Remediation Increase Throughput
  • 10. Sustain With Role Management Enterprise Roles • Reduce Workload Identity • Simplify Certification Warehouse • Model Roles • Improve Audits • Accurate Reporting
  • 11. Reduce Audit Exposure User On- boarding SOD • Active Conflict Analysis Checking • Simulation User Access Change • Risk Aggregation User Off- Aggregate board Risk Score • 360 Degree Visibility • On-going Reconciliation
  • 12. Identity Management Evolves Authoritative ID Access Via User Lifecycle In Certify Access Monitor with Massive Mobile & Social Hybrid/Cloud for Millions of Behavior & Scale Channels Environments Users & Detect Improper Entitlements Access Cloud/ Mobile Extranet Risk Management Audit Enterprise Administration Authentication Identity Tools Point Solutions Platform Intelligence
  • 13. Oracle Identity Management Stack Complete, Innovative and Integrated Identity Governance Access Management Directory Services • Password Management • Single Sign-On & Federation • LDAP Storage • Self-Service Request & Approval • Web Services Security • Virtualized Identity Access • Roles based User Provisioning • Authentication & Fraud • LDAP Synchronization Prevention • Analytics, Policy Monitoring • Next Generation (Java) Directory • Authorization & Entitlements • Risk-based Access Certification • Access from Mobile Devices Platform Security Services Identity Services for Developers
  • 14. Platform Reduces Cost vs. Point Solutions Oracle IAM Suite Benefits Advantage • Emergency Access • 11% faster 48% Increased End- Cost Savings User Productivity • End-user Self Service • 30% faster Reduced Risk • Suspend/revoke/de-provision • 46% faster 46% end user access More Responsive Enhanced Agility • Integrate a new app faster with the IAM infrastructure • 64% faster • Integrate a new end user role • 73% faster 35% Fewer Audit Deficiencies Enhanced Security and Compliance faster into the solution • Reduces unauthorized access • 14% fewer • Reduces audit deficiencies • 35% fewer Reduced Total Cost • Reduces total cost of IAM • 48% lower initiatives Source: Aberdeen “Analyzing point solutions vs. platform” 2011
  • 15. Learning Experience • Scale By Adapting • Focus on Risk and Benchmark for Scale • Closed Loop Remediation • Prevent Exposure

Notes de l'éditeur

  1. Overview – So today the process of certifying applications and and managing enterprise roles is largely spreadsheet driven and most companies today are able to manage entitlement certification for a handful of applications but the question everyone is asking is how do we scale to thousands of apps This presentation is about how Oracle can enable businesses to make the process repeatable, sustainable. More importantly orchestrate certification review campaigns and measure progress
  2. Notes:To start with here is the process that companies conduct to perform access certification1. Extract Entitlements– This is typically scripted to pull from a systems like mainframes databases and ERP systems – The challenge is that it is ad-hoc – this process is done by each application owner . Because it is largely human dependent it takes lots of time and is not repeatable 2. Review Entitlements – After these entitlements are extracted into spreadsheets the data gets passes to each manager to certify their direct reports. The spreadsheets are complex and because there is often no built in data dictionary its difficult to understand . Often this is error probe – there have been cases where people have certified users who are no longer with the company.3. Correlate results – After the results are returned a central audit group typically has to take the data and correlate this. Its difficult to figure out historical information etc . And its not auditable 4. Remediate The last step is to fix any audit findings or changes that managers have and typically this is driven by an internal help desk– hard to verify what changes have been made and the delay in making changes makes this prohibitive.
  3. The reason this is challenging is scale The audit requirements are becoming more intrusive Where we were looking at a handful of systems – we need to now look at thousands of systems and applications – If you are an organization that only needed to look at your erp system alone that would be easy but what about your UNIX systems – what about the home grown apps sitting on relational databases Where we were primarily looking at financial apps we are not looking at the extended applications that provide data to the financial apps. In many regulated industries like healthcare and financial services we have the line of business apps to contend with. As we leverage more apps in the cloud the number of total applications that are being scrutinized is increasing At the same time – we have 100’s of thousands of users – because we are letting more people in we have more access to scrutinize At the end of this is millions of entitlements – Many organizations today that have managed access via hierarchical groups and roles have witnessed the role explosion. This feeds the number of entitlements we need to certify
  4. The process of adapting means scaling – and by focusing on the humanly challenging problems and simplifying the user experience we can address the problem.Optimize the ETL – instead of running scripts – we need to have a scheduled automated way of handling this and making it repeatable Simplify the user experience – We need to put our selves in the perspective of the end user and minimize the workload that the end user has to do in-order to finish a review – It has to be risk based … there are thousands of review to do which ones should come first Remediation – it should not sit on a help desk , it should be automatically fixed Aggregate your entitlements into roles – instead of certifying each entitlement we need a a managed way to produce roles which can be certified and change controlled to make sure we don’t get role explosionPreventively reduce the number of audit findings – Which means looking at the user lifecycle to prevent violations from happening – most of these audit violations can be prevented if they were caught in the provisioning cycle
  5. To optimize the process we have benchmarked for scale and looked at the largest deployments To Scale we look at a few things The number of resources, The number of certs per campaign , the number of business units , users and entitlements We have benchmarked these internally and focused on how you make this repeatable on a quarterly basis. This process runs on quarterly or rolling process And being able to remediate all of this in a large volume automatically. All of this produces a warehouse which provides greater intelligence than the ad hoc process we started with
  6. Scale requires prioritization and focus.Simplifying the user experience and providing analytics at their fingertips is another way OIA optimizes the process.Risk based reporting – When access is granted or changed during the provisioning process OIA can aggregate the risk and recognize high risk access rights – at the same time – OIA can recognize excessive access and separation of duties conflicts and flag these circumstances as high risk.Users need historical data – so with OIA – the reviewer can get a complete history of access reviews this makes reviewer’s job easy. Dashboards – To make the process of measuring results easier – we have incorporated dashboards – so that for a department or business unit we get a cumulative progress report for the entire department- Similarly an application owner can view the progress report on a per application basis To provides greater transparency of end users across certification reviews we have incorporated Approval notes to act as a journal across reviews – so the semantics of a decision does not get lost between reviewers Lastly delegation – which allows a manager to delegate the review to another manager of subordinate -
  7. Most of the security risk due to orphaned accounts happen within a couple weeks of employees separating the company. The media is replete with stories of employees who have separated an logged back in to perform malicious activity. Most of this happens within a short time after separation SO automated remediation is critical.We can debate the merit of starting with certification or provisioning and many of our customers start with one or the other – what they will all agree on is that combined provisioning and certification review are critical to a complete solution. In fact these two things reinforce one another. Remediation needs to be closed loop.If we do certification review alone we end up with large help desk volumes which only shifts the workload to the help desk The reporting needs to be closed loop.. We need to be able to assure administrators and managers that the remediation is complete . It has to be integrated.
  8. To make it work – it has to be sustainable – so as we are certifying oracle identity analytics can help build roles which aggregate entitlements to simplify the process and because OIA has a complete role lifecycle process we can avoid the role explosion problem So what OIA does is once we have streamlined the ETL process and the data is loaded into a warehouse – OIA can perform role mining on the warehouse to provide guidance on possible roles. From here the roles can be re-factored and refined. OIA also lets the security group model roles free from and do what if analysis The result is:A more simple certification review process: Because instead of certifying millions of entitlements the manager only has to certify individual roles Improves audit results – because instead of scrutinizing millions of entitlements the auditors can focus on rolesAnd we get better more accurate reporting since the roles tie more closely to job roles – auditors and managers can look at reporting at the role level instead of the system or entitlement level
  9. To reduce the audit exposure OIA is both preventive and detective. OIA combines with OIM so that as privileges are granted OIM can capture a risk score that is visible to OIA – example emergency access increases the risk and the reviewer needs to know that the access was granted temporarily – OIM tracks this and sends to OIA. This is also and example of being preventive.At the same time OIA and OIM combine to check SOD conflicts while access is being granted – so if a conflicting privilege is being selected in OIM the requester can see a form validation error and the system can route the request to a reviewer for approval Additionally – OIA provides 360 degree visibility – instead of looking at reporting on a single application at a time a reviewer gets a complete view of the users access across systems – This allows the reviewer to look at potential risks across several applicationsAnd to provide on-going monitoring OIA provides regular reconciliations to check for changes that are made out of band.
  10. Analytics is part of a larger Identity Value Chain –which drives the compliance and audit lifecycle. In order to be effective The solutions have to move from being a series tools to a platform that provides intelligence and risk management. - At the foundation we have to know who’s who across all of our applications. Providing secure authentication is next typically this is user name and password or strong authentication Slightly more sophisticated is administration because it has to be flexible to handle all of the nuances of moves adds and changes To provide compliance reporting is next in the ladder because this requires intelligence of SOD At the highest level is understanding risk- understanding patterns of behavior so we can step up authentication and authorization – and understanding what access may be risky during a certification review Finally – it has to scale to address the opportunity At the identity level – this means massive scale for numbers of users because we not only have to manage our enterprise users we have to manage our subscribers and customers. NOTE: China mobile has over 600 Million subscribers . Vodaphone in the UK has about 341 million subscribers – If we want to take advantage of opportunities in china we have to more than double our scale. So imagine if you are ATT with 100 million subscribers and you have to merge with T mobile at 34 million subscribers and you have to integrate.The authentication level – The scale is also increasing because of mobile use and social networking – with social networking I am referring to services that allow users to authenticate to get access to applications or data resources via their social networking login. Interesting stat If facebook were a country it would be the 3rd largest with double the population of the US. At the mobile level many customers are building internal application stores to provide applications to their employees. They have to be able to provide single sign on across applications. The administration has to scale to the cloudTo take advantage of the cloud – organizations have to bridge the gap between the security in the enterprise with the security in the cloud. This means delegated administration and managing moves adds and changes directly to the cloud.The audit has to scale Many customers have done their initial projects on certification review – but now need to scale the process to more applications the volume of entitlements is only increasing. Identity management has to evolve to provide
  11. Certification review is one part of a complete Identity and access management strategy. A recent study by Aberdeen of 160 companies world wide found that companies who adopt integrated iAM products from a single vendor as part of a strategy had better economies of scale.They saved 48% over all – were 46% more responsive and had 35% fewer audit deficiencies Read paper:http://www.oracle.com/go/?&amp;Src=7319991&amp;Act=11&amp;pcode=WWMK11053701MPP015