SlideShare une entreprise Scribd logo
1  sur  20
Télécharger pour lire hors ligne
<Insert Picture Here>




Security Inside Out
Cost-Effective Security and Compliance

Avner Mimon – Business Development Manager
<Insert Picture Here>
Agenda


08:30-09:00   Registration

              Welcome and introduction
09:00-09:15   Avner Mimon, Business Development & Sales Manager, Oracle Israel


              Enterprise Information Security
09:15-10:00   Steve Wainwright, Senior Director, Information Security, Oracle Corporation

              Oracle Identity & Access management suite – Identity Analytics
10:00-10:45   Deborah Assayag, Senior Technology Consultant , Oracle Israel
10:45-11:00   Coffee break

              UBI (Igud Bank) Success Story – Oracle Identity Management
11:00-11:30   Tamar Halevi – IDM project Manager, UBI

              Information Rights Management – Protecting your digital assets
11:30-12:15   Deborah Assayag, Senior Technology Consultant , Oracle Israel
                                      Oracle Confidential
   12:15      Lunch                                                                     3
Next Generation Security Challenges




  Auditors & Regulators   Identity Thieves




   Rogue Employees        Privileged Users



                          4
Identity Thieves
8,400,000

$ 49,300,000,000

     $ 5,720

     5,000
Auditors & Regulators
More Regulations Than Ever…


                                                        UK/PRO

              PIPEDA
                                                              EU Data Directives
Sarbanes-Oxley            GLBA
                    PCI                           Basel II
Breach Disclosure         FISMA                                                K SOX
                                                                Euro SOX
                                                                                             J SOX
             HIPAA
                                                  ISO 17799


                      SAS 70      COBIT



                                                                                   AUS/PRO



                     90% Companies behind in compliance

                                  Source: IT Policy Compliance Group, 2007.



                                               Oracle Confidential
                                                                                                     8
9
10
11
12
13
Privileged Users




Rogue Employees
Oracle Security Solutions until 2005
                         Applications
                 E-Business Suite, PeopleSoft, Siebel,
                        SAP, Custom, Legacy




   Identity
 Management




    Data
   Security     Advanced
              Security Option
                                          Label Security




                                          15
Oracle Security Solutions - Current
                              Applications
                    E-Business Suite, PeopleSoft, Siebel,
                           SAP, Custom, Legacy




                                                                     Enterprise Manager
               Web Services           Identity            E-SSO
                Manager              Federation           Suite

   Identity                           Adaptive




                                                                                          GRC
              Access Manager                          Role Manager
 Management                        Access Manager


               Directory Services           Identity Manager



                 Database Vault                   Audit Vault
    Data
   Security        Advanced
                 Security Option
                                              Label Security


                      Information Rights Management




                                              16
Oracle Security Inside Out
                                                                            Database Security
                                                                            •   Encryption and Masking
                                                                            •   Privileged User Controls
                                                                            •   Multi-Factor Authorization
                                                                            •   Activity Monitoring and Audit
                                                                            •   Secure Configuration


                                                                                Identity Management
                                                                            •   User Provisioning
                                                                            •   Role Management
                                                                            •   Entitlements Management
Information                                                                 •   Risk-Based Access Control
              Infrastructure                                                •   Virtual Directories

                               Databases                                    Information Rights
                                           Applications                     Management
                                                              Content       •   Track and Audit Document Usage
                                                                            •   Control and Revoke Document Access
                                                                            •   Secured Inside or Outside Firewall
                                                                            •   Centralized Policy Administration




                                                      Oracle Confidential
                                                                                                                17
Identity Management Market Leader



     “Oracle is currently the IdM vendor to beat”                   “Oracle has established itself as Leader.”
 - Burton VantagePoint 2008: Identity and Privacy Trends   - The Forrester Wave: Identity And Access Management, Q1 2008
Oracle Security Customers

   Financial Services           Transportation & Services




   Manufacturing & Technology   Telecommunication




   Public Sector                Retail




Oracle Confidential
Securityinsideout

Contenu connexe

Tendances

[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
IBMSSA
 
E-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real WorldE-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real World
Chris Byrne
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
ebuc
 

Tendances (19)

Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your Identity
 
Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü
Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme ÇözümüSecupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü
Secupi - Veri Maskeleme - Anonimleştirme ve Mantıksal Silme Çözümü
 
Solix EDMS Data Masking
Solix EDMS Data MaskingSolix EDMS Data Masking
Solix EDMS Data Masking
 
The relevance of Digital content in SOX compliance
The relevance of Digital content in SOX complianceThe relevance of Digital content in SOX compliance
The relevance of Digital content in SOX compliance
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
[Chaco] Soluciones de Seguridad – Nicolás Pérez, Giux
 
IDBI Intech - Information security consulting
IDBI Intech - Information security consultingIDBI Intech - Information security consulting
IDBI Intech - Information security consulting
 
E-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real WorldE-Mail Compliance Frameworks in the Real World
E-Mail Compliance Frameworks in the Real World
 
NHIN Privacy & Security
NHIN Privacy & SecurityNHIN Privacy & Security
NHIN Privacy & Security
 
Hybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsHybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 Trends
 
IBM InfoSphere Guardium overview
IBM InfoSphere Guardium overviewIBM InfoSphere Guardium overview
IBM InfoSphere Guardium overview
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
 
Hitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB Compliance
 
Webinar hiware
Webinar hiwareWebinar hiware
Webinar hiware
 
Introduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + SecurityIntroduction to Microsoft Enterprise Mobility + Security
Introduction to Microsoft Enterprise Mobility + Security
 
Sms passcode
Sms passcodeSms passcode
Sms passcode
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
iCode Security Architecture Framework
iCode Security Architecture FrameworkiCode Security Architecture Framework
iCode Security Architecture Framework
 
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH ComplianceSecuring Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
 

En vedette

En vedette (8)

10g forms
10g forms10g forms
10g forms
 
Overheard at the Forum
Overheard at the ForumOverheard at the Forum
Overheard at the Forum
 
FM MAKE UP katalógus
FM MAKE UP katalógusFM MAKE UP katalógus
FM MAKE UP katalógus
 
What you need to know to start a business blog
What you need to know to start a business blogWhat you need to know to start a business blog
What you need to know to start a business blog
 
Davidoff бриф доп
Davidoff бриф допDavidoff бриф доп
Davidoff бриф доп
 
The State of Social Media Marketing 2010: Hype or Real Business Impact?
The State of Social Media Marketing 2010: Hype or Real Business Impact?The State of Social Media Marketing 2010: Hype or Real Business Impact?
The State of Social Media Marketing 2010: Hype or Real Business Impact?
 
Agr house tour
Agr house tourAgr house tour
Agr house tour
 
Merry Marketing: Three Articles to Inspire Your Holiday Marketing
Merry Marketing: Three Articles to Inspire Your Holiday MarketingMerry Marketing: Three Articles to Inspire Your Holiday Marketing
Merry Marketing: Three Articles to Inspire Your Holiday Marketing
 

Similaire à Securityinsideout

A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
OracleIDM
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
Oracle
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
Oracle BH
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
OracleIDM
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
Lilian Schaffer
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
Lilian Schaffer
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
OracleIDM
 

Similaire à Securityinsideout (20)

Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
Cloud Auditing
Cloud AuditingCloud Auditing
Cloud Auditing
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements Server
 
Cyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities IndustryCyber Security in Energy & Utilities Industry
Cyber Security in Energy & Utilities Industry
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Enterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to AuditEnterprise Security Architecture: From Access to Audit
Enterprise Security Architecture: From Access to Audit
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
 
Identity access management
Identity access management Identity access management
Identity access management
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Cloud Security
Cloud Security Cloud Security
Cloud Security
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2Cybersecurity exchange briefing oct 2012 v2
Cybersecurity exchange briefing oct 2012 v2
 

Dernier

An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Dernier (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 

Securityinsideout

  • 1. <Insert Picture Here> Security Inside Out Cost-Effective Security and Compliance Avner Mimon – Business Development Manager
  • 3. Agenda 08:30-09:00 Registration Welcome and introduction 09:00-09:15 Avner Mimon, Business Development & Sales Manager, Oracle Israel Enterprise Information Security 09:15-10:00 Steve Wainwright, Senior Director, Information Security, Oracle Corporation Oracle Identity & Access management suite – Identity Analytics 10:00-10:45 Deborah Assayag, Senior Technology Consultant , Oracle Israel 10:45-11:00 Coffee break UBI (Igud Bank) Success Story – Oracle Identity Management 11:00-11:30 Tamar Halevi – IDM project Manager, UBI Information Rights Management – Protecting your digital assets 11:30-12:15 Deborah Assayag, Senior Technology Consultant , Oracle Israel Oracle Confidential 12:15 Lunch 3
  • 4. Next Generation Security Challenges Auditors & Regulators Identity Thieves Rogue Employees Privileged Users 4
  • 8. More Regulations Than Ever… UK/PRO PIPEDA EU Data Directives Sarbanes-Oxley GLBA PCI Basel II Breach Disclosure FISMA K SOX Euro SOX J SOX HIPAA ISO 17799 SAS 70 COBIT AUS/PRO 90% Companies behind in compliance Source: IT Policy Compliance Group, 2007. Oracle Confidential 8
  • 9. 9
  • 10. 10
  • 11. 11
  • 12. 12
  • 13. 13
  • 15. Oracle Security Solutions until 2005 Applications E-Business Suite, PeopleSoft, Siebel, SAP, Custom, Legacy Identity Management Data Security Advanced Security Option Label Security 15
  • 16. Oracle Security Solutions - Current Applications E-Business Suite, PeopleSoft, Siebel, SAP, Custom, Legacy Enterprise Manager Web Services Identity E-SSO Manager Federation Suite Identity Adaptive GRC Access Manager Role Manager Management Access Manager Directory Services Identity Manager Database Vault Audit Vault Data Security Advanced Security Option Label Security Information Rights Management 16
  • 17. Oracle Security Inside Out Database Security • Encryption and Masking • Privileged User Controls • Multi-Factor Authorization • Activity Monitoring and Audit • Secure Configuration Identity Management • User Provisioning • Role Management • Entitlements Management Information • Risk-Based Access Control Infrastructure • Virtual Directories Databases Information Rights Applications Management Content • Track and Audit Document Usage • Control and Revoke Document Access • Secured Inside or Outside Firewall • Centralized Policy Administration Oracle Confidential 17
  • 18. Identity Management Market Leader “Oracle is currently the IdM vendor to beat” “Oracle has established itself as Leader.” - Burton VantagePoint 2008: Identity and Privacy Trends - The Forrester Wave: Identity And Access Management, Q1 2008
  • 19. Oracle Security Customers Financial Services Transportation & Services Manufacturing & Technology Telecommunication Public Sector Retail Oracle Confidential