SlideShare a Scribd company logo
1 of 13
<Insert Picture Here>




Keeping Entitlements In Check
Roger Wigenstam, Sr. Director of Product Management, Oracle
VireshGarg, Director Product Management, Oracle
This document is for informational purposes. It is not a commitment
to deliver any material, code, or functionality, and should not be relied
upon in making purchasing decisions. The development, release,
and timing of any features or functionality described in this document
remains at the sole discretion of Oracle. This document in any form,
software or printed matter, contains proprietary information that is the
exclusive property of Oracle. This document and information
contained herein may not be disclosed, copied, reproduced or
distributed to anyone outside Oracle without prior written consent of
Oracle. This document is not part of your license agreement nor can
it be incorporated into any contractual agreement with Oracle or its
subsidiaries or affiliates.
Agenda
         • Application Security

         • Solution Overview

         • Authorization

         • Compliance

         • A Platform Approach
Application Security is Fragmented

   Non-Standard           Brittle           Hardcoded
Entitlement Catalogs   Access Control      Authorization




        Inflexible authorization increases complexity
The Challenge is Scale




 Focused on Reducing Risk
                                   • A Few App Administrators
 Driven to Reduce Cost
 Rolling or Monthly Attestation   • Handful of Audit Staff
Solutions




  Oracle Identity   Oracle Entitlements
    Analytics             Server
The Approach
    Application Security Value Chain


 Define          Access             Monitor          Secure        Audit
 Catalog         Request            Enforce           Data         Certify




 Entitlements    Search          Context          Redact       Risk
 Policies        Provisioning    External Auth    Authorize    Remediation
Enforce and Monitor
 Context and Dynamic Authorization

Audit & Risk                                            Application Owners
                                                           Developers


                          Application Security
                                Platform




               Location                          Time
                                 Device
Oracle Identity Analytics
     Enterprise Roles
                        • Access Certification
                        • Role Modeling
       Identity         • Closed Loop
      Warehouse           Remediation
                        • Business-Friendly
                          Reporting
                        • Risk Aggregation
Platform Reduces Cost vs. Point Solutions
                                                                                      Oracle IAM Suite
                                                      Benefits
                                                                                         Advantage

48%   Cost Savings
                      Increased End-
                     User Productivity

                      Reduced Risk
                                           • Emergency Access
                                           • End-user Self Service
                                                                                   • 11% faster
                                                                                   • 30% faster
                                           • Suspend/revoke/de-
                                                                                   • 46% faster

46%   More
      Responsive     Enhanced Agility
                                             provision end user access
                                           • Integrate a new app faster
                                             with the IAM infrastructure           • 64% faster
                                           • Integrate a new end user              • 73% faster
35%   Fewer Audit
      Deficiencies
                        Enhanced
                                             role faster into the solution
                                           • Reduces unauthorized
                                                                                   • 14% fewer
                       Security and          access
                       Compliance                                                  • 35% fewer
                                           • Reduces audit deficiencies
                      Reduced Total        • Reduces total cost of IAM
                                                                                   • 48% lower
                          Cost               initiatives
                             Source: Aberdeen “Analyzing point solutions vs. platform” 2011
Why Oracle ?

• Complete, Open and Integrated

• Actionable Compliance

• Massively Scalable

• Platform Synergies

• Customer References
On-Demand Webcast Series
Customers Discussing Results of Platform Approach


    Building a Secure Cloud                     Cisco’s Platform Approach
    SaskTel                                     Cisco Systems




    Platform for Compliance                      Platform Best Practices
    ING Bank                                     Agilent Technologies



           Register To Watch at: www.oracle.com/identity
www.oracle.com/Identity


www.facebook.com/OracleIDM
www.twitter.com/OracleIDM


blogs.oracle.com/OracleIDM

More Related Content

What's hot

Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
OracleIDM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
OracleIDM
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
OracleIDM
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
OracleIDM
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
OracleIDM
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
OracleIDM
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
OracleIDM
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
debbanerjee
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
vraopolisetti
 
Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2
OracleIDM
 

What's hot (17)

Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
 
Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 

Viewers also liked

Секреция в ЖКТ и её регуляция
Секреция в ЖКТ и её регуляцияСекреция в ЖКТ и её регуляция
Секреция в ЖКТ и её регуляция
crasgmu
 
5 Things You Should Not Share In Office
5 Things You Should Not Share In Office5 Things You Should Not Share In Office
5 Things You Should Not Share In Office
Rashi Gupta
 
Science Eportfolio Powerpoint
Science Eportfolio PowerpointScience Eportfolio Powerpoint
Science Eportfolio Powerpoint
limmervin24
 
«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»
«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»
«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»
Татьяна Казанцева
 
Outland res. brochure 6 30-11 brown
Outland res. brochure 6 30-11 brownOutland res. brochure 6 30-11 brown
Outland res. brochure 6 30-11 brown
Jessica Luth
 
Gemaco Kerstfolder 2011
Gemaco Kerstfolder 2011Gemaco Kerstfolder 2011
Gemaco Kerstfolder 2011
Tom Vandeneede
 
Present
PresentPresent
Present
lesnoy
 
Кардиотонические средства
Кардиотонические средстваКардиотонические средства
Кардиотонические средства
crasgmu
 
Colors scramble 2
Colors scramble 2Colors scramble 2
Colors scramble 2
Les Davy
 
5 books for your business understanBooks
5 books for your business understanBooks5 books for your business understanBooks
5 books for your business understanBooks
Haridas Patel
 

Viewers also liked (20)

Секреция в ЖКТ и её регуляция
Секреция в ЖКТ и её регуляцияСекреция в ЖКТ и её регуляция
Секреция в ЖКТ и её регуляция
 
5 Things You Should Not Share In Office
5 Things You Should Not Share In Office5 Things You Should Not Share In Office
5 Things You Should Not Share In Office
 
Science Eportfolio Powerpoint
Science Eportfolio PowerpointScience Eportfolio Powerpoint
Science Eportfolio Powerpoint
 
Sangue
SangueSangue
Sangue
 
«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»
«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»
«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»
 
Evo Brochure
Evo BrochureEvo Brochure
Evo Brochure
 
Speeches
SpeechesSpeeches
Speeches
 
Outland res. brochure 6 30-11 brown
Outland res. brochure 6 30-11 brownOutland res. brochure 6 30-11 brown
Outland res. brochure 6 30-11 brown
 
Gemaco Kerstfolder 2011
Gemaco Kerstfolder 2011Gemaco Kerstfolder 2011
Gemaco Kerstfolder 2011
 
Cacciatore: Läpinäkyviä, näkymättömiä, vaikeita? Pojan kriisin huomaaminen ja...
Cacciatore: Läpinäkyviä, näkymättömiä, vaikeita? Pojan kriisin huomaaminen ja...Cacciatore: Läpinäkyviä, näkymättömiä, vaikeita? Pojan kriisin huomaaminen ja...
Cacciatore: Läpinäkyviä, näkymättömiä, vaikeita? Pojan kriisin huomaaminen ja...
 
Slide 1
Slide  1Slide  1
Slide 1
 
D 151120 4_u_source_product_v062 kopie
D 151120 4_u_source_product_v062 kopieD 151120 4_u_source_product_v062 kopie
D 151120 4_u_source_product_v062 kopie
 
философия возраста
философия возрастафилософия возраста
философия возраста
 
Present
PresentPresent
Present
 
Кардиотонические средства
Кардиотонические средстваКардиотонические средства
Кардиотонические средства
 
Unit 57 terminology becky doyle
Unit 57 terminology becky doyleUnit 57 terminology becky doyle
Unit 57 terminology becky doyle
 
Colors scramble 2
Colors scramble 2Colors scramble 2
Colors scramble 2
 
5 books for your business understanBooks
5 books for your business understanBooks5 books for your business understanBooks
5 books for your business understanBooks
 
Androides y Mazmorras. Part I (dungeons & robots)
Androides y Mazmorras. Part I (dungeons & robots)Androides y Mazmorras. Part I (dungeons & robots)
Androides y Mazmorras. Part I (dungeons & robots)
 
Intel open stack v1
Intel open stack v1Intel open stack v1
Intel open stack v1
 

Similar to Ioug webcast entitlements in check

Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
OracleIDM
 
Terremark Intro
Terremark IntroTerremark Intro
Terremark Intro
martyburks
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
ruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
ruiruitang
 
Oss Bss Testing
Oss Bss TestingOss Bss Testing
Oss Bss Testing
Ahmed Adel
 
Fortify On Demand and ShadowLabs
Fortify On Demand and ShadowLabsFortify On Demand and ShadowLabs
Fortify On Demand and ShadowLabs
jasonhaddix
 
Dvsl enterprise solutions.v1
Dvsl enterprise solutions.v1Dvsl enterprise solutions.v1
Dvsl enterprise solutions.v1
dejavusolutions
 
How to bake in quality in agile scrum projects
How to bake in quality in agile scrum projectsHow to bake in quality in agile scrum projects
How to bake in quality in agile scrum projects
Santanu Bhattacharya
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
OracleIDM
 

Similar to Ioug webcast entitlements in check (20)

Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Terremark Intro
Terremark IntroTerremark Intro
Terremark Intro
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Oss Bss Testing
Oss Bss TestingOss Bss Testing
Oss Bss Testing
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Fortify On Demand and ShadowLabs
Fortify On Demand and ShadowLabsFortify On Demand and ShadowLabs
Fortify On Demand and ShadowLabs
 
Dvsl enterprise solutions.v1
Dvsl enterprise solutions.v1Dvsl enterprise solutions.v1
Dvsl enterprise solutions.v1
 
How to bake in quality in agile scrum projects
How to bake in quality in agile scrum projectsHow to bake in quality in agile scrum projects
How to bake in quality in agile scrum projects
 
Collaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an IntroductionCollaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an Introduction
 
Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...
Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...
Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...
 
Hexaware QATS Capabilities 2012
Hexaware QATS Capabilities 2012Hexaware QATS Capabilities 2012
Hexaware QATS Capabilities 2012
 
What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0
 
Infopulse presentation
Infopulse presentation Infopulse presentation
Infopulse presentation
 
ANIn Ahmedabad Jul 2023 |Waterfall & Agile- The Mindset in building scalable ...
ANIn Ahmedabad Jul 2023 |Waterfall & Agile- The Mindset in building scalable ...ANIn Ahmedabad Jul 2023 |Waterfall & Agile- The Mindset in building scalable ...
ANIn Ahmedabad Jul 2023 |Waterfall & Agile- The Mindset in building scalable ...
 
Microsoft Service Manager 2010
Microsoft Service Manager 2010Microsoft Service Manager 2010
Microsoft Service Manager 2010
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
 

More from OracleIDM

Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
OracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
OracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 

More from OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Ioug webcast entitlements in check

  • 1. <Insert Picture Here> Keeping Entitlements In Check Roger Wigenstam, Sr. Director of Product Management, Oracle VireshGarg, Director Product Management, Oracle
  • 2. This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.
  • 3. Agenda • Application Security • Solution Overview • Authorization • Compliance • A Platform Approach
  • 4. Application Security is Fragmented Non-Standard Brittle Hardcoded Entitlement Catalogs Access Control Authorization Inflexible authorization increases complexity
  • 5. The Challenge is Scale  Focused on Reducing Risk • A Few App Administrators  Driven to Reduce Cost  Rolling or Monthly Attestation • Handful of Audit Staff
  • 6. Solutions Oracle Identity Oracle Entitlements Analytics Server
  • 7. The Approach Application Security Value Chain Define Access Monitor Secure Audit Catalog Request Enforce Data Certify  Entitlements  Search  Context  Redact  Risk  Policies  Provisioning  External Auth  Authorize  Remediation
  • 8. Enforce and Monitor Context and Dynamic Authorization Audit & Risk Application Owners Developers Application Security Platform Location Time Device
  • 9. Oracle Identity Analytics Enterprise Roles • Access Certification • Role Modeling Identity • Closed Loop Warehouse Remediation • Business-Friendly Reporting • Risk Aggregation
  • 10. Platform Reduces Cost vs. Point Solutions Oracle IAM Suite Benefits Advantage 48% Cost Savings Increased End- User Productivity Reduced Risk • Emergency Access • End-user Self Service • 11% faster • 30% faster • Suspend/revoke/de- • 46% faster 46% More Responsive Enhanced Agility provision end user access • Integrate a new app faster with the IAM infrastructure • 64% faster • Integrate a new end user • 73% faster 35% Fewer Audit Deficiencies Enhanced role faster into the solution • Reduces unauthorized • 14% fewer Security and access Compliance • 35% fewer • Reduces audit deficiencies Reduced Total • Reduces total cost of IAM • 48% lower Cost initiatives Source: Aberdeen “Analyzing point solutions vs. platform” 2011
  • 11. Why Oracle ? • Complete, Open and Integrated • Actionable Compliance • Massively Scalable • Platform Synergies • Customer References
  • 12. On-Demand Webcast Series Customers Discussing Results of Platform Approach Building a Secure Cloud Cisco’s Platform Approach SaskTel Cisco Systems Platform for Compliance Platform Best Practices ING Bank Agilent Technologies Register To Watch at: www.oracle.com/identity

Editor's Notes

  1. Questions For Roger:0. roger – we use the word entitlements a lot – can you provide a definition ?Roger – Since you started your career developing Ebusiness security .. Set some context around what we mean by by application security ?Roger - When we say brittle access control what do we mean ?Roger – Can you provide some real world customer examples where this problem is happening perhaps from a couple verticals ?What’s changing that’s forcing customers to re-evaluate the way they secure apps ?( Hard coded business logic in one app – with thousands of apps )
  2. Questions for VireshViresh - Now you are focused on governance and compliance – provide an overview ?Viresh - How are customers dealing with the problem today ?Viresh – speaking of scale can you discuss some of the highest scaling metrics?Viresh – can you provide some specific customer examples ?
  3. So today Oracle’s answer to this problem is two product offerings Viresh – Can you provide an overview of Oracle Identity Analytics ?Viresh – What are some of the suite level integrations with Analytics ?Viresh - Can you describe how an organization get started with Analytics what’s involved in using the product ?Viresh – what types of apps are customers deploying analytics on first ?Roger – Can you provide an overview of Oracle entitlements server ?Roger – Can you discuss how oracle is applying Entitlements server to next gen fusion apps and fusion middleware?Roger – what are some of the main use cases Roger – How can a customer get started Roger – do these solutions only apply to the oracle stack or other apps as well.
  4. Roger – Can you walk us through the chain.
  5. Roger questions:Roger focusing on OES can you discuss how this operationally fits into an environment ?How are policies defined and how are they consumed ?Roger What systems does it connect to and what are the components that must be deployed ? What is configuration vs custom ?Roger Can you discuss how auditors use OES ? Roger - focusing on scale – can you share some scale data points ?Roger – can you talk about context aware security ?
  6. Question for Neil-Talk to us about some of the benefits of leveraging OIA. Can you define what we mean by enterprise roles ?What does it mean to mine roles and what is involved ?What is the lifecycle of a role ?How does OIA handle risk ?What do we mean by closed loop ?What are the most important forensics that customers use ?
  7. Roger:I know platform is very important to you can you describe what we mean by platform security services ?Can you talk about what components make up the oracle Identity platform ? -
  8. Viresh why is the combination of these two solutions so powerful describe the synergies ?Viresh – where can a customer download the products or read more.
  9. As mentioned before you have a unique opportunity to learn from and get questions answered by our customers. There are on demand webcasts that are available today at oracle.com/identity. SaskTel discussed how they are leveraging Oracle IDM to offer cloud based services to their customersCisco discussed their unique approach to consolidate their identity program into a platform ING Bank - discussed how a platform with integrated administration and governance reduced cost and improved compliance
  10. Join The Community