SlideShare uma empresa Scribd logo
1 de 18
Baixar para ler offline
<Insert Picture Here>




Building a Comprehensive Identity Roadmap
This document is for informational purposes. It is not a commitment
o deliver any material, code, or functionality, and should not be relie
 pon in making purchasing decisions. The development, release,
 nd timing of any features or functionality described in this documen
 emains at the sole discretion of Oracle. This document in any form
 oftware or printed matter, contains proprietary information that is th
 xclusive property of Oracle. This document and information
 ontained herein may not be disclosed, copied, reproduced or
 istributed to anyone outside Oracle without prior written consent of
Oracle. This document is not part of your license agreement nor ca
  be incorporated into any contractual agreement with Oracle or its
 ubsidiaries or affiliates.
Agenda

         •  Getting Started

         •  Roadmap Complexity

         •  Quick Wins

         •  Increasing Maturity

         •  The Cloud
Building a Roadmap is Complicated
It’s Task of Prioritization and Opportunity Overlap

                         Business vs.      Compliance
                         Application          vs.
                           Owners            Risk



                                            Timeline
                          Multiple
                                                &
                          Priorities
                                           Deliverables
Assess The Business Opportunity
Compliance, Risk and Economic Opportunities
 Security               Efficiency                Scale



                                            3X

ulatory Compliance     User Productivity
nal Governance         Operational Cost
                                              New Customers
urity Risk             Opportunity Cost
                                              Quality of Servi
Look at Top Regulatory Audit Exposures

 who        •  Aggregation of    •  Enforcing        •  Review        •  Conflicti
separated      access               strong              regulated        privilege
ave            privileges           passwords           application      busines
 nts           beyond job role      regular user        access and       firewall
                                    password reset      attestation
ed          Excessive            Password            Access           Separatio
ts          Access               Aging               Certification    of Duties


 out of 10 customers tackle the orphaned account issue first
 ook at role management and analytics to address certification
Role based provisioning to address excessive access
Assess Existing Infrastructure
Gap of Current Capability vs. Desired Capability

inistration   Authentication       Authorization         Audit


-boarding     •  Sign-on          •  Declarative    •  Entitlement
-boarding                            security          review
              •  Password aging
f-service                         •  Fine-grained   •  Role lifecycle
              •  Web-SSO             entitlements
vileged                                             •  Access
              •  Password         •  Federated
cess                                                   remediation
                 management          access
egated
min
Roadmap Capabilities to Maturity
          Prioritize on Complexity and Control
Control




                                                              Risk Analytics
                                                                             External
                                             User Lifecycle Role Management
                                                                             SOA Sec
                                           User Self Service Adaptive Access
                              Single-Sign On
                          Password Management
                  Master User Index
                Central Authentication

                                    Complexity
          LOW                                                                HIGH
Start with Figuring out Who’s Who
  Corporate Directories are Low Hanging Fruit
 for Convergence Opportunities
 uce number of separate identity silos
                                                                                         Virtual
ansion Shared Services vs. LOB IT
mpliance and Security Requirements
                                                       Business Affiliates/
                                                          Subsidiaries
                                                                                 Storage         Synch

               Corporate
                LDAP

                                                                              “Convergence drives Unificat
               Customer
                LDAP
                                                                              •  Lower TCO
                                 Employees/Partners/
                                     Customers
    Extranet
                           LOB
                                                                              •  Lower Administration Effort
     LDAP
                                                                              •  Improved User Experience
Passwords Provide Quick Win
Quick ROI on Compliance and Reduce Risk

     140%                                   12 months
         ROI                               Payback period




                                           50%         Of Help Desk Calls are
                                                       Password Related


                                           $40         Average Cost of Every Call to
                                                       Help Desk Change Password



 Source: ESSO Buyer’s Guide:, Sep 2011
                                           86%         Of Hacking Involve Lost, Stole
                                                       or Weak Credentials
                                                        Verizon Data Breach Report , 2010
 Link: http://bit.ly/OperantConditioning
Address Internal Governance
Administration and Risk Analytics

  Accountability for access
                                      User
  Measuring effectiveness & risk
                                   Provisioning
  Prevent audit violations
  Sustainable audit process                       Certificatio
  Coverage across systems                           Review
Declarative Security & External Authorization
Secure SOA, Portals, Data and Home Grown Apps


                   •         •  Protect Your Data
                   • 
       App




                             •  Secure Transactions
                        •    •  Central Audit Control
             App




                        •    •  SoD Checking
                   •         •  Role Based Access
                   • 
       App
Administration: Connect it All
Shopping Cart Convenience
                                                •  User Satisfaction
                                                •  Reduce Helpdesk Cos
                                                •  Audit Trail
                                   Roles,       •  Track Access Privilege
                                Entitlements,
og
                                    Apps        •  Standardize Workflow

              Cart
                                                •  Simplify New Service
                                                   Rollout


      Users

                     Managers
Become Context Aware
 Prevent and Detect Anomalous Behavior
                                                                                            Reducing Surface Area of
                                                                                                    Attacks


                                                                                                               89%

                                                                                                                        Preventable
                                                                                                                        Breaches




                     ROI            Payback period          Total benefits          Total costs          Net benefits

                    106%              12.1 months                $6,007,641        ($2,912,513)           $3,095,129




ource: “Adaptive Access Management: An ROI Study” a commissioned study conducted by IDC on behalf of Oracle,
                                                   2010
Dimensions of Cloud Identity Management


                          Are you building         Do you need IdM but don
e you using cloud                              c      want to maintain it?
     apps?          c       cloud apps?




dentity as a                Identity as a          Identity Hosted a
idge to Cloud           Foundation for Cloud        a Cloud Service
dentity Management Bridges the Gap

                                                                                                   Adaptive Access
d
                                                                                                   •  Context / Risk Aw
                                                                       Administration
                                                                                                   •  Anomaly Detectio
                                                                       •  Role Mgmt
                                                                                                   •  Fraud Detection
                                                                       •  Provisioning
d Cloud
                                         Access                        •  Identity Analytics
                                         •  Single-sign on             •  Certification

            Scalable Repository          •  Password policy

            •  Identity Synch            •  Authorization policy
                                         •  Entitlements                                             Risk Managem
            •  Identity Virtualization
use Cloud   •  Reporting                                                                   Audit
                                                                   Administration
                                            AuthN and AuthZ
                           Identity
               Tools                     Point Solutions                       Platform                      Intellige
Summary

rioritize Based on Complexity
ssess Existing Infrastructure
ook For Quick Wins
lan For Cloud
www.oracle.com/Identity


www.facebook.com/OracleIDM
www.twitter.com/OracleIDM


blogs.oracle.com/OracleIDM

Mais conteúdo relacionado

Mais procurados

Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
Hitachi ID Systems, Inc.
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
OracleIDM
 
Round table guide
Round table guideRound table guide
Round table guide
OracleIDM
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
OracleIDM
 
Ioug webcast entitlements in check
Ioug webcast entitlements in checkIoug webcast entitlements in check
Ioug webcast entitlements in check
OracleIDM
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
OracleIDM
 

Mais procurados (19)

IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 
Round table guide
Round table guideRound table guide
Round table guide
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
SAP Identity Management Overview
SAP Identity Management OverviewSAP Identity Management Overview
SAP Identity Management Overview
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Ioug webcast entitlements in check
Ioug webcast entitlements in checkIoug webcast entitlements in check
Ioug webcast entitlements in check
 
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOTSailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
Sailpoint Training | Best Sailpoint IdentityIQ Online Course -GOT
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
 
The Path to IAM Maturity
The Path to IAM MaturityThe Path to IAM Maturity
The Path to IAM Maturity
 

Destaque

SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
OracleIDM
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
Delivery Centric
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
OracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
OracleIDM
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
OracleIDM
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
wardell henley
 

Destaque (19)

SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
The Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity ModelThe Gartner IAM Program Maturity Model
The Gartner IAM Program Maturity Model
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
ING webcast platform
ING webcast platformING webcast platform
ING webcast platform
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
CISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access ManagementCISSP Prep: Ch 6. Identity and Access Management
CISSP Prep: Ch 6. Identity and Access Management
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
GraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access ManagementGraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access Management
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
 

Semelhante a Platform approach-series-building a-roadmap-finalv1

Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalGartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-final
OracleIDM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
OracleIDM
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle BH
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
OracleIDM
 
Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2
OracleIDM
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
ruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
ruiruitang
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
Noam Bunder
 
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
investorrelation
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
vraopolisetti
 

Semelhante a Platform approach-series-building a-roadmap-finalv1 (20)

Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalGartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-final
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010Oracle tech fmw-05-idm-neum-16.04.2010
Oracle tech fmw-05-idm-neum-16.04.2010
 
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy ModelerRole Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
 
What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
 
Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2Agilent webcast bestpractices-platformv2
Agilent webcast bestpractices-platformv2
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 
Identity access management
Identity access management Identity access management
Identity access management
 
Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements Server
 
Enhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor AuthenticationEnhancing Novell SecureLogin with Multi-factor Authentication
Enhancing Novell SecureLogin with Multi-factor Authentication
 
Dev ops intro
Dev ops  introDev ops  intro
Dev ops intro
 
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
 
TH e-GIF on SOA Using Open Enterprise Architecture
TH e-GIF on SOA Using Open Enterprise ArchitectureTH e-GIF on SOA Using Open Enterprise Architecture
TH e-GIF on SOA Using Open Enterprise Architecture
 
Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412Aberdeen ppt-iam integrated-db-06 20120412
Aberdeen ppt-iam integrated-db-06 20120412
 
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 SymplifiedAtlanta Salesforce UG Meeting 2/23/2011 Symplified
Atlanta Salesforce UG Meeting 2/23/2011 Symplified
 

Mais de OracleIDM

Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
OracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
OracleIDM
 

Mais de OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Platform approach-series-building a-roadmap-finalv1

  • 1. <Insert Picture Here> Building a Comprehensive Identity Roadmap
  • 2. This document is for informational purposes. It is not a commitment o deliver any material, code, or functionality, and should not be relie pon in making purchasing decisions. The development, release, nd timing of any features or functionality described in this documen emains at the sole discretion of Oracle. This document in any form oftware or printed matter, contains proprietary information that is th xclusive property of Oracle. This document and information ontained herein may not be disclosed, copied, reproduced or istributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor ca be incorporated into any contractual agreement with Oracle or its ubsidiaries or affiliates.
  • 3. Agenda •  Getting Started •  Roadmap Complexity •  Quick Wins •  Increasing Maturity •  The Cloud
  • 4. Building a Roadmap is Complicated It’s Task of Prioritization and Opportunity Overlap Business vs. Compliance Application vs. Owners Risk Timeline Multiple & Priorities Deliverables
  • 5. Assess The Business Opportunity Compliance, Risk and Economic Opportunities Security Efficiency Scale 3X ulatory Compliance   User Productivity nal Governance   Operational Cost   New Customers urity Risk   Opportunity Cost   Quality of Servi
  • 6. Look at Top Regulatory Audit Exposures who •  Aggregation of •  Enforcing •  Review •  Conflicti separated access strong regulated privilege ave privileges passwords application busines nts beyond job role regular user access and firewall password reset attestation ed Excessive Password Access Separatio ts Access Aging Certification of Duties out of 10 customers tackle the orphaned account issue first ook at role management and analytics to address certification Role based provisioning to address excessive access
  • 7. Assess Existing Infrastructure Gap of Current Capability vs. Desired Capability inistration Authentication Authorization Audit -boarding •  Sign-on •  Declarative •  Entitlement -boarding security review •  Password aging f-service •  Fine-grained •  Role lifecycle •  Web-SSO entitlements vileged •  Access •  Password •  Federated cess remediation management access egated min
  • 8. Roadmap Capabilities to Maturity Prioritize on Complexity and Control Control Risk Analytics External User Lifecycle Role Management SOA Sec User Self Service Adaptive Access Single-Sign On Password Management Master User Index Central Authentication Complexity LOW HIGH
  • 9. Start with Figuring out Who’s Who Corporate Directories are Low Hanging Fruit for Convergence Opportunities uce number of separate identity silos Virtual ansion Shared Services vs. LOB IT mpliance and Security Requirements Business Affiliates/ Subsidiaries Storage Synch Corporate LDAP “Convergence drives Unificat Customer LDAP •  Lower TCO Employees/Partners/ Customers Extranet LOB •  Lower Administration Effort LDAP •  Improved User Experience
  • 10. Passwords Provide Quick Win Quick ROI on Compliance and Reduce Risk 140% 12 months ROI Payback period 50% Of Help Desk Calls are Password Related $40 Average Cost of Every Call to Help Desk Change Password Source: ESSO Buyer’s Guide:, Sep 2011 86% Of Hacking Involve Lost, Stole or Weak Credentials Verizon Data Breach Report , 2010 Link: http://bit.ly/OperantConditioning
  • 11. Address Internal Governance Administration and Risk Analytics   Accountability for access User   Measuring effectiveness & risk Provisioning   Prevent audit violations   Sustainable audit process Certificatio   Coverage across systems Review
  • 12. Declarative Security & External Authorization Secure SOA, Portals, Data and Home Grown Apps •  •  Protect Your Data •  App •  Secure Transactions •  •  Central Audit Control App •  •  SoD Checking •  •  Role Based Access •  App
  • 13. Administration: Connect it All Shopping Cart Convenience •  User Satisfaction •  Reduce Helpdesk Cos •  Audit Trail Roles, •  Track Access Privilege Entitlements, og Apps •  Standardize Workflow Cart •  Simplify New Service Rollout Users Managers
  • 14. Become Context Aware Prevent and Detect Anomalous Behavior Reducing Surface Area of Attacks 89% Preventable Breaches ROI Payback period Total benefits Total costs Net benefits 106% 12.1 months $6,007,641 ($2,912,513) $3,095,129 ource: “Adaptive Access Management: An ROI Study” a commissioned study conducted by IDC on behalf of Oracle, 2010
  • 15. Dimensions of Cloud Identity Management Are you building Do you need IdM but don e you using cloud c want to maintain it? apps? c cloud apps? dentity as a Identity as a Identity Hosted a idge to Cloud Foundation for Cloud a Cloud Service
  • 16. dentity Management Bridges the Gap Adaptive Access d •  Context / Risk Aw Administration •  Anomaly Detectio •  Role Mgmt •  Fraud Detection •  Provisioning d Cloud Access •  Identity Analytics •  Single-sign on •  Certification Scalable Repository •  Password policy •  Identity Synch •  Authorization policy •  Entitlements Risk Managem •  Identity Virtualization use Cloud •  Reporting Audit Administration AuthN and AuthZ Identity Tools Point Solutions Platform Intellige
  • 17. Summary rioritize Based on Complexity ssess Existing Infrastructure ook For Quick Wins lan For Cloud