SlideShare une entreprise Scribd logo
1  sur  21
Télécharger pour lire hors ligne
1   Copyright © 2011, Oracle. Proprietary and Confidential
<Insert Picture Here>




The Imperative for Entitlement-Driven Identity
Management
Normand Sauvé      Security Sales Manager
Carl Potvin        Principal Sales Consultant
The following is intended to outline our general
    product direction. It is intended for information
    purposes only, and may not be incorporated into any
    contract. It is not a commitment to deliver any
    material, code, or functionality, and should not be
    relied upon in making purchasing decisions.
    The development, release, and timing of any
    features or functionality described for Oracle’s
    products remains at the sole discretion of Oracle.




3                 Copyright © 2011, Oracle. Proprietary and Confidential
The Situation


                                                      •  Security breaches are
                                                         proliferating
                                                      •  Compliance costs are
                                                         increasing
                                                            –  40% of IT budget spent on
                                                               compliance
                                                      •  Tougher regulatory
                                                         environment




4                   Copyright © 2011, Oracle. Proprietary and Confidential
The Trend is Set to Continue
    The Root Cause Of All Breaches Is Poor Access Control




       Total # of
       records
       compromised                                                361 M
       by breaches
                                          4M

                                                           •  Social Engineering Attacks
                                                         Hacking for Fame
                                                                   (11% of all breaches)
               < 1M                                            •  Hacking
                                                                   (up 10% from 2010)
                                                               •  Privilege Abuse
                             Hacking for Fun
              Source: Verizon Data Breach Report 2011
                                                                   (17% of all breaches)


              2004                           2009                      2011

       1990              1995              2000              2005               2008
5                               Copyright © 2011, Oracle. Proprietary and Confidential
Current Approach is Fragmented
             Hurts Transparency & Business Agility


                                                                          •  Disconnected Security Policy
                                                                          •  Poor Correlation for Forensics
                                                                          •  Fragmented View of User
                                                                          •  Costly Integration




                                                                          Fragmentation causes Latency
                                                                          •  Removing separated users
                                                                          •  Detecting user job role change
                                                                          •  Restricting data access quickly

    Source: The Value of Corporate Secrets by Forrester Consulting (March 2010)


6                                        Copyright © 2011, Oracle. Proprietary and Confidential
Today We Are Reactive


      Harden Perimeter                    Social Engineering Attacks

      Secure End-Point                    Attacks on Servers

     Invest in Monitoring                 Privileged Account Abuse

             We react...                  But criminals get wiser


           Most traditional security solutions
               get breached eventually


7                 Copyright © 2011, Oracle. Proprietary and Confidential
We Need to Change Our Thinking




         Security should be proactive just like the body’s
               immune system prevents diseases




8                 Copyright © 2011, Oracle. Proprietary and Confidential
Identity Management Has to Evolve

    •  Less Fragmentation
                                                                                           Analytics
    •  Better Visibility
    •  Increased ROI                                                                         Context

                                                                                             Control
                                                           Risk Management
                                                       Audit
                          Administration
              Authentication
       Identity

     Tools           Point Solutions                    Platform                    Intelligence




9                          Copyright © 2011, Oracle. Proprietary and Confidential
Analytics – Actionable Intelligence



                  Report       Certify                                            Acquire       Correlate




                       Remediate                                                            Convert



     Preventive 	

                                             Detective	

     •  Automated certification review                          •  Analysis of who did what
     •  Intelligent risk scoring                                •  Correlation of activities
     •  Workflow based remediation                              •  Anomaly detection




10                                 Copyright © 2011, Oracle. Proprietary and Confidential
Context – Trust but Verify



                        Step up                                                             Step up
                      Authorization                                                       Authorization




              Alert                    Rules                                  Patterns                    Behavior




     Access: Authentication                                        Transactional: Authorization
     •  Location and device aware                                  •  Based on historical behavior
     •  Pattern detection                                          •  Policy based
     •  Predictive analysis                                        •  Knowledge based step up Authorized




11                                    Copyright © 2011, Oracle. Proprietary and Confidential
Control – Continuous and Efficient


          Onboard                 Mine &
                                  Define
                                                                 Declarative Security
     Change     Offboard   Change           Test &
     Access                                 Deploy
                                                                        Externalized Policy

         User Lifecycle          Role Lifecycle
                                                                                 Scalable enforcement



     Administration                                        Entitlements
     •  Role based on boarding/change                      •  Separation of duties
     •  Central view of user access                        •  Central policy enforcement
     •  Immediate de-provisioning                          •  Dynamic RBAC




12                            Copyright © 2011, Oracle. Proprietary and Confidential
An Entitlement-Driven Approach to Identity

            Administer                                                          Synchronize
              Access                                                            Identities



                         Administration                      Access
         Design                                                                       Build
        Controls                                                                      Controls




                                        Entitlement
                                          Driven                                      Monitor
        Analytics                                                                     Controls

                          Intelligence                      Authority


             Automate                                                           Certify
             Reporting                                                          Controls




13                         Copyright © 2011, Oracle. Proprietary and Confidential
An Entitlement-Driven Platform Changes Everything




              Before                                                            After

     An Entitlement-Driven Platform facilitates identity management
                   based on intelligence and context



14                     Copyright © 2011, Oracle. Proprietary and Confidential
The Platform Achieves Harmony


       Security                                     •  Simplified support
       Governor                                     •  Consistent and synchronized
                                                    •  Single source of security policy
      Access                  Enterprise
      Manager
                                                    •  Integrated with Fusion Middleware
                              SSO
                                                    •  Integrated with Fusion Apps
      Adaptive
                             Directory
      Access
                             Services
      Manager


      Entitlements            Enterprise
      Server                  Gateway

      Identity                Identity
      Manager                 Analytics




15                   Copyright © 2011, Oracle. Proprietary and Confidential
The Platform Makes All the Difference
                                                       Benefits                    Oracle IAM Suite Advantage
         Increased End-User
             Productivity                  •  Emergency Access                    •  11% faster
                                           •  End-user Self Service               •  30% faster

             Reduced Risk                  •  Suspend/revoke/de-provision end
                                              user access                         •  46% faster
                                           •  Bullet
           Enhanced Agility                •  Integrate a new app faster with
                                              the IAM infrastructure              •  64% faster
                                           •  Integrate a new end user role       •  73% faster
                                              faster into the solution

         Enhanced Security                 •  Reduces unauthorized access         •  14% fewer
          and Compliance
                                           •  Reduces audit deficiencies          •  35% fewer



         Reduced Total Cost
                                           •  Reduces total cost of IAM
                                                                                  •  48% lower
                                              initiatives


       Source: Aberdeen Group, June 2011




16                                    Copyright © 2011, Oracle. Proprietary and Confidential
Case Study – Schneider National

     BUSINESS CHALLENGE                                            ORACLE SOLUTION

      •  20,000 users scaling up to 65,000 on three                  •  Replace Tivoli Identity Manager with OIM for
         continents in a high availability configuration.               password reset
      •  Systems include OTM (Oracle Transportation                  •  OAM for centralized Authn, Authz and SSO for
         Manager), many eBS modules, Siebel, AD,                        100’s of apps
         Exchange, and several OID’s managing different              •  ORM for corporate RBAC project
         user stores                                                 •  Real time integration of Siebel and eBS identities
      •  Decided to overhaul entire IT infrastructure,                  with OIM
         move away from legacy home grown and
                                                                     •  Provided virtualized single user store from
         packaged applications to support their business
                                                                        disparate populations with OVD
      •  Provide customers self-service access to their
         own accounts                                                •  Enforce least- privilege access through
                                                                        automated provisioning for add, changes, and
      •  Ongoing M&A and divesture activities
                                                                        disables (ORM / OIM)


     RESULTS
      •  Reduce the number of calls to the helpdesk for password reset
      •  Reduce the number of days to on-board users from 5 days to less than 24 hours
      •  Standardize the family of companies on an Identity Management platform reducing costs across the
        enterprise
      •  Reduce the complexity of the RBAC used to provide access to users




17                                    Copyright © 2011, Oracle. Proprietary and Confidential
                                                                                                        17
One Company, One Solution, One Stack
                                    Proven vendor
                                        •  Acquire and retain best of breed technology
                                           and talent
                                        •  Battle-tested for large, mission-critical
                                           applications
                                        •  Referenceable, award-winning customer
                                           deployments
                                    Most complete and integrated best-of-
                                     breed portfolio
                                        •  Service-Oriented Security
                                        •  Interoperable components
                                    Future proof investment
                                        •  Standards-based and hot pluggable for easy
                                           integration
                                        •  Established deployment best practices
                                        •  Large implementation ecosystem




18               Copyright © 2011, Oracle. Proprietary and Confidential
Q&A



19   |   © 2011 Oracle Corporation – Proprietary and Confidential
20   |   © 2011 Oracle Corporation – Proprietary and Confidential
21   |   © 2011 Oracle Corporation – Proprietary and Confidential

Contenu connexe

Tendances

OOW 2009 EBS Security R12
OOW 2009 EBS Security R12OOW 2009 EBS Security R12
OOW 2009 EBS Security R12jucaab
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application SecurityOpSource
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protectionAndrew Wong
 
High Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log ManagerHigh Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log ManagerNovell
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Seema Sheth-Voss
 
Security White Paper
Security White PaperSecurity White Paper
Security White PaperMobiWee
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Symantec APJ
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 PraesentationSophan_Pheng
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introductionerry wardhana
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify PillarEd Wong
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection NetworkAndrew Wong
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentawlegalservices
 
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011IBM Sverige
 
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108Rob Robinson
 
Cyber security assocham
Cyber security assochamCyber security assocham
Cyber security assochamnmrdkoz
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)itforum-roundtable
 
Fighting Fraud With Digital Forensics
Fighting Fraud With Digital ForensicsFighting Fraud With Digital Forensics
Fighting Fraud With Digital ForensicsTOMMY SEAH
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment SystemsDomenico Catalano
 

Tendances (19)

OOW 2009 EBS Security R12
OOW 2009 EBS Security R12OOW 2009 EBS Security R12
OOW 2009 EBS Security R12
 
Strategies for Web Application Security
Strategies for Web Application SecurityStrategies for Web Application Security
Strategies for Web Application Security
 
Trend micro data protection
Trend micro data protectionTrend micro data protection
Trend micro data protection
 
High Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log ManagerHigh Availability and Disaster Recovery with Novell Sentinel Log Manager
High Availability and Disaster Recovery with Novell Sentinel Log Manager
 
Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012Fs isac fico and core presentation10222012
Fs isac fico and core presentation10222012
 
Security White Paper
Security White PaperSecurity White Paper
Security White Paper
 
Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16Internet Security Threat Report (ISTR) Vol. 16
Internet Security Threat Report (ISTR) Vol. 16
 
Cat6500 Praesentation
Cat6500 PraesentationCat6500 Praesentation
Cat6500 Praesentation
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introduction
 
Hp Fortify Pillar
Hp Fortify PillarHp Fortify Pillar
Hp Fortify Pillar
 
Introduction - The Smart Protection Network
Introduction - The Smart Protection NetworkIntroduction - The Smart Protection Network
Introduction - The Smart Protection Network
 
Legal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu FentawLegal Pluralism, Alemayehu Fentaw
Legal Pluralism, Alemayehu Fentaw
 
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
Kostnadseffektiv implementation av er IT-säkerhetsstrategi - PCTY 2011
 
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108Complex Discovery Ethics Efficiency And Economics (Overview) 1108
Complex Discovery Ethics Efficiency And Economics (Overview) 1108
 
Cyber security assocham
Cyber security assochamCyber security assocham
Cyber security assocham
 
Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)Securing the Human (人を守るセキュリティ)
Securing the Human (人を守るセキュリティ)
 
Fighting Fraud With Digital Forensics
Fighting Fraud With Digital ForensicsFighting Fraud With Digital Forensics
Fighting Fraud With Digital Forensics
 
Securing Internet Payment Systems
Securing Internet Payment SystemsSecuring Internet Payment Systems
Securing Internet Payment Systems
 
Data Leakage Prevention
Data Leakage PreventionData Leakage Prevention
Data Leakage Prevention
 

Similaire à Keynote oracle entitlement-driven idm

Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Cana Ko
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud finalOracleIDM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud SecurityIT@Intel
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle BH
 
Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Novell
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Shafaq Abdullah
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Shafaq Abdullah
 
DSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYDSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYAndris Soroka
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009apompliano
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...HyTrust
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 

Similaire à Keynote oracle entitlement-driven idm (20)

Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Best Practices for Cloud Security
Best Practices for Cloud SecurityBest Practices for Cloud Security
Best Practices for Cloud Security
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
Oracle a TBIZ2011
Oracle a TBIZ2011Oracle a TBIZ2011
Oracle a TBIZ2011
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
 
Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...Implementing and Proving Compliance Tactics with Novell Compliance Management...
Implementing and Proving Compliance Tactics with Novell Compliance Management...
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02Zenprise ctia 10-11-2011_v02
Zenprise ctia 10-11-2011_v02
 
DSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFYDSS ITSEC Conference 2012 - CENTRIFY
DSS ITSEC Conference 2012 - CENTRIFY
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
On Demand Cloud Services Coury
On Demand Cloud Services   CouryOn Demand Cloud Services   Coury
On Demand Cloud Services Coury
 
Refense Security Risk Briefing July 2009
Refense   Security Risk Briefing   July 2009Refense   Security Risk Briefing   July 2009
Refense Security Risk Briefing July 2009
 
Presentatie mc afee emm 2011
Presentatie mc afee emm 2011Presentatie mc afee emm 2011
Presentatie mc afee emm 2011
 
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
Virtualize More While Improving Your Cybersecurity Risk Posture - The "4 Must...
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 

Dernier

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Keynote oracle entitlement-driven idm

  • 1. 1 Copyright © 2011, Oracle. Proprietary and Confidential
  • 2. <Insert Picture Here> The Imperative for Entitlement-Driven Identity Management Normand Sauvé Security Sales Manager Carl Potvin Principal Sales Consultant
  • 3. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3 Copyright © 2011, Oracle. Proprietary and Confidential
  • 4. The Situation •  Security breaches are proliferating •  Compliance costs are increasing –  40% of IT budget spent on compliance •  Tougher regulatory environment 4 Copyright © 2011, Oracle. Proprietary and Confidential
  • 5. The Trend is Set to Continue The Root Cause Of All Breaches Is Poor Access Control Total # of records compromised 361 M by breaches 4M •  Social Engineering Attacks Hacking for Fame (11% of all breaches) < 1M •  Hacking (up 10% from 2010) •  Privilege Abuse Hacking for Fun Source: Verizon Data Breach Report 2011 (17% of all breaches) 2004 2009 2011 1990 1995 2000 2005 2008 5 Copyright © 2011, Oracle. Proprietary and Confidential
  • 6. Current Approach is Fragmented Hurts Transparency & Business Agility •  Disconnected Security Policy •  Poor Correlation for Forensics •  Fragmented View of User •  Costly Integration Fragmentation causes Latency •  Removing separated users •  Detecting user job role change •  Restricting data access quickly Source: The Value of Corporate Secrets by Forrester Consulting (March 2010) 6 Copyright © 2011, Oracle. Proprietary and Confidential
  • 7. Today We Are Reactive Harden Perimeter Social Engineering Attacks Secure End-Point Attacks on Servers Invest in Monitoring Privileged Account Abuse We react... But criminals get wiser Most traditional security solutions get breached eventually 7 Copyright © 2011, Oracle. Proprietary and Confidential
  • 8. We Need to Change Our Thinking Security should be proactive just like the body’s immune system prevents diseases 8 Copyright © 2011, Oracle. Proprietary and Confidential
  • 9. Identity Management Has to Evolve •  Less Fragmentation Analytics •  Better Visibility •  Increased ROI Context Control Risk Management Audit Administration Authentication Identity Tools Point Solutions Platform Intelligence 9 Copyright © 2011, Oracle. Proprietary and Confidential
  • 10. Analytics – Actionable Intelligence Report Certify Acquire Correlate Remediate Convert Preventive Detective •  Automated certification review •  Analysis of who did what •  Intelligent risk scoring •  Correlation of activities •  Workflow based remediation •  Anomaly detection 10 Copyright © 2011, Oracle. Proprietary and Confidential
  • 11. Context – Trust but Verify Step up Step up Authorization Authorization Alert Rules Patterns Behavior Access: Authentication Transactional: Authorization •  Location and device aware •  Based on historical behavior •  Pattern detection •  Policy based •  Predictive analysis •  Knowledge based step up Authorized 11 Copyright © 2011, Oracle. Proprietary and Confidential
  • 12. Control – Continuous and Efficient Onboard Mine & Define Declarative Security Change Offboard Change Test & Access Deploy Externalized Policy User Lifecycle Role Lifecycle Scalable enforcement Administration Entitlements •  Role based on boarding/change •  Separation of duties •  Central view of user access •  Central policy enforcement •  Immediate de-provisioning •  Dynamic RBAC 12 Copyright © 2011, Oracle. Proprietary and Confidential
  • 13. An Entitlement-Driven Approach to Identity Administer Synchronize Access Identities Administration Access Design Build Controls Controls Entitlement Driven Monitor Analytics Controls Intelligence Authority Automate Certify Reporting Controls 13 Copyright © 2011, Oracle. Proprietary and Confidential
  • 14. An Entitlement-Driven Platform Changes Everything Before After An Entitlement-Driven Platform facilitates identity management based on intelligence and context 14 Copyright © 2011, Oracle. Proprietary and Confidential
  • 15. The Platform Achieves Harmony Security •  Simplified support Governor •  Consistent and synchronized •  Single source of security policy Access Enterprise Manager •  Integrated with Fusion Middleware SSO •  Integrated with Fusion Apps Adaptive Directory Access Services Manager Entitlements Enterprise Server Gateway Identity Identity Manager Analytics 15 Copyright © 2011, Oracle. Proprietary and Confidential
  • 16. The Platform Makes All the Difference Benefits Oracle IAM Suite Advantage Increased End-User Productivity •  Emergency Access •  11% faster •  End-user Self Service •  30% faster Reduced Risk •  Suspend/revoke/de-provision end user access •  46% faster •  Bullet Enhanced Agility •  Integrate a new app faster with the IAM infrastructure •  64% faster •  Integrate a new end user role •  73% faster faster into the solution Enhanced Security •  Reduces unauthorized access •  14% fewer and Compliance •  Reduces audit deficiencies •  35% fewer Reduced Total Cost •  Reduces total cost of IAM •  48% lower initiatives Source: Aberdeen Group, June 2011 16 Copyright © 2011, Oracle. Proprietary and Confidential
  • 17. Case Study – Schneider National BUSINESS CHALLENGE ORACLE SOLUTION •  20,000 users scaling up to 65,000 on three •  Replace Tivoli Identity Manager with OIM for continents in a high availability configuration. password reset •  Systems include OTM (Oracle Transportation •  OAM for centralized Authn, Authz and SSO for Manager), many eBS modules, Siebel, AD, 100’s of apps Exchange, and several OID’s managing different •  ORM for corporate RBAC project user stores •  Real time integration of Siebel and eBS identities •  Decided to overhaul entire IT infrastructure, with OIM move away from legacy home grown and •  Provided virtualized single user store from packaged applications to support their business disparate populations with OVD •  Provide customers self-service access to their own accounts •  Enforce least- privilege access through automated provisioning for add, changes, and •  Ongoing M&A and divesture activities disables (ORM / OIM) RESULTS •  Reduce the number of calls to the helpdesk for password reset •  Reduce the number of days to on-board users from 5 days to less than 24 hours •  Standardize the family of companies on an Identity Management platform reducing costs across the enterprise •  Reduce the complexity of the RBAC used to provide access to users 17 Copyright © 2011, Oracle. Proprietary and Confidential 17
  • 18. One Company, One Solution, One Stack  Proven vendor •  Acquire and retain best of breed technology and talent •  Battle-tested for large, mission-critical applications •  Referenceable, award-winning customer deployments  Most complete and integrated best-of- breed portfolio •  Service-Oriented Security •  Interoperable components  Future proof investment •  Standards-based and hot pluggable for easy integration •  Established deployment best practices •  Large implementation ecosystem 18 Copyright © 2011, Oracle. Proprietary and Confidential
  • 19. Q&A 19 | © 2011 Oracle Corporation – Proprietary and Confidential
  • 20. 20 | © 2011 Oracle Corporation – Proprietary and Confidential
  • 21. 21 | © 2011 Oracle Corporation – Proprietary and Confidential