SlideShare uma empresa Scribd logo
1 de 12
<Insert Picture Here>




External Authorization Round Table Discussion
Vijay Chauhan, Head of Access Management ,Barclays
Marc Boroditsky, VP Product Management, Oracle
Roger Wigenstam, Sr. Director Product Management, Oracle
This document is for informational purposes. It is not a commitment to
            deliver any material, code, or functionality, and should not be relied upon in
            making purchasing decisions. The development, release, and timing of any
            features or functionality described in this document remains at the sole
            discretion of Oracle. This document in any form, software or printed matter,
            contains proprietary information that is the exclusive property of
            Oracle. This document and information contained herein may not be
            disclosed, copied, reproduced or distributed to anyone outside Oracle
            without prior written consent of Oracle. This document is not part of your
            license agreement nor can it be incorporated into any contractual
            agreement with Oracle or its subsidiaries or affiliates.




©2012 Oracle Corporation
Agenda

                            • Opening Remarks

                            • Barclays Capital Case

                            • Round Table Discussion

                            • Road Map




©2012 Oracle Corporation
Securing
                               Data & Applications
                           Marc Boroditsky, VPProduct Management




©2012 Oracle Corporation
Focus on: Securing Data & Applications
           Context Aware External Authorization

                           • ~50% of mission critical apps home grown
                           • Increased audit & regulatory pressure
                           • Increased focus on data security
                           • Complex business policy
                           • Brittle security & change control




©2012 Oracle Corporation
Business Landscape Applying External Authorization
             Cross Industry


                Content      Collaboration




                Privacy      Confidentiality




            Regulations          Audit




©2012 Oracle Corporation
Entitlements Server
                                   Product Overview

                           Roger Wigenstam, Sr. Director Product Management




©2012 Oracle Corporation
What is Entitlements Server
                    Dynamic Authorization to Data & Applications

                                              • SOA Security
                                              • Web Access Control
                                              • Application Transactions
                                              • Relational Database Information
                                              • Portals




©2012 Oracle Corporation
Real-Time Authorization
               Sub-millisecond Authorization Response Time

                                        • Massively scalable External Authorization
                                          Management
                                        • Scales easily to large number of protected
                                          resources
                                          • Hundreds of millions of users
                                          • Hundreds of thousands of roles
                                          • From small workgroups to mission-critical
                                            deployments
                                        • Authorization checks enforced with real-time
                                          latency




©2012 Oracle Corporation
Entitlements Server: Part of Oracle Identity Platform
                    Complete, Open and Integrated

                    Identity Governance              Access Management                       Directory Services

            • Password Management                • Single Sign-On & Federation         • LDAP Storage
            • Self-Service Request & Approval    • Web Services Security               • Virtualized Identity Access
            • Roles based User Provisioning      • Authentication & Fraud Prevention   • LDAP Synchronization
            • Analytics, Policy Monitoring       • Authorization & Entitlements        • Next Generation (Java) Directory
            • Risk-based Access Certification    • Access from Mobile Devices




                                                Platform Security Services
                                                Identity Services for Developers



©2012 Oracle Corporation
Oracle Entitlements Server
              Summary


                 Strategic         Heterogeneous                   Leading

 • Oracle’s strategic           • Standards based          • Most mature solution
   authorization solution
                                • Multi-language support   • Largest install base
 • Embedded in many of
   our Applications             • Multi-middleware
 • Embedded in Identity         • Multi-database
   Platform




©2012 Oracle Corporation
www.oracle.com/Identity


                           www.facebook.com/OracleIDM
                           www.twitter.com/OracleIDM


                           blogs.oracle.com/OracleIDM



©2012 Oracle Corporation

Mais conteúdo relacionado

Mais procurados

Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportions
OracleIDM
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
OracleIDM
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
OracleIDM
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
OracleIDM
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
OracleIDM
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
OracleIDM
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
debbanerjee
 

Mais procurados (18)

Scaling identity to internet proportions
Scaling identity to internet proportionsScaling identity to internet proportions
Scaling identity to internet proportions
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Biz case-keynote-final copy
Biz case-keynote-final copyBiz case-keynote-final copy
Biz case-keynote-final copy
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Securing access inabyod-world-final-ext
Securing access inabyod-world-final-extSecuring access inabyod-world-final-ext
Securing access inabyod-world-final-ext
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Building a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity ManagementBuilding a Strong Foundation for Your Cloud with Identity Management
Building a Strong Foundation for Your Cloud with Identity Management
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid EnvironmentCIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
 
ITIL - IAM (Access Management)
ITIL - IAM (Access Management)ITIL - IAM (Access Management)
ITIL - IAM (Access Management)
 
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
 
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
CIS 2015- Understanding & Managing Discretionary Access: The TAO of Entitleme...
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
Mobile Security - Words like Bring Your Own Device, and Federation sounds fam...
 
IBM Security Identity & Access Manager
IBM Security Identity & Access ManagerIBM Security Identity & Access Manager
IBM Security Identity & Access Manager
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 

Destaque

дорога к храму
дорога к храмудорога к храму
дорога к храму
SHTERN850715
 
CSS3 Transitions
CSS3 TransitionsCSS3 Transitions
CSS3 Transitions
hstryk
 
Lifestyle unit 4
Lifestyle unit 4Lifestyle unit 4
Lifestyle unit 4
Les Davy
 
Me, Myself, and Facebook
Me, Myself, and FacebookMe, Myself, and Facebook
Me, Myself, and Facebook
Caitlin Leahy
 

Destaque (19)

Forss: Seksuaalinen häirintä ja väkivalta netissä
Forss: Seksuaalinen häirintä ja väkivalta netissäForss: Seksuaalinen häirintä ja väkivalta netissä
Forss: Seksuaalinen häirintä ja väkivalta netissä
 
Wiss: TEAviisari
Wiss: TEAviisari Wiss: TEAviisari
Wiss: TEAviisari
 
дорога к храму
дорога к храмудорога к храму
дорога к храму
 
PHP Sessions and Non-Sessions
PHP Sessions and Non-SessionsPHP Sessions and Non-Sessions
PHP Sessions and Non-Sessions
 
Doc1
Doc1Doc1
Doc1
 
Brics
BricsBrics
Brics
 
CSS3 Transitions
CSS3 TransitionsCSS3 Transitions
CSS3 Transitions
 
02_07_WH_ChrisWalker
02_07_WH_ChrisWalker02_07_WH_ChrisWalker
02_07_WH_ChrisWalker
 
Aef4 week 2
Aef4 week 2Aef4 week 2
Aef4 week 2
 
Lifestyle unit 4
Lifestyle unit 4Lifestyle unit 4
Lifestyle unit 4
 
Centro de desarrollo_infantil_kamelot_original
Centro de desarrollo_infantil_kamelot_originalCentro de desarrollo_infantil_kamelot_original
Centro de desarrollo_infantil_kamelot_original
 
Production log
Production logProduction log
Production log
 
Me, Myself, and Facebook
Me, Myself, and FacebookMe, Myself, and Facebook
Me, Myself, and Facebook
 
Kudavi 1.25.2016
Kudavi 1.25.2016Kudavi 1.25.2016
Kudavi 1.25.2016
 
Delação de Sérgio Machado na íntegra
Delação de Sérgio Machado na íntegraDelação de Sérgio Machado na íntegra
Delação de Sérgio Machado na íntegra
 
Manifesto do Congresso Internacional realizado na Unesp Bauru
Manifesto do Congresso Internacional realizado na Unesp BauruManifesto do Congresso Internacional realizado na Unesp Bauru
Manifesto do Congresso Internacional realizado na Unesp Bauru
 
Media the cut
Media the cutMedia the cut
Media the cut
 
Imágenes para el_wiki_sistema_nervioso
Imágenes para el_wiki_sistema_nerviosoImágenes para el_wiki_sistema_nervioso
Imágenes para el_wiki_sistema_nervioso
 
apa
apaapa
apa
 

Semelhante a Round table guide

Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
OracleIDM
 
Addvantum Oracle Profile OFMW
Addvantum  Oracle Profile OFMW Addvantum  Oracle Profile OFMW
Addvantum Oracle Profile OFMW
Addvantum
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
OracleIDM
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
Delivery Centric
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
OracleIDM
 
Alain ozan keynote zagreb.ppt [compatibility m
Alain ozan keynote zagreb.ppt [compatibility mAlain ozan keynote zagreb.ppt [compatibility m
Alain ozan keynote zagreb.ppt [compatibility m
Oracle Hrvatska
 

Semelhante a Round table guide (20)

Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements Server
 
Addvantum Oracle Profile OFMW
Addvantum  Oracle Profile OFMW Addvantum  Oracle Profile OFMW
Addvantum Oracle Profile OFMW
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Gartner Catalyst Savvis Cloud API Case Study
Gartner Catalyst   Savvis Cloud API Case StudyGartner Catalyst   Savvis Cloud API Case Study
Gartner Catalyst Savvis Cloud API Case Study
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
CARA User Interface for Oracle WebCenter
CARA User Interface for Oracle WebCenterCARA User Interface for Oracle WebCenter
CARA User Interface for Oracle WebCenter
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3
 
Fusion Middleware 11g Keynote Foundation For Innovation
Fusion Middleware 11g Keynote Foundation For InnovationFusion Middleware 11g Keynote Foundation For Innovation
Fusion Middleware 11g Keynote Foundation For Innovation
 
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
 
Oracle Fusion Middleware,foundation for innovation
Oracle Fusion Middleware,foundation for innovationOracle Fusion Middleware,foundation for innovation
Oracle Fusion Middleware,foundation for innovation
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Oracle a TBIZ2011
Oracle a TBIZ2011Oracle a TBIZ2011
Oracle a TBIZ2011
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Alain ozan keynote zagreb.ppt [compatibility m
Alain ozan keynote zagreb.ppt [compatibility mAlain ozan keynote zagreb.ppt [compatibility m
Alain ozan keynote zagreb.ppt [compatibility m
 
Vikas Jain Past Work
Vikas Jain Past WorkVikas Jain Past Work
Vikas Jain Past Work
 
Übersicht Cloud Control - EM 12c
Übersicht Cloud Control - EM 12cÜbersicht Cloud Control - EM 12c
Übersicht Cloud Control - EM 12c
 

Mais de OracleIDM

Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
OracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
OracleIDM
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
OracleIDM
 

Mais de OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Round table guide

  • 1. <Insert Picture Here> External Authorization Round Table Discussion Vijay Chauhan, Head of Access Management ,Barclays Marc Boroditsky, VP Product Management, Oracle Roger Wigenstam, Sr. Director Product Management, Oracle
  • 2. This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates. ©2012 Oracle Corporation
  • 3. Agenda • Opening Remarks • Barclays Capital Case • Round Table Discussion • Road Map ©2012 Oracle Corporation
  • 4. Securing Data & Applications Marc Boroditsky, VPProduct Management ©2012 Oracle Corporation
  • 5. Focus on: Securing Data & Applications Context Aware External Authorization • ~50% of mission critical apps home grown • Increased audit & regulatory pressure • Increased focus on data security • Complex business policy • Brittle security & change control ©2012 Oracle Corporation
  • 6. Business Landscape Applying External Authorization Cross Industry Content Collaboration Privacy Confidentiality Regulations Audit ©2012 Oracle Corporation
  • 7. Entitlements Server Product Overview Roger Wigenstam, Sr. Director Product Management ©2012 Oracle Corporation
  • 8. What is Entitlements Server Dynamic Authorization to Data & Applications • SOA Security • Web Access Control • Application Transactions • Relational Database Information • Portals ©2012 Oracle Corporation
  • 9. Real-Time Authorization Sub-millisecond Authorization Response Time • Massively scalable External Authorization Management • Scales easily to large number of protected resources • Hundreds of millions of users • Hundreds of thousands of roles • From small workgroups to mission-critical deployments • Authorization checks enforced with real-time latency ©2012 Oracle Corporation
  • 10. Entitlements Server: Part of Oracle Identity Platform Complete, Open and Integrated Identity Governance Access Management Directory Services • Password Management • Single Sign-On & Federation • LDAP Storage • Self-Service Request & Approval • Web Services Security • Virtualized Identity Access • Roles based User Provisioning • Authentication & Fraud Prevention • LDAP Synchronization • Analytics, Policy Monitoring • Authorization & Entitlements • Next Generation (Java) Directory • Risk-based Access Certification • Access from Mobile Devices Platform Security Services Identity Services for Developers ©2012 Oracle Corporation
  • 11. Oracle Entitlements Server Summary Strategic Heterogeneous Leading • Oracle’s strategic • Standards based • Most mature solution authorization solution • Multi-language support • Largest install base • Embedded in many of our Applications • Multi-middleware • Embedded in Identity • Multi-database Platform ©2012 Oracle Corporation
  • 12. www.oracle.com/Identity www.facebook.com/OracleIDM www.twitter.com/OracleIDM blogs.oracle.com/OracleIDM ©2012 Oracle Corporation

Notas do Editor

  1. On 15 September 2011, UBS announced it had lost $2 billion due to an unauthorized tradeperformed by an unauthorized trader. With this loss, UBS has joined an infamous group of financialinstitutions that have suffered due to unauthorized trades performed by unauthorized traders.Between UBS, SociétéGénérale, and Barings Bank, authorization failures cost more than $9 billion.Authorization poses challenges to every enterprise, not just those in the financial sector. The natureof these challenges has evolved. The problems of authorization are complex and only becomingmore so. Authorization is complex in a general sense, but more specifically, reconcilingadministrative and runtime authorization information is complicated. This complexity increases thenumber of people and time needed to figure out why a person could perform an action in a system.This rising tide of complexity does not bode well for enterprises.
  2. Add stories for Marc from various industries / segmentsFin Services – will be covered by BarclaysContent providers Federal AgenciesHealthcare / Consent Management
  3. History / maturity of productGive examples of these different things
  4. Use Oracle examples to illustrate – Fusion Apps, Public Cloud, SaaS, Fusion Middleware, WebCenter
  5. Talking point: strategic for our own solutions and highlight heterogeneous message – not only Oracle
  6. Join our community for regular updates on content and hear about upcoming events and news.