SlideShare une entreprise Scribd logo
1  sur  23
Tackling Security and Compliance
Barriers with a Platform Approach
to Identity Management
Scott Bonnell, Sr. Director Product Management, Oracle
Philip Black, Security Director, IAM, SUPERVALU, Inc.




                  2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.
Welcome!
• Type in questions using the Ask A Question button

• All audio is streamed over your computer
   – Having technical issues? Click the ? button


• Click Attachments button to find a printable copy of this
  presentation

• After the webinar, ISACA members may earn 1 CPE credit
   – Find a link to the Event Home Page on the Attachments button
   – Click the CPE Quiz link on the Event Home Page to access the quiz
   – Once you pass the quiz, you’ll receive a link to a printable CPE Certificate


• Question or suggestion? Email them to eLearning@isaca.org
                     2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   2
Agenda


                                   IDM Drivers
                                   Barriers to Adoption
                                   Customer Case Study
                                   Platform Benefits
                                   Q&A
                                   Resources



         2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   3
What is driving your IDM strategy?


                                  Mobile Application Security

                                                                     Regulatory Compliance


                                Self Service Enterprise

                                                      Social Identity Integration


                                    Cloud Applications and Services




            2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.               4
Barriers to adoption


                                      • Need to leverage existing
                                        IDM investment
                                      • Uncertain funding
                                      • Lack of in-house resources
                                      • Scalability concerns
                                      • Architectural complexity
                                      • Service outage



            2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   5
Co-existence based upgrade to
leverage Sun investment and benefit
from new Oracle 11gR2 Platform
capabilities
Philip Black, Security Director, IAM


               2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   6
About Supervalu

                                                              Premier Nationwide Grocer:
                                                              • 2,200 corporate retail
                                                                 stores
                                                              • 14 banners
                                                              • 2500
                                                                 franchise/independent
                                                                 grocers
                                                              • Distribution and retail
                                                                 services
                                                              • Dedicated to serving a
                                                                 wide range of customers




          2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.                   7
Supervalu IAM




                                                                Identity Customer Base
                                                                • 180,000 B2E identities
                                                                • 60,000 B2B identities
                                                                • 500,000 B2C identities




         2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.                    8
Business Drivers


   Operational Costs                                                User Productivity



       Compliance Enforcement                                Customer Satisfaction
       (Access Certification)                                  (Access Request)




                                                         Identity Fast and Simple
      Open Standards Platform                            Customer Experience
                                                         Identity Cert/Identity Bridge



                 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.          9
Process Overview

 1. Install Oracle Identity Manager / Oracle Identity Analytics

 2. Setup an Identity Bridge from Hub City Media

 3. Migrate Self Service workflows to OIM

 4. Configure Access Request Interface in OIM

 5. Hub City Media Identity Cert Integration with OIA

 6. Migrate connectors to OIM one at a time behind the scenes

 7. Retire Oracle Waveset

                 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   10
Architecture Enabler


         IdentityBridge




          2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   11
Migration Architecture




           2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   12
Migration Architecture



                                                                            Move
                                                                            Connectors to
                                                                            OIM while
                                                                            using Identity
                                                                            Bridge




           2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.                    13
Migration continued



                                                                           OIM as
                                                                           Primary
                                                                           System for
                                                                           End User




          2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.                14
Migration Summary
 •   Allows deployment of new functionality during migration
     •   HCM’s Identity Cert and ISAR

 •   Customer sets the pace of migration
 •   Identity Bridge Enables new functionality and reduces
     complexity of a hard cutover from SIM to OIM
 •   Customer must migrate eventually - no hard deadlines
 •   Coexistence migration is a sound option for large
     deployments
 •   Reduces deployment impact to the organization - Lower
     Risk
                   2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   15
Build a platform roadmap

                        Business vs.
                        Application                                       Compliance
                        Owners                                            vs. Risk


                        Quick win vs.
                                                                          Timeline and
                        long term                                         Deliverable
                        strategy



                       Balance priorities with opportunities


         2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.                  16
Assess The Business Opportunity


       Security                     Efficiency                                            Scale



                                                                                  3X




  Compliance                   User Productivity                                     New Customers
  Internal Governance          Operational Cost                                      Quality of Service
  Security Risk                Opportunity Cost




                     2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.                          17
A Complete IDM Platform


        Identity                        Lifecycle Management & 360 visibility
      Governance                        Regular & Privileged identities


                                          Complete access control & SSO
                                                        Fraud Detection
       Access
                                          Converged Policy Administration &
     Management
                                          Control

                                                          Fraud Detection
       Directory                         LDAP, Virtualization & Meta-directory
       Services                          Unified Administration & Management




              2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.     18
Oracle Identity Management 11gR2


  Simplified Experience                              Modernized Platform


  Cloud, Mobile and Social


  Extreme Scale
                                                        Faster                 Lower
  Clear Upgrade Path                                    Deployment             TCO

       Securing the New Digital Experience
              2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.           19
Platform Architectural Benefits


Shared Connectors                       Less Customization                              Faster Implementation



Centralized Policies                     Standardize Access                             Reduced Risk



Workflow Integration                     Automated Process                              Improved Compliance



Common Data Model                        Standard Reporting                             Fewer Data Stores




                       2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.                       20
Platform Approach Reduces Cost

                                                                  Benefits               Platform Advantage

                                Increased End-        • Emergency Access                • 11% faster
                                     User
                                  Productivity        • End-user Self Service           • 30% faster

                                Reduced Risk          • Suspend/revoke/de-provision

 48%   Cost Savings
                                                        end user access
                                                      • Bullet
                                                                                        • 46% faster


                                   Enhanced           • Integrate a new app faster
                                    Agility             with the IAM infrastructure     • 64% faster

 14%   Fewer instances
       of unauthorized
       access
                                                      • Integrate a new end user role
                                                        faster into the solution
                                                                                        • 73% faster


                                  Enhanced            • Reduces unauthorized
                                                                                        • 14% fewer
                                 Security and           access
                                                                                        • 35% fewer
 35%   Fewer Audit
       Deficiencies
                                 Compliance
                                                      • Reduces audit deficiencies


                                Reduced Total
                                    Cost
                                                      • Reduces total cost of IAM
                                                                                        • 48% lower
                                                        initiatives


                                      Source: Aberdeen “Analyzing Point Solutions vs. Platform” 2011


                      2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.                          21
2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   22
www.oracle.com/Identity



             www.facebook.com/OracleIDM
             www.twitter.com/OracleIDM



               blogs.oracle.com/OracleIDM




2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   23

Contenu connexe

Tendances

Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBAdvanced Logic Industries
 
Wired2Win webinar Building Enterprise Social Engine Leveraging SharePoint 2013
Wired2Win webinar Building Enterprise Social Engine Leveraging SharePoint 2013Wired2Win webinar Building Enterprise Social Engine Leveraging SharePoint 2013
Wired2Win webinar Building Enterprise Social Engine Leveraging SharePoint 2013WinWire Technologies Inc
 
Intel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NABIntel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NABIntelAPAC
 
Actuate BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
Actuate  BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...Actuate  BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
Actuate BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...EclipseDayParis
 
Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...ORACLE USER GROUP ESTONIA
 
Infor ion executive_overview
Infor ion executive_overviewInfor ion executive_overview
Infor ion executive_overviewAndy Wylie
 
Peuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinPeuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinDroidcon Berlin
 
Who says Elephant Can't Dance?
Who says Elephant Can't Dance?Who says Elephant Can't Dance?
Who says Elephant Can't Dance?Anand Sharma
 
Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...ORACLE USER GROUP ESTONIA
 
Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Leigh Williamson
 
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinJan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinDroidcon Berlin
 
Managed Services
Managed ServicesManaged Services
Managed ServicesVenkat J
 
ICIL Technology Ltd
ICIL Technology LtdICIL Technology Ltd
ICIL Technology LtdAdil Mufti
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiIBM Sverige
 
Sko2012 Microsoft Breakout Product Overview Mo Final
Sko2012 Microsoft Breakout Product Overview Mo FinalSko2012 Microsoft Breakout Product Overview Mo Final
Sko2012 Microsoft Breakout Product Overview Mo Finalkieran1a
 

Tendances (18)

Webinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMBWebinar: Move Your Business Forward with Cisco VOIP for SMB
Webinar: Move Your Business Forward with Cisco VOIP for SMB
 
Wired2Win webinar Building Enterprise Social Engine Leveraging SharePoint 2013
Wired2Win webinar Building Enterprise Social Engine Leveraging SharePoint 2013Wired2Win webinar Building Enterprise Social Engine Leveraging SharePoint 2013
Wired2Win webinar Building Enterprise Social Engine Leveraging SharePoint 2013
 
Corporate overview the services story
Corporate overview the services storyCorporate overview the services story
Corporate overview the services story
 
Intel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NABIntel Cloud Summit 2012 ODCA + NAB
Intel Cloud Summit 2012 ODCA + NAB
 
Actuate BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
Actuate  BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...Actuate  BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
Actuate BIRT dans tous ses états : Reporting, Interactif, Ad-hoc, Analytique...
 
Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...
 
Itil Training & Certification
Itil Training & CertificationItil Training & Certification
Itil Training & Certification
 
Infor Ion October 2011
Infor Ion October 2011Infor Ion October 2011
Infor Ion October 2011
 
Infor ion executive_overview
Infor ion executive_overviewInfor ion executive_overview
Infor ion executive_overview
 
Peuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the WinPeuker, Neu: Enterprise Android for the Win
Peuker, Neu: Enterprise Android for the Win
 
Who says Elephant Can't Dance?
Who says Elephant Can't Dance?Who says Elephant Can't Dance?
Who says Elephant Can't Dance?
 
Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...Oracle University - Your Complete Training Source for Oracle Software and Har...
Oracle University - Your Complete Training Source for Oracle Software and Har...
 
Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live! Build and Connect Enterprise Mobile Applications from developerWorks Live!
Build and Connect Enterprise Mobile Applications from developerWorks Live!
 
Jan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the WinJan Peuker, Raoul Neu: Enterprise Android for the Win
Jan Peuker, Raoul Neu: Enterprise Android for the Win
 
Managed Services
Managed ServicesManaged Services
Managed Services
 
ICIL Technology Ltd
ICIL Technology LtdICIL Technology Ltd
ICIL Technology Ltd
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
 
Sko2012 Microsoft Breakout Product Overview Mo Final
Sko2012 Microsoft Breakout Product Overview Mo FinalSko2012 Microsoft Breakout Product Overview Mo Final
Sko2012 Microsoft Breakout Product Overview Mo Final
 

En vedette

Government - recommendations from AIGLIA2014
Government - recommendations from AIGLIA2014Government - recommendations from AIGLIA2014
Government - recommendations from AIGLIA2014futureagricultures
 
Dell open stack powered cloud solution introduce & crowbar demo cosug-2012
Dell open stack powered cloud solution introduce & crowbar demo cosug-2012Dell open stack powered cloud solution introduce & crowbar demo cosug-2012
Dell open stack powered cloud solution introduce & crowbar demo cosug-2012OpenCity Community
 
школа против курения
школа против куренияшкола против курения
школа против куренияelvira38
 
Capital City Scape sec-66 Gurgaon 9999993877
Capital City Scape sec-66 Gurgaon 9999993877Capital City Scape sec-66 Gurgaon 9999993877
Capital City Scape sec-66 Gurgaon 9999993877Ayaan Khan
 
Power Notes Measurements and Dealing with Data
Power Notes   Measurements and Dealing with DataPower Notes   Measurements and Dealing with Data
Power Notes Measurements and Dealing with Datajmori1
 
What is Social Media and how can it work for a service professional
What is Social Media and how can it work for a service professionalWhat is Social Media and how can it work for a service professional
What is Social Media and how can it work for a service professionalRather Inventive
 
Convince your CEO to go digital
Convince your CEO to go digitalConvince your CEO to go digital
Convince your CEO to go digitalCraig Skipsey
 
Experiences and Thoughts on Indigenous Business and Economic Development
Experiences and Thoughts on Indigenous Business and Economic DevelopmentExperiences and Thoughts on Indigenous Business and Economic Development
Experiences and Thoughts on Indigenous Business and Economic DevelopmentWayne Dunn
 
Week Aef4 11
Week Aef4 11Week Aef4 11
Week Aef4 11Les Davy
 
Exact MKB Cloud Barometer presentatie tijdens EuroCloud Awards
Exact MKB Cloud Barometer presentatie tijdens EuroCloud AwardsExact MKB Cloud Barometer presentatie tijdens EuroCloud Awards
Exact MKB Cloud Barometer presentatie tijdens EuroCloud AwardsPeter Vermeulen
 
Balancing Equations #1
Balancing Equations #1Balancing Equations #1
Balancing Equations #1jmori1
 
Trovantii din Romania Valcea-
Trovantii din Romania  Valcea-Trovantii din Romania  Valcea-
Trovantii din Romania Valcea-balada65
 
Insights and opportunities
Insights and opportunitiesInsights and opportunities
Insights and opportunitiesKompella Kashyap
 
Engagor introduction pitch
Engagor introduction pitchEngagor introduction pitch
Engagor introduction pitchDimitri Callens
 

En vedette (20)

C 5
C 5C 5
C 5
 
Arcadian
ArcadianArcadian
Arcadian
 
Government - recommendations from AIGLIA2014
Government - recommendations from AIGLIA2014Government - recommendations from AIGLIA2014
Government - recommendations from AIGLIA2014
 
Dell open stack powered cloud solution introduce & crowbar demo cosug-2012
Dell open stack powered cloud solution introduce & crowbar demo cosug-2012Dell open stack powered cloud solution introduce & crowbar demo cosug-2012
Dell open stack powered cloud solution introduce & crowbar demo cosug-2012
 
Once a geek, forever a geek
Once a geek, forever a geekOnce a geek, forever a geek
Once a geek, forever a geek
 
школа против курения
школа против куренияшкола против курения
школа против курения
 
Notam 28 set
Notam 28 setNotam 28 set
Notam 28 set
 
Capital City Scape sec-66 Gurgaon 9999993877
Capital City Scape sec-66 Gurgaon 9999993877Capital City Scape sec-66 Gurgaon 9999993877
Capital City Scape sec-66 Gurgaon 9999993877
 
Power Notes Measurements and Dealing with Data
Power Notes   Measurements and Dealing with DataPower Notes   Measurements and Dealing with Data
Power Notes Measurements and Dealing with Data
 
Php
PhpPhp
Php
 
What is Social Media and how can it work for a service professional
What is Social Media and how can it work for a service professionalWhat is Social Media and how can it work for a service professional
What is Social Media and how can it work for a service professional
 
Oap
OapOap
Oap
 
Convince your CEO to go digital
Convince your CEO to go digitalConvince your CEO to go digital
Convince your CEO to go digital
 
Experiences and Thoughts on Indigenous Business and Economic Development
Experiences and Thoughts on Indigenous Business and Economic DevelopmentExperiences and Thoughts on Indigenous Business and Economic Development
Experiences and Thoughts on Indigenous Business and Economic Development
 
Week Aef4 11
Week Aef4 11Week Aef4 11
Week Aef4 11
 
Exact MKB Cloud Barometer presentatie tijdens EuroCloud Awards
Exact MKB Cloud Barometer presentatie tijdens EuroCloud AwardsExact MKB Cloud Barometer presentatie tijdens EuroCloud Awards
Exact MKB Cloud Barometer presentatie tijdens EuroCloud Awards
 
Balancing Equations #1
Balancing Equations #1Balancing Equations #1
Balancing Equations #1
 
Trovantii din Romania Valcea-
Trovantii din Romania  Valcea-Trovantii din Romania  Valcea-
Trovantii din Romania Valcea-
 
Insights and opportunities
Insights and opportunitiesInsights and opportunities
Insights and opportunities
 
Engagor introduction pitch
Engagor introduction pitchEngagor introduction pitch
Engagor introduction pitch
 

Similaire à ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…

Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
From Requirements Management to Release with Git for Android System
From Requirements Management to Release with Git for Android System From Requirements Management to Release with Git for Android System
From Requirements Management to Release with Git for Android System Intland Software GmbH
 
Criticality of identity
Criticality of identityCriticality of identity
Criticality of identityNordic APIs
 
Investor Day Presentation, Sept 2012
Investor Day Presentation, Sept 2012Investor Day Presentation, Sept 2012
Investor Day Presentation, Sept 2012ADVA
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...Eucalyptus Systems, Inc.
 
IBM & Ciboodle - PureSystems Partners
IBM & Ciboodle - PureSystems PartnersIBM & Ciboodle - PureSystems Partners
IBM & Ciboodle - PureSystems PartnersSword Ciboodle
 
In sync10 nadiabendjedou-10things-final
In sync10 nadiabendjedou-10things-finalIn sync10 nadiabendjedou-10things-final
In sync10 nadiabendjedou-10things-finalBendjedou Nadia
 
In sync10 nadiabendjedou-10things-final
In sync10 nadiabendjedou-10things-finalIn sync10 nadiabendjedou-10things-final
In sync10 nadiabendjedou-10things-finalInSync Conference
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerOracleIDM
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityNetIQ
 
Technology Development and Innovation at Cisco
Technology Development and Innovation at CiscoTechnology Development and Innovation at Cisco
Technology Development and Innovation at CiscoCisco Canada
 
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...Compuware APM
 
Ashnik corporate presentation Dec 2012
Ashnik corporate presentation Dec 2012Ashnik corporate presentation Dec 2012
Ashnik corporate presentation Dec 2012Sachin Dabir
 
Is it Time to Move Your Enterprise to the Cloud
Is it Time to Move Your Enterprise to the CloudIs it Time to Move Your Enterprise to the Cloud
Is it Time to Move Your Enterprise to the CloudProformative, Inc.
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service providerCisco Public Relations
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...Cisco Russia
 

Similaire à ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri… (20)

Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
From Requirements Management to Release with Git for Android System
From Requirements Management to Release with Git for Android System From Requirements Management to Release with Git for Android System
From Requirements Management to Release with Git for Android System
 
Criticality of identity
Criticality of identityCriticality of identity
Criticality of identity
 
Investor Day Presentation, Sept 2012
Investor Day Presentation, Sept 2012Investor Day Presentation, Sept 2012
Investor Day Presentation, Sept 2012
 
Workshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environmentWorkshop APM in a Cloud & Virtualized environment
Workshop APM in a Cloud & Virtualized environment
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
How to Transform Enterprise Applications to On-premise Clouds with Wipro and ...
 
IBM & Ciboodle - PureSystems Partners
IBM & Ciboodle - PureSystems PartnersIBM & Ciboodle - PureSystems Partners
IBM & Ciboodle - PureSystems Partners
 
In sync10 nadiabendjedou-10things-final
In sync10 nadiabendjedou-10things-finalIn sync10 nadiabendjedou-10things-final
In sync10 nadiabendjedou-10things-final
 
In sync10 nadiabendjedou-10things-final
In sync10 nadiabendjedou-10things-finalIn sync10 nadiabendjedou-10things-final
In sync10 nadiabendjedou-10things-final
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
 
Leveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and ComplexityLeveraging Identity to Manage Change and Complexity
Leveraging Identity to Manage Change and Complexity
 
Technology Development and Innovation at Cisco
Technology Development and Innovation at CiscoTechnology Development and Innovation at Cisco
Technology Development and Innovation at Cisco
 
Thousand Eyes FMD.pptx
Thousand Eyes FMD.pptxThousand Eyes FMD.pptx
Thousand Eyes FMD.pptx
 
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
IDC & Gomez Webinar --Best Practices: Protect Your Online Revenue Through Web...
 
Ashnik corporate presentation Dec 2012
Ashnik corporate presentation Dec 2012Ashnik corporate presentation Dec 2012
Ashnik corporate presentation Dec 2012
 
Is it Time to Move Your Enterprise to the Cloud
Is it Time to Move Your Enterprise to the CloudIs it Time to Move Your Enterprise to the Cloud
Is it Time to Move Your Enterprise to the Cloud
 
Cisco tec surya panditi - service provider
Cisco tec   surya panditi - service providerCisco tec   surya panditi - service provider
Cisco tec surya panditi - service provider
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 

Plus de OracleIDM

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 

Plus de OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 

Dernier

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Dernier (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…

  • 1. Tackling Security and Compliance Barriers with a Platform Approach to Identity Management Scott Bonnell, Sr. Director Product Management, Oracle Philip Black, Security Director, IAM, SUPERVALU, Inc. 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.
  • 2. Welcome! • Type in questions using the Ask A Question button • All audio is streamed over your computer – Having technical issues? Click the ? button • Click Attachments button to find a printable copy of this presentation • After the webinar, ISACA members may earn 1 CPE credit – Find a link to the Event Home Page on the Attachments button – Click the CPE Quiz link on the Event Home Page to access the quiz – Once you pass the quiz, you’ll receive a link to a printable CPE Certificate • Question or suggestion? Email them to eLearning@isaca.org 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 2
  • 3. Agenda  IDM Drivers  Barriers to Adoption  Customer Case Study  Platform Benefits  Q&A  Resources 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 3
  • 4. What is driving your IDM strategy? Mobile Application Security Regulatory Compliance Self Service Enterprise Social Identity Integration Cloud Applications and Services 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 4
  • 5. Barriers to adoption • Need to leverage existing IDM investment • Uncertain funding • Lack of in-house resources • Scalability concerns • Architectural complexity • Service outage 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 5
  • 6. Co-existence based upgrade to leverage Sun investment and benefit from new Oracle 11gR2 Platform capabilities Philip Black, Security Director, IAM 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 6
  • 7. About Supervalu Premier Nationwide Grocer: • 2,200 corporate retail stores • 14 banners • 2500 franchise/independent grocers • Distribution and retail services • Dedicated to serving a wide range of customers 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 7
  • 8. Supervalu IAM Identity Customer Base • 180,000 B2E identities • 60,000 B2B identities • 500,000 B2C identities 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 8
  • 9. Business Drivers Operational Costs User Productivity Compliance Enforcement Customer Satisfaction (Access Certification) (Access Request) Identity Fast and Simple Open Standards Platform Customer Experience Identity Cert/Identity Bridge 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 9
  • 10. Process Overview 1. Install Oracle Identity Manager / Oracle Identity Analytics 2. Setup an Identity Bridge from Hub City Media 3. Migrate Self Service workflows to OIM 4. Configure Access Request Interface in OIM 5. Hub City Media Identity Cert Integration with OIA 6. Migrate connectors to OIM one at a time behind the scenes 7. Retire Oracle Waveset 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 10
  • 11. Architecture Enabler IdentityBridge 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 11
  • 12. Migration Architecture 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 12
  • 13. Migration Architecture Move Connectors to OIM while using Identity Bridge 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 13
  • 14. Migration continued OIM as Primary System for End User 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 14
  • 15. Migration Summary • Allows deployment of new functionality during migration • HCM’s Identity Cert and ISAR • Customer sets the pace of migration • Identity Bridge Enables new functionality and reduces complexity of a hard cutover from SIM to OIM • Customer must migrate eventually - no hard deadlines • Coexistence migration is a sound option for large deployments • Reduces deployment impact to the organization - Lower Risk 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 15
  • 16. Build a platform roadmap Business vs. Application Compliance Owners vs. Risk Quick win vs. Timeline and long term Deliverable strategy Balance priorities with opportunities 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 16
  • 17. Assess The Business Opportunity Security Efficiency Scale 3X  Compliance  User Productivity  New Customers  Internal Governance  Operational Cost  Quality of Service  Security Risk  Opportunity Cost 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 17
  • 18. A Complete IDM Platform Identity Lifecycle Management & 360 visibility Governance Regular & Privileged identities Complete access control & SSO Fraud Detection Access Converged Policy Administration & Management Control Fraud Detection Directory LDAP, Virtualization & Meta-directory Services Unified Administration & Management 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 18
  • 19. Oracle Identity Management 11gR2 Simplified Experience Modernized Platform Cloud, Mobile and Social Extreme Scale Faster Lower Clear Upgrade Path Deployment TCO Securing the New Digital Experience 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 19
  • 20. Platform Architectural Benefits Shared Connectors Less Customization Faster Implementation Centralized Policies Standardize Access Reduced Risk Workflow Integration Automated Process Improved Compliance Common Data Model Standard Reporting Fewer Data Stores 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 20
  • 21. Platform Approach Reduces Cost Benefits Platform Advantage Increased End- • Emergency Access • 11% faster User Productivity • End-user Self Service • 30% faster Reduced Risk • Suspend/revoke/de-provision 48% Cost Savings end user access • Bullet • 46% faster Enhanced • Integrate a new app faster Agility with the IAM infrastructure • 64% faster 14% Fewer instances of unauthorized access • Integrate a new end user role faster into the solution • 73% faster Enhanced • Reduces unauthorized • 14% fewer Security and access • 35% fewer 35% Fewer Audit Deficiencies Compliance • Reduces audit deficiencies Reduced Total Cost • Reduces total cost of IAM • 48% lower initiatives Source: Aberdeen “Analyzing Point Solutions vs. Platform” 2011 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 21
  • 22. 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 22
  • 23. www.oracle.com/Identity www.facebook.com/OracleIDM www.twitter.com/OracleIDM blogs.oracle.com/OracleIDM 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 23

Notes de l'éditeur

  1. Most organizations have multiple deployments that were initiated for different reasonsAccess vs. ControlCompliance vs. SecurityCost vs. ValueQuick win vs. comprehensive planMost Identity Management efforts don’t end with one deployment – typically organizations have multiple deployments implementing different components based on business requirements. Every CSO or Director of Identity Management needs to think about a roadmap. If you are stating from scratch building a roadmap can be complicated:Business owners and Application owners have different goals:The business owner typically wants greater transparency while the application owner wants to keep much of the information isolated and the challenge they struggle with is how to expose the right level of information to the business manager to make decisions. It would be a big exposure to give every manager administrative access to applications to verify and view the access rights of employees.Addressing compliance vs. RiskMany CSO’s are frustrated by all of the money being spent on compliance which does not really reduce security risk. Despite all of the effort on audit compliance many IT departments don’t feel any safer. The roadmap has to help balance these Multiple Priorities From a use case and business case perspective there are multiple priorities – the strategy is typically take a cost vs value approach . So we we can rationalize some of the roadmap items based on the cost and the benefits Timeline and DeliverablesWe can’t do everything at once . Adopt the right technology at the right time and focus on deliverables that can show quick ROI.The Take Away Roadmaps are more Art than Science The best guidance is to work with peers who have done it before
  2. Focus on the business Opportunity.From Previous business cases, companies have justified the approach in one of 3 ways Security & Compliance – Preventing risk or in reaction to a security breach or audit event Example – Auditor finds an excessive access issue that gets escalated to a CIO and prompts the spend for a project to clean up access- this project is driven by the regulatory pressure and governance pressure internally Efficiency – Looking at help desk cost, the time to value of on-boarding off-boarding and automationExample: Many organizations have created the business case around identity management by looking at the volumes of help desk calls and choosing identity projects to tackle the volume of calls . In an organization of 40K users you can expect about 20K move adds or changes via the help desk. Roughly 50% of your help desk calls are for password management. The cost quickly add up . You can quickly get a 200% ROI in a 2 year period taking this angle alone.Scale – Expanding the business by serving customers better Many organizations – tackle Identity management outside in by focusing on applications that provide service to customers – ie enabling identity management for customer apps.
  3. Studies have shown that a Platform approach – where IDM products are fully integrated by the vendor – is more cost effective and more secure than best of breed products from multiple vendors.================================================================================
  4. Join The Community