SlideShare une entreprise Scribd logo
1  sur  24
1Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
2
CON8808: Enabling Business Growth
in The New Economy
Sept 23rd 2013
Amit Jasuja
Senior Vice President
Identity Management & Security, Oracle
3Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
SECURE MOBILE ACCESS
REQUEST AND SECURE
ACCESS TO A MOBILE
DEVICE, EVEN IF IT’S NOT
YOURS
4Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
HOW WE DID IT
5Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Access SSO Portal via Safari
iPad SSO
Portal
Access
portal &
enter
credentials
Oracle Access
Management
Download & Install Secure Container
Secure Container
Application
ACQUIRE SECURE
CONTAINER APPLICATION
Validate
Credentials
Click to
Download
Container
6Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
ENTERING
THE ONE TIME
PASSWORD
Unknown Device Detected
iPad
Step up authentication required
iPhone Fraud Detection
Enter
User
Credentials
Click to
Generate
Soft Token
Generate
Soft Token
(OTP)
Device
Registered &
Container
Secured
Identity Management
for Mobile
Enter
Soft Token
7Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
ACCESSING CORPORATE
APPLICATIONS AND DATA
Secure Access
(Oracle MAM)
Corporate
Fileshare
iPad
File view: allowed
Travel App
White
Pages
STOP
File save: denied
(Oracle MAM Policy)
Simple
SSO
Cloud
SSO
Kerberos
AuthN with
AD
8Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
SINEESH KESHAV
VP OF APPLICATION DEVELOPMENT
SAFEWAY, INC.
9Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
SECURE PRIVILEGED ACCESS
PUTTING THE PROPER
CONROLS IN PLACE
REDUCES YOUR RISK
10Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
HOW WE DID IT
AGAIN
11Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
REQUESTING
PRIVILEGED
ACCESS
Demo
Laptop
Demo
Server
Oracle
Identity
Governance
Session
Manager
Request Privileged Access to Demo Server
Approval via
smartphone
Approval workflow
12Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
EXECUTING
PRIVILEGED
COMMANDS
Demo
Laptop
Demo
Server
Oracle
Identity
Governance
Session
Manager
Sending startup command
Command executed on
Demo Server
Command
recorded in
Session Log
13Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
REVIEWING THE
PRIVILEGED
ACCESS
Demo
Laptop
Oracle
Identity
Governance
Session
Manager
Access checkout history report
Session Logs
14Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
COMPLETE IDENTITY GOVERNANCE
UNIFIED SOLUTION FOR
CERTIFICATION OF USER
AND DATA ACCESS
15Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
HOW WE DID IT
AGAIN
16Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Laptop
Log into Identity Governance Console
APPS
Content
Repository
APPSAPPSAPPS
Common Data Model
-- Users
-- Roles
-- Entitlements
-- Data
CERTIFYING
ACCESS
- Review file metadata (sensitivity,
content classification)
- Review direct reports access privileges to
highly sensitive document
- Review direct reports access history
17Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
DOM FEDRONIC
SR. BUSINESS LEADER IDENTITY & ACCESS
VISA
18Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
COMPLETE IDENTITY MANAGEMENT
SIMPLIFIED IDENTITY
GOVERNANCE
INTEGRATED PLATFORM
COMPLETE ACCESS
MANAGEMENT
With self service for
regular and
privileged accounts
Supporting mobile,
social and cloud
Rationalized
architecture for
scalability and security
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.19
Worldwide Adoption
900+ 50+ 100M+ 1.5M+
DEPLOYMENTS
ON 11g R2
PARTNERS
TRAINED
IDENTITIES
MANAGED
MOBILE
DEVICES
20Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
TRANSFORMING THE BUSINESS
SECURELY USE ANY DEVICE
PROFILE BASED ACCESS
AUTOMATION FOR SPEED AND SECURITY
MONITORING FOR CONTROL
21Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Oracle Fusion Middleware
Business Innovation Platform for the Enterprise and Cloud
 Complete and Integrated
 Best-in-class
 Open standards
 On-premise and Cloud
 Foundation for Oracle Fusion
Applications and Oracle Cloud
User Engagement
Identity Management
Business Process
Management
Content
Management
Business
Intelligence
Service Integration Data Integration
Development
Tools
Cloud Application
Foundation
Enterprise
Management
Web Social Mobile
22Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Innovation Awards
Lam Research Theater (Next to Moscone North)
Session ID: CON8082
Session Title: Oracle Fusion Middleware: Meet This
Year’s Most Impressive Innovators
Venue / Room: YBCA - Lam Research Theater
Date and Time: Monday Sep 23, 4:45 - 5:45 p.m.
18 Winners Across Eight Categories
23Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
GET MORE INFORMATION AT OUR SESSIONS
Context- and Risk-Aware Access Control: Any Device Anywhere
Manish Gulati, MITRE, Ranjan Jain, Cisco Systems Inc
Ashish Kolli, Oracle, Svetlana Kolomeyskaya, Oracle
Monday 4:45 PM - 5:45 PM Moscone West - 2018 CON8819
Securely Enabling Mobile Access for Business Transformation
Verizon Wireless, Ministry of National Education
Lee Howarth, Oracle, Ajay Sondhi, Oracle
Tuesday 12:00 PM - 1:00 PM Moscone West - 2018 CON8896
Securing Privileged Accounts with an Integrated Identity Management
Solution
Michael Laramie, Oracle, Olaf Stullich, Oracle, James Taylor, Oracle
Wednesday 3:30 PM - 4:30 PM Moscone West - 2018 CON8813
24Copyright © 2013, Oracle and/or its affiliates. All rights reserved.

Contenu connexe

Tendances

Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009Dira Sabrina
 
Securing your Applications for the Cloud Age
Securing your Applications for the Cloud AgeSecuring your Applications for the Cloud Age
Securing your Applications for the Cloud AgeArtur Alves
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oesOracleIDM
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingTroy Kitch
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
CIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCraig Wu
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Ping Identity
 
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...GregOracle
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Ping Identity
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CloudIDSummit
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraLuca Martelli
 
The New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraThe New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraForgeRock
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!Mike Schwartz
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Eve Maler
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 

Tendances (20)

Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009
 
Securing your Applications for the Cloud Age
Securing your Applications for the Cloud AgeSecuring your Applications for the Cloud Age
Securing your Applications for the Cloud Age
 
Declarative security-oes
Declarative security-oesDeclarative security-oes
Declarative security-oes
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
PCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security MappingPCI DSS v 3.0 and Oracle Security Mapping
PCI DSS v 3.0 and Oracle Security Mapping
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
CIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity Chalktalk
 
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
 
The New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT EraThe New Venn of Access Control in the API-Mobile-IOT Era
The New Venn of Access Control in the API-Mobile-IOT Era
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
RSA Conference 2016: Don't Use Two-Factor Authentication... Unless You Need It!
 
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 

En vedette

D 151120 4_u_source_product_v062 kopie
D 151120 4_u_source_product_v062 kopieD 151120 4_u_source_product_v062 kopie
D 151120 4_u_source_product_v062 kopiehelmuth zimmermann
 
MongoDB em producao
MongoDB em producaoMongoDB em producao
MongoDB em producaoAndre Ferraz
 
Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...
Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...
Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...futureagricultures
 
Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2jmori1
 
10 species of dinosaur from Romania
10 species of dinosaur from Romania10 species of dinosaur from Romania
10 species of dinosaur from Romaniabalada65
 
MBA724 s6 w1 experimental design
MBA724 s6 w1 experimental designMBA724 s6 w1 experimental design
MBA724 s6 w1 experimental designRachel Chung
 
Lesson 3 - HTML & CSS Part 2
Lesson 3 - HTML & CSS Part 2Lesson 3 - HTML & CSS Part 2
Lesson 3 - HTML & CSS Part 2hstryk
 
Ehr training 03_history_(2013_07_14)
Ehr training 03_history_(2013_07_14)Ehr training 03_history_(2013_07_14)
Ehr training 03_history_(2013_07_14)mpryor4452
 
20 Famous Sopts
20 Famous Sopts20 Famous Sopts
20 Famous Soptshome based
 
Exposicion redes sociales y buscadores
Exposicion redes sociales y buscadoresExposicion redes sociales y buscadores
Exposicion redes sociales y buscadoresSaida Lopez
 
Link Building With Twitter
Link Building With TwitterLink Building With Twitter
Link Building With TwitterAman Talwar
 

En vedette (20)

S t o r y b o a r d
S t o r y b o a r dS t o r y b o a r d
S t o r y b o a r d
 
D 151120 4_u_source_product_v062 kopie
D 151120 4_u_source_product_v062 kopieD 151120 4_u_source_product_v062 kopie
D 151120 4_u_source_product_v062 kopie
 
MongoDB em producao
MongoDB em producaoMongoDB em producao
MongoDB em producao
 
Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...
Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...
Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...
 
Gao report
Gao reportGao report
Gao report
 
Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2Definition of Matter Lab + Phase Change- Day 2
Definition of Matter Lab + Phase Change- Day 2
 
10 species of dinosaur from Romania
10 species of dinosaur from Romania10 species of dinosaur from Romania
10 species of dinosaur from Romania
 
Developing Modular Systems using OSGi
Developing Modular Systems using OSGiDeveloping Modular Systems using OSGi
Developing Modular Systems using OSGi
 
MBA724 s6 w1 experimental design
MBA724 s6 w1 experimental designMBA724 s6 w1 experimental design
MBA724 s6 w1 experimental design
 
Lesson 3 - HTML & CSS Part 2
Lesson 3 - HTML & CSS Part 2Lesson 3 - HTML & CSS Part 2
Lesson 3 - HTML & CSS Part 2
 
บทที่ 11
บทที่ 11บทที่ 11
บทที่ 11
 
use WACS;
use WACS;use WACS;
use WACS;
 
Ehr training 03_history_(2013_07_14)
Ehr training 03_history_(2013_07_14)Ehr training 03_history_(2013_07_14)
Ehr training 03_history_(2013_07_14)
 
20 Famous Sopts
20 Famous Sopts20 Famous Sopts
20 Famous Sopts
 
Results
ResultsResults
Results
 
Manal p.
Manal p.Manal p.
Manal p.
 
อติมา อุ่นจิตร
อติมา  อุ่นจิตรอติมา  อุ่นจิตร
อติมา อุ่นจิตร
 
Exposicion redes sociales y buscadores
Exposicion redes sociales y buscadoresExposicion redes sociales y buscadores
Exposicion redes sociales y buscadores
 
W.cholamjiak
W.cholamjiakW.cholamjiak
W.cholamjiak
 
Link Building With Twitter
Link Building With TwitterLink Building With Twitter
Link Building With Twitter
 

Similaire à Con8808 enabling business growth in the new economy final

Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Securing Mobile Device Access
Securing Mobile Device AccessSecuring Mobile Device Access
Securing Mobile Device AccessArtur Alves
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Oracle
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation Delivery Centric
 
Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cSecurity Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cTroy Kitch
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesNowSecure
 
Oracle E-Business Suitre mobile apps ADF
Oracle E-Business Suitre mobile apps ADFOracle E-Business Suitre mobile apps ADF
Oracle E-Business Suitre mobile apps ADFBerry Clemens
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 
Multichannel Service Delivery
Multichannel Service DeliveryMultichannel Service Delivery
Multichannel Service Deliveryharishdh
 
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfPpt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfMelody Liu
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Oracle
 
FulcrumWay Webinar - Fusion Security
FulcrumWay Webinar - Fusion SecurityFulcrumWay Webinar - Fusion Security
FulcrumWay Webinar - Fusion Securityactjax
 
206570 primavera and the fusion stack
206570 primavera and the fusion stack206570 primavera and the fusion stack
206570 primavera and the fusion stackp6academy
 

Similaire à Con8808 enabling business growth in the new economy final (20)

Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Securing Mobile Device Access
Securing Mobile Device AccessSecuring Mobile Device Access
Securing Mobile Device Access
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cSecurity Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12c
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
 
Oracle E-Business Suitre mobile apps ADF
Oracle E-Business Suitre mobile apps ADFOracle E-Business Suitre mobile apps ADF
Oracle E-Business Suitre mobile apps ADF
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
Multichannel Service Delivery
Multichannel Service DeliveryMultichannel Service Delivery
Multichannel Service Delivery
 
Oracle 360
Oracle 360Oracle 360
Oracle 360
 
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdfPpt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
FulcrumWay Webinar - Fusion Security
FulcrumWay Webinar - Fusion SecurityFulcrumWay Webinar - Fusion Security
FulcrumWay Webinar - Fusion Security
 
206570 primavera and the fusion stack
206570 primavera and the fusion stack206570 primavera and the fusion stack
206570 primavera and the fusion stack
 

Plus de OracleIDM

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12OracleIDM
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2OracleIDM
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerOracleIDM
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2OracleIDM
 

Plus de OracleIDM (16)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 

Dernier

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Dernier (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

Con8808 enabling business growth in the new economy final

  • 1. 1Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
  • 2. 2 CON8808: Enabling Business Growth in The New Economy Sept 23rd 2013 Amit Jasuja Senior Vice President Identity Management & Security, Oracle
  • 3. 3Copyright © 2013, Oracle and/or its affiliates. All rights reserved. SECURE MOBILE ACCESS REQUEST AND SECURE ACCESS TO A MOBILE DEVICE, EVEN IF IT’S NOT YOURS
  • 4. 4Copyright © 2013, Oracle and/or its affiliates. All rights reserved. HOW WE DID IT
  • 5. 5Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Access SSO Portal via Safari iPad SSO Portal Access portal & enter credentials Oracle Access Management Download & Install Secure Container Secure Container Application ACQUIRE SECURE CONTAINER APPLICATION Validate Credentials Click to Download Container
  • 6. 6Copyright © 2013, Oracle and/or its affiliates. All rights reserved. ENTERING THE ONE TIME PASSWORD Unknown Device Detected iPad Step up authentication required iPhone Fraud Detection Enter User Credentials Click to Generate Soft Token Generate Soft Token (OTP) Device Registered & Container Secured Identity Management for Mobile Enter Soft Token
  • 7. 7Copyright © 2013, Oracle and/or its affiliates. All rights reserved. ACCESSING CORPORATE APPLICATIONS AND DATA Secure Access (Oracle MAM) Corporate Fileshare iPad File view: allowed Travel App White Pages STOP File save: denied (Oracle MAM Policy) Simple SSO Cloud SSO Kerberos AuthN with AD
  • 8. 8Copyright © 2013, Oracle and/or its affiliates. All rights reserved. SINEESH KESHAV VP OF APPLICATION DEVELOPMENT SAFEWAY, INC.
  • 9. 9Copyright © 2013, Oracle and/or its affiliates. All rights reserved. SECURE PRIVILEGED ACCESS PUTTING THE PROPER CONROLS IN PLACE REDUCES YOUR RISK
  • 10. 10Copyright © 2013, Oracle and/or its affiliates. All rights reserved. HOW WE DID IT AGAIN
  • 11. 11Copyright © 2013, Oracle and/or its affiliates. All rights reserved. REQUESTING PRIVILEGED ACCESS Demo Laptop Demo Server Oracle Identity Governance Session Manager Request Privileged Access to Demo Server Approval via smartphone Approval workflow
  • 12. 12Copyright © 2013, Oracle and/or its affiliates. All rights reserved. EXECUTING PRIVILEGED COMMANDS Demo Laptop Demo Server Oracle Identity Governance Session Manager Sending startup command Command executed on Demo Server Command recorded in Session Log
  • 13. 13Copyright © 2013, Oracle and/or its affiliates. All rights reserved. REVIEWING THE PRIVILEGED ACCESS Demo Laptop Oracle Identity Governance Session Manager Access checkout history report Session Logs
  • 14. 14Copyright © 2013, Oracle and/or its affiliates. All rights reserved. COMPLETE IDENTITY GOVERNANCE UNIFIED SOLUTION FOR CERTIFICATION OF USER AND DATA ACCESS
  • 15. 15Copyright © 2013, Oracle and/or its affiliates. All rights reserved. HOW WE DID IT AGAIN
  • 16. 16Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Laptop Log into Identity Governance Console APPS Content Repository APPSAPPSAPPS Common Data Model -- Users -- Roles -- Entitlements -- Data CERTIFYING ACCESS - Review file metadata (sensitivity, content classification) - Review direct reports access privileges to highly sensitive document - Review direct reports access history
  • 17. 17Copyright © 2013, Oracle and/or its affiliates. All rights reserved. DOM FEDRONIC SR. BUSINESS LEADER IDENTITY & ACCESS VISA
  • 18. 18Copyright © 2013, Oracle and/or its affiliates. All rights reserved. COMPLETE IDENTITY MANAGEMENT SIMPLIFIED IDENTITY GOVERNANCE INTEGRATED PLATFORM COMPLETE ACCESS MANAGEMENT With self service for regular and privileged accounts Supporting mobile, social and cloud Rationalized architecture for scalability and security
  • 19. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.19 Worldwide Adoption 900+ 50+ 100M+ 1.5M+ DEPLOYMENTS ON 11g R2 PARTNERS TRAINED IDENTITIES MANAGED MOBILE DEVICES
  • 20. 20Copyright © 2013, Oracle and/or its affiliates. All rights reserved. TRANSFORMING THE BUSINESS SECURELY USE ANY DEVICE PROFILE BASED ACCESS AUTOMATION FOR SPEED AND SECURITY MONITORING FOR CONTROL
  • 21. 21Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud  Complete and Integrated  Best-in-class  Open standards  On-premise and Cloud  Foundation for Oracle Fusion Applications and Oracle Cloud User Engagement Identity Management Business Process Management Content Management Business Intelligence Service Integration Data Integration Development Tools Cloud Application Foundation Enterprise Management Web Social Mobile
  • 22. 22Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Innovation Awards Lam Research Theater (Next to Moscone North) Session ID: CON8082 Session Title: Oracle Fusion Middleware: Meet This Year’s Most Impressive Innovators Venue / Room: YBCA - Lam Research Theater Date and Time: Monday Sep 23, 4:45 - 5:45 p.m. 18 Winners Across Eight Categories
  • 23. 23Copyright © 2013, Oracle and/or its affiliates. All rights reserved. GET MORE INFORMATION AT OUR SESSIONS Context- and Risk-Aware Access Control: Any Device Anywhere Manish Gulati, MITRE, Ranjan Jain, Cisco Systems Inc Ashish Kolli, Oracle, Svetlana Kolomeyskaya, Oracle Monday 4:45 PM - 5:45 PM Moscone West - 2018 CON8819 Securely Enabling Mobile Access for Business Transformation Verizon Wireless, Ministry of National Education Lee Howarth, Oracle, Ajay Sondhi, Oracle Tuesday 12:00 PM - 1:00 PM Moscone West - 2018 CON8896 Securing Privileged Accounts with an Integrated Identity Management Solution Michael Laramie, Oracle, Olaf Stullich, Oracle, James Taylor, Oracle Wednesday 3:30 PM - 4:30 PM Moscone West - 2018 CON8813
  • 24. 24Copyright © 2013, Oracle and/or its affiliates. All rights reserved.