This is a Safe Harbor Front slide, one of two Safe Harbor Statement slides included in this template.
One of the Safe Harbor slides must be used if your presentation covers material affected by Oracle’s Revenue Recognition Policy
To learn more about this policy, e-mail: Revrec-americasiebc_us@oracle.com
For internal communication, Safe Harbor Statements are not required. However, there is an applicable disclaimer (Exhibit E) that should be used, found in the Oracle Revenue Recognition Policy for Future Product Communications. Copy and paste this link into a web browser, to find out more information.
http://my.oracle.com/site/fin/gfo/GlobalProcesses/cnt452504.pdf
For all external communications such as press release, roadmaps, PowerPoint presentations, Safe Harbor Statements are required. You can refer to the link mentioned above to find out additional information/disclaimers required depending on your audience.
Slide 4: The Most Significant Re-Architecture in 20 Years
BIG IDEA – IDENTITY IS TIED TO EVERY MAJOR BUSINESS TRANSFORMATION
The transformation is pervasive across every vertical
Public sector and government – Governments around the world are modernizing systems to provide better access to citizens
Example: State of California will let you renew your drivers license on line and apply for welfare services online
Healthcare – Is a transaction business and depends on the collaboration of patients, providers, payers and hospitals
If you are a payer today .. you transforming to support the Obama care health information exchange requirements You are transforming to provide better service online to compete.
Every manufacturing company has to become a manufacturing services company
Example Rolls Royce has to provide telemetry data from every engine real time.
The applications that power these businesses have to be built on monolithic platforms that do not scale..
The platforms for the modern business will built on
Service Oriented – for flexibility and cohesion
BPM – for collaboration and participation
Big Data – For better business analytics
Fast Data – For the massive scale that will be expected for social, mobile and cloud
ALL OF THIS IS TURNING SECURITY UPSIDE DOWN AND INSIDE OUT.
Speaker Notes:
Background Information:
Security In Depth Reference Architecture
Oracle Enterprise Transformation Series
http://www.oracle.com/technetwork/topics/entarch/oracle-wp-security-ref-arch-1918345.pdf
So Oracle’s approach is to start inside… and Engineer for security at every layer of the stack
While we can’t control how many hackers try to attack our business we can control the configuration of our system internally and the security of our infrastructure from the applications to storage.
First – we think about security inside each layer
At the apps level this means access to data and business transactions – proactively looking for fraud
At the middleware level it means integrating identity and access management horizontally across all components in middleware
At the VM level we incorporate security into Java so that in in memory databases and apps can be built on a foundation of security
At the OS layer it means VM isolation directly on Solaris and Trusted extensions for Solaris – trusted by the us military
At the Infrastructure later it means security without performance overhead so we include hardware acceleration for encryption
At the file system encryption on disk and ZFS
And in the ILM process we include symmetric encryption across multiple ILM tiers.
Second we secure between each later – because data flows up and down the stack… access control and data security is pervasive
We provide monitoring and patch management with Oracle Enterprise manager that allows the entire stack to be monitored patched for total controls. Hardware and software optimized together.
Third we secure between systems
The way data is passed to other systems portals etc. So that data is portable for example data masking that allows data to leave the data center masking private data and preserving relational integrity
In collaboration with Federated authentication and adaptive access to detect fraud and prevent intrusion
With SOA security at the middleware level to stop payloads from being breached
At the portal laver with document level security that addresses compliance and data privacy rules
Defense in DepthThe defense in depth strategy advocates the use of multiple defense mechanisms, in various forms, in multiple layers, in order to protect one’s resources as opposed to a single barrier or perimeter. It aims to win the war of attrition rather than rely on the strength (or vulnerability) of a single barrier.
The architecture promotes a defense in depth strategy in several ways. First, it recommends the use of secure platforms for all information processing and storage. Each application layer (web tier, application tier, database tier, etc.) is expected to enforce the necessary forms of security.
Second, it promotes security at multiple layers of the processing stack, i.e., network layer security, host security, application security, and data layer security. Specifically, access control and encryption are applied throughout the architecture in different layers.
And lastly, it provides a common security infrastructure that ties all these layers together. Each layer can draw from the same security services and identity and access information, enabling a seamless secure flow of information throughout the system.
Slide 4: The Most Significant Re-Architecture in 20 Years
BIG IDEA – IDENTITY IS TIED TO EVERY MAJOR BUSINESS TRANSFORMATION
The transformation is pervasive across every vertical
Public sector and government – Governments around the world are modernizing systems to provide better access to citizens
Example: State of California will let you renew your drivers license on line and apply for welfare services online
Healthcare – Is a transaction business and depends on the collaboration of patients, providers, payers and hospitals
If you are a payer today .. you transforming to support the Obama care health information exchange requirements You are transforming to provide better service online to compete.
Every manufacturing company has to become a manufacturing services company
Example Rolls Royce has to provide telemetry data from every engine real time.
The applications that power these businesses have to be built on monolithic platforms that do not scale..
The platforms for the modern business will built on
Service Oriented – for flexibility and cohesion
BPM – for collaboration and participation
Big Data – For better business analytics
Fast Data – For the massive scale that will be expected for social, mobile and cloud
ALL OF THIS IS TURNING SECURITY UPSIDE DOWN AND INSIDE OUT.
To summarize, Oracle IDM
Is a comprehensive mix of best of breed products.
is built on open standards and is hot-pluggable
Is used by world’s leading companies and is proven for enterprise grade deployments
ensures security for private and public clouds
Delivers a revolutionary architectural framework that offers security as services to apps
Available today.