SlideShare a Scribd company logo
1 of 13
<Insert Picture Here>




Keeping Entitlements In Check
Roger Wigenstam, Sr. Director of Product Management, Oracle
VireshGarg, Director Product Management, Oracle
This document is for informational purposes. It is not a commitment
to deliver any material, code, or functionality, and should not be relied
upon in making purchasing decisions. The development, release,
and timing of any features or functionality described in this document
remains at the sole discretion of Oracle. This document in any form,
software or printed matter, contains proprietary information that is the
exclusive property of Oracle. This document and information
contained herein may not be disclosed, copied, reproduced or
distributed to anyone outside Oracle without prior written consent of
Oracle. This document is not part of your license agreement nor can
it be incorporated into any contractual agreement with Oracle or its
subsidiaries or affiliates.
Agenda
         • Application Security

         • Solution Overview

         • Authorization

         • Compliance

         • A Platform Approach
Application Security is Fragmented

   Non-Standard           Brittle           Hardcoded
Entitlement Catalogs   Access Control      Authorization




        Inflexible authorization increases complexity
The Challenge is Scale




 Focused on Reducing Risk
                                   • A Few App Administrators
 Driven to Reduce Cost
 Rolling or Monthly Attestation   • Handful of Audit Staff
Solutions




  Oracle Identity   Oracle Entitlements
    Analytics             Server
The Approach
    Application Security Value Chain


 Define          Access             Monitor          Secure        Audit
 Catalog         Request            Enforce           Data         Certify




 Entitlements    Search          Context          Redact       Risk
 Policies        Provisioning    External Auth    Authorize    Remediation
Enforce and Monitor
 Context and Dynamic Authorization

Audit & Risk                                            Application Owners
                                                           Developers


                          Application Security
                                Platform




               Location                          Time
                                 Device
Oracle Identity Analytics
     Enterprise Roles
                        • Access Certification
                        • Role Modeling
       Identity         • Closed Loop
      Warehouse           Remediation
                        • Business-Friendly
                          Reporting
                        • Risk Aggregation
Platform Reduces Cost vs. Point Solutions
                                                                                      Oracle IAM Suite
                                                      Benefits
                                                                                         Advantage

48%   Cost Savings
                      Increased End-
                     User Productivity

                      Reduced Risk
                                           • Emergency Access
                                           • End-user Self Service
                                                                                   • 11% faster
                                                                                   • 30% faster
                                           • Suspend/revoke/de-
                                                                                   • 46% faster

46%   More
      Responsive     Enhanced Agility
                                             provision end user access
                                           • Integrate a new app faster
                                             with the IAM infrastructure           • 64% faster
                                           • Integrate a new end user              • 73% faster
35%   Fewer Audit
      Deficiencies
                        Enhanced
                                             role faster into the solution
                                           • Reduces unauthorized
                                                                                   • 14% fewer
                       Security and          access
                       Compliance                                                  • 35% fewer
                                           • Reduces audit deficiencies
                      Reduced Total        • Reduces total cost of IAM
                                                                                   • 48% lower
                          Cost               initiatives
                             Source: Aberdeen “Analyzing point solutions vs. platform” 2011
Why Oracle ?

• Complete, Open and Integrated

• Actionable Compliance

• Massively Scalable

• Platform Synergies

• Customer References
On-Demand Webcast Series
Customers Discussing Results of Platform Approach


    Building a Secure Cloud                     Cisco’s Platform Approach
    SaskTel                                     Cisco Systems




    Platform for Compliance                      Platform Best Practices
    ING Bank                                     Agilent Technologies



           Register To Watch at: www.oracle.com/identity
www.oracle.com/Identity


www.facebook.com/OracleIDM
www.twitter.com/OracleIDM


blogs.oracle.com/OracleIDM

More Related Content

What's hot

Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud finalOracleIDM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copyOracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-extOracleIDM
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementNishant Kaushik
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0debbanerjee
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplifiedvraopolisetti
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCloudIDSummit
 
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CloudIDSummit
 
Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2OracleIDM
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerProlifics
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 

What's hot (17)

Od webcast-cloud-fraud final
Od webcast-cloud-fraud finalOd webcast-cloud-fraud final
Od webcast-cloud-fraud final
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
 
Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 

Viewers also liked

Секреция в ЖКТ и её регуляция
Секреция в ЖКТ и её регуляцияСекреция в ЖКТ и её регуляция
Секреция в ЖКТ и её регуляцияcrasgmu
 
5 Things You Should Not Share In Office
5 Things You Should Not Share In Office5 Things You Should Not Share In Office
5 Things You Should Not Share In OfficeRashi Gupta
 
Science Eportfolio Powerpoint
Science Eportfolio PowerpointScience Eportfolio Powerpoint
Science Eportfolio Powerpointlimmervin24
 
«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»
«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»
«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»Татьяна Казанцева
 
Outland res. brochure 6 30-11 brown
Outland res. brochure 6 30-11 brownOutland res. brochure 6 30-11 brown
Outland res. brochure 6 30-11 brownJessica Luth
 
Gemaco Kerstfolder 2011
Gemaco Kerstfolder 2011Gemaco Kerstfolder 2011
Gemaco Kerstfolder 2011Tom Vandeneede
 
Cacciatore: Läpinäkyviä, näkymättömiä, vaikeita? Pojan kriisin huomaaminen ja...
Cacciatore: Läpinäkyviä, näkymättömiä, vaikeita? Pojan kriisin huomaaminen ja...Cacciatore: Läpinäkyviä, näkymättömiä, vaikeita? Pojan kriisin huomaaminen ja...
Cacciatore: Läpinäkyviä, näkymättömiä, vaikeita? Pojan kriisin huomaaminen ja...Kouluterveyskysely
 
D 151120 4_u_source_product_v062 kopie
D 151120 4_u_source_product_v062 kopieD 151120 4_u_source_product_v062 kopie
D 151120 4_u_source_product_v062 kopiehelmuth zimmermann
 
философия возраста
философия возрастафилософия возраста
философия возрастаsoratniki
 
Present
PresentPresent
Presentlesnoy
 
Кардиотонические средства
Кардиотонические средстваКардиотонические средства
Кардиотонические средстваcrasgmu
 
Colors scramble 2
Colors scramble 2Colors scramble 2
Colors scramble 2Les Davy
 
5 books for your business understanBooks
5 books for your business understanBooks5 books for your business understanBooks
5 books for your business understanBooksHaridas Patel
 
Androides y Mazmorras. Part I (dungeons & robots)
Androides y Mazmorras. Part I (dungeons & robots)Androides y Mazmorras. Part I (dungeons & robots)
Androides y Mazmorras. Part I (dungeons & robots)Jorge Barroso
 

Viewers also liked (20)

Секреция в ЖКТ и её регуляция
Секреция в ЖКТ и её регуляцияСекреция в ЖКТ и её регуляция
Секреция в ЖКТ и её регуляция
 
5 Things You Should Not Share In Office
5 Things You Should Not Share In Office5 Things You Should Not Share In Office
5 Things You Should Not Share In Office
 
Science Eportfolio Powerpoint
Science Eportfolio PowerpointScience Eportfolio Powerpoint
Science Eportfolio Powerpoint
 
Sangue
SangueSangue
Sangue
 
«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»
«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»
«Профессиональная кухня школьного блоггера, или Для чего нужен блог?»
 
Evo Brochure
Evo BrochureEvo Brochure
Evo Brochure
 
Speeches
SpeechesSpeeches
Speeches
 
Outland res. brochure 6 30-11 brown
Outland res. brochure 6 30-11 brownOutland res. brochure 6 30-11 brown
Outland res. brochure 6 30-11 brown
 
Gemaco Kerstfolder 2011
Gemaco Kerstfolder 2011Gemaco Kerstfolder 2011
Gemaco Kerstfolder 2011
 
Cacciatore: Läpinäkyviä, näkymättömiä, vaikeita? Pojan kriisin huomaaminen ja...
Cacciatore: Läpinäkyviä, näkymättömiä, vaikeita? Pojan kriisin huomaaminen ja...Cacciatore: Läpinäkyviä, näkymättömiä, vaikeita? Pojan kriisin huomaaminen ja...
Cacciatore: Läpinäkyviä, näkymättömiä, vaikeita? Pojan kriisin huomaaminen ja...
 
Slide 1
Slide  1Slide  1
Slide 1
 
D 151120 4_u_source_product_v062 kopie
D 151120 4_u_source_product_v062 kopieD 151120 4_u_source_product_v062 kopie
D 151120 4_u_source_product_v062 kopie
 
философия возраста
философия возрастафилософия возраста
философия возраста
 
Present
PresentPresent
Present
 
Кардиотонические средства
Кардиотонические средстваКардиотонические средства
Кардиотонические средства
 
Unit 57 terminology becky doyle
Unit 57 terminology becky doyleUnit 57 terminology becky doyle
Unit 57 terminology becky doyle
 
Colors scramble 2
Colors scramble 2Colors scramble 2
Colors scramble 2
 
5 books for your business understanBooks
5 books for your business understanBooks5 books for your business understanBooks
5 books for your business understanBooks
 
Androides y Mazmorras. Part I (dungeons & robots)
Androides y Mazmorras. Part I (dungeons & robots)Androides y Mazmorras. Part I (dungeons & robots)
Androides y Mazmorras. Part I (dungeons & robots)
 
Intel open stack v1
Intel open stack v1Intel open stack v1
Intel open stack v1
 

Similar to Ioug webcast entitlements in check

Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Terremark Intro
Terremark IntroTerremark Intro
Terremark Intromartyburks
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Oss Bss Testing
Oss Bss TestingOss Bss Testing
Oss Bss TestingAhmed Adel
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachRahul Neel Mani
 
Fortify On Demand and ShadowLabs
Fortify On Demand and ShadowLabsFortify On Demand and ShadowLabs
Fortify On Demand and ShadowLabsjasonhaddix
 
Dvsl enterprise solutions.v1
Dvsl enterprise solutions.v1Dvsl enterprise solutions.v1
Dvsl enterprise solutions.v1dejavusolutions
 
How to bake in quality in agile scrum projects
How to bake in quality in agile scrum projectsHow to bake in quality in agile scrum projects
How to bake in quality in agile scrum projectsSantanu Bhattacharya
 
Collaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an IntroductionCollaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an IntroductionStrongback Consulting
 
Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...
Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...
Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...ORACLE USER GROUP ESTONIA
 
Hexaware QATS Capabilities 2012
Hexaware QATS Capabilities 2012Hexaware QATS Capabilities 2012
Hexaware QATS Capabilities 2012bfeltingoff
 
What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0Novell
 
Infopulse presentation
Infopulse presentation Infopulse presentation
Infopulse presentation HI-TECH_Org_Ua
 
ANIn Ahmedabad Jul 2023 |Waterfall & Agile- The Mindset in building scalable ...
ANIn Ahmedabad Jul 2023 |Waterfall & Agile- The Mindset in building scalable ...ANIn Ahmedabad Jul 2023 |Waterfall & Agile- The Mindset in building scalable ...
ANIn Ahmedabad Jul 2023 |Waterfall & Agile- The Mindset in building scalable ...AgileNetwork
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerOracleIDM
 

Similar to Ioug webcast entitlements in check (20)

Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Terremark Intro
Terremark IntroTerremark Intro
Terremark Intro
 
Key Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation FirewallsKey Policy Considerations When Implementing Next-Generation Firewalls
Key Policy Considerations When Implementing Next-Generation Firewalls
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Oss Bss Testing
Oss Bss TestingOss Bss Testing
Oss Bss Testing
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Identity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. MookheyIdentity & Access Management by K. K. Mookhey
Identity & Access Management by K. K. Mookhey
 
Fortify On Demand and ShadowLabs
Fortify On Demand and ShadowLabsFortify On Demand and ShadowLabs
Fortify On Demand and ShadowLabs
 
Dvsl enterprise solutions.v1
Dvsl enterprise solutions.v1Dvsl enterprise solutions.v1
Dvsl enterprise solutions.v1
 
How to bake in quality in agile scrum projects
How to bake in quality in agile scrum projectsHow to bake in quality in agile scrum projects
How to bake in quality in agile scrum projects
 
Collaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an IntroductionCollaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an Introduction
 
Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...
Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...
Oracle Software.Hardware.Complete positioning versus competition - Shahin Tar...
 
Hexaware QATS Capabilities 2012
Hexaware QATS Capabilities 2012Hexaware QATS Capabilities 2012
Hexaware QATS Capabilities 2012
 
What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0
 
Infopulse presentation
Infopulse presentation Infopulse presentation
Infopulse presentation
 
ANIn Ahmedabad Jul 2023 |Waterfall & Agile- The Mindset in building scalable ...
ANIn Ahmedabad Jul 2023 |Waterfall & Agile- The Mindset in building scalable ...ANIn Ahmedabad Jul 2023 |Waterfall & Agile- The Mindset in building scalable ...
ANIn Ahmedabad Jul 2023 |Waterfall & Agile- The Mindset in building scalable ...
 
Microsoft Service Manager 2010
Microsoft Service Manager 2010Microsoft Service Manager 2010
Microsoft Service Manager 2010
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
 

More from OracleIDM

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 

More from OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 

Recently uploaded

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Recently uploaded (20)

What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Ioug webcast entitlements in check

  • 1. <Insert Picture Here> Keeping Entitlements In Check Roger Wigenstam, Sr. Director of Product Management, Oracle VireshGarg, Director Product Management, Oracle
  • 2. This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.
  • 3. Agenda • Application Security • Solution Overview • Authorization • Compliance • A Platform Approach
  • 4. Application Security is Fragmented Non-Standard Brittle Hardcoded Entitlement Catalogs Access Control Authorization Inflexible authorization increases complexity
  • 5. The Challenge is Scale  Focused on Reducing Risk • A Few App Administrators  Driven to Reduce Cost  Rolling or Monthly Attestation • Handful of Audit Staff
  • 6. Solutions Oracle Identity Oracle Entitlements Analytics Server
  • 7. The Approach Application Security Value Chain Define Access Monitor Secure Audit Catalog Request Enforce Data Certify  Entitlements  Search  Context  Redact  Risk  Policies  Provisioning  External Auth  Authorize  Remediation
  • 8. Enforce and Monitor Context and Dynamic Authorization Audit & Risk Application Owners Developers Application Security Platform Location Time Device
  • 9. Oracle Identity Analytics Enterprise Roles • Access Certification • Role Modeling Identity • Closed Loop Warehouse Remediation • Business-Friendly Reporting • Risk Aggregation
  • 10. Platform Reduces Cost vs. Point Solutions Oracle IAM Suite Benefits Advantage 48% Cost Savings Increased End- User Productivity Reduced Risk • Emergency Access • End-user Self Service • 11% faster • 30% faster • Suspend/revoke/de- • 46% faster 46% More Responsive Enhanced Agility provision end user access • Integrate a new app faster with the IAM infrastructure • 64% faster • Integrate a new end user • 73% faster 35% Fewer Audit Deficiencies Enhanced role faster into the solution • Reduces unauthorized • 14% fewer Security and access Compliance • 35% fewer • Reduces audit deficiencies Reduced Total • Reduces total cost of IAM • 48% lower Cost initiatives Source: Aberdeen “Analyzing point solutions vs. platform” 2011
  • 11. Why Oracle ? • Complete, Open and Integrated • Actionable Compliance • Massively Scalable • Platform Synergies • Customer References
  • 12. On-Demand Webcast Series Customers Discussing Results of Platform Approach Building a Secure Cloud Cisco’s Platform Approach SaskTel Cisco Systems Platform for Compliance Platform Best Practices ING Bank Agilent Technologies Register To Watch at: www.oracle.com/identity

Editor's Notes

  1. Questions For Roger:0. roger – we use the word entitlements a lot – can you provide a definition ?Roger – Since you started your career developing Ebusiness security .. Set some context around what we mean by by application security ?Roger - When we say brittle access control what do we mean ?Roger – Can you provide some real world customer examples where this problem is happening perhaps from a couple verticals ?What’s changing that’s forcing customers to re-evaluate the way they secure apps ?( Hard coded business logic in one app – with thousands of apps )
  2. Questions for VireshViresh - Now you are focused on governance and compliance – provide an overview ?Viresh - How are customers dealing with the problem today ?Viresh – speaking of scale can you discuss some of the highest scaling metrics?Viresh – can you provide some specific customer examples ?
  3. So today Oracle’s answer to this problem is two product offerings Viresh – Can you provide an overview of Oracle Identity Analytics ?Viresh – What are some of the suite level integrations with Analytics ?Viresh - Can you describe how an organization get started with Analytics what’s involved in using the product ?Viresh – what types of apps are customers deploying analytics on first ?Roger – Can you provide an overview of Oracle entitlements server ?Roger – Can you discuss how oracle is applying Entitlements server to next gen fusion apps and fusion middleware?Roger – what are some of the main use cases Roger – How can a customer get started Roger – do these solutions only apply to the oracle stack or other apps as well.
  4. Roger – Can you walk us through the chain.
  5. Roger questions:Roger focusing on OES can you discuss how this operationally fits into an environment ?How are policies defined and how are they consumed ?Roger What systems does it connect to and what are the components that must be deployed ? What is configuration vs custom ?Roger Can you discuss how auditors use OES ? Roger - focusing on scale – can you share some scale data points ?Roger – can you talk about context aware security ?
  6. Question for Neil-Talk to us about some of the benefits of leveraging OIA. Can you define what we mean by enterprise roles ?What does it mean to mine roles and what is involved ?What is the lifecycle of a role ?How does OIA handle risk ?What do we mean by closed loop ?What are the most important forensics that customers use ?
  7. Roger:I know platform is very important to you can you describe what we mean by platform security services ?Can you talk about what components make up the oracle Identity platform ? -
  8. Viresh why is the combination of these two solutions so powerful describe the synergies ?Viresh – where can a customer download the products or read more.
  9. As mentioned before you have a unique opportunity to learn from and get questions answered by our customers. There are on demand webcasts that are available today at oracle.com/identity. SaskTel discussed how they are leveraging Oracle IDM to offer cloud based services to their customersCisco discussed their unique approach to consolidate their identity program into a platform ING Bank - discussed how a platform with integrated administration and governance reduced cost and improved compliance
  10. Join The Community