Mais conteúdo relacionado Semelhante a Con8828 justifying and planning a successful identity management upgrade final (20) Con8828 justifying and planning a successful identity management upgrade final3. Safe Harbor Statement
The following is intended to outline our general product direction. It is
intended for information purposes only, and may not be incorporated
into any contract. It is not a commitment to deliver any material, code,
or functionality, and should not be relied upon in making purchasing
decision. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole
discretion of Oracle.
3
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Insert Information Protection Policy Classification from Slide 12
4. Program Agenda
Market Trends
Planning an Upgrade
Customer Presentation
Q&A
4
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
7. Identity Core to Business Transformation
Mobile
BYOD complicates
privacy
Enterprise and
personal data
Poor device, app and
data security
Cloud
On premise, private,
public apps
Identity for SaaS apps
Cloud-based access
portals
Fragments identity
Unified approach iOS,
Android, ?
7
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Social
Users want to use
social ID
Simplify registration
and marketing
Trust is difficult
OAuth & OpenID
leading to other IdPs
Internet of Things
Millions, billions of
devices connecting
Generate massive data
Need real time policy
decisions, security and
lifecycle management
Platform
Simplification,
defragmentation
Address full identity
lifecycle
Reduce Total Cost of
Ownership
Remove latency &
integration errors
MB
8. So what has changed?
8
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
10. Identity Management Portfolio – 11gR2
Modern, Innovative & Converged
Governance
Access
Directory
Password Reset
Web Single Sign-on
LDAP Storage
Privileged Accounts
Federation
Virtual Directory
Access Request
Mobile, Social & Cloud
Meta Directory
Roles Based Provisioning
Role Mining
Attestation
Separation of Duties
External Authorization
SOA Security
Integrated ESSO
Token Services
Fraud Detection
Platform Security Services
10
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
12. What’s New in Identity Governance
Complete Identity Governance Platform
Automated
Provisioning
Collaborative Access Certification
Common Governance Infrastructure
Approvals
Workflow
Role
Management
Secure Privileged Account Management
Enhanced Performance and Tooling
Reduced Costs and Risks
12
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
Intuitive
Access
Request
IDENTITY
GOVERNANCE
Privileged
Account
Management
14. What’s New in Access Management
Seamless Access to Any Application from Any Device
Secure API management
API Security
Device &
Location
Context
Fraud
Prevention
Performance and Scale
Support for Android Mobile OS
Websphere Certification
Secure
Transactions
MANAGEMENT
Single
Sign-on
Additional Social ID providers
Accelerated adoption of Cloud
and Mobile Applications
14
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
16. What’s New in Directory Services
Empower and enable new digital identities
Extreme
Scale
Scale to 10’s of Billions of Users
Location Based Search for mobile users
Optimized
Solution
Available
Integrated &
Interoperable
Simplified administrative experience
Optimize for Device performance
Scale and Performance to enable
new Business Initiatives
16
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Multi-layer
Security
DIRECTORY
SERVICES
High
Performance
18. Oracle Fusion Middleware
Business Innovation Platform for the Enterprise and Cloud
Complete and Integrated
Web
Social
Mobile
Best-in-class
User Engagement
Business
Process
Management
Open standards
Content
Management
Service Integration
Business
Intelligence
Data Integration
Identity Management
Development
Tools
18
Cloud Application
Foundation
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Enterprise
Management
On-premise and Cloud
Foundation for Oracle Fusion
Applications and Oracle Cloud
19. Why Upgrade?
Jump to a Modernized Identity Management Platform
Reduce costs and risks with complete identity
governance
Seamless application access from any device
Low risk, high value upgrades and consolidation
Empower and enable new digital identities
19
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
21. Considerations before Upgrade
Are you aware of the pre-requisites?
Do you know your end-state?
Do you need to do Data Migration?
Do you have a test plan?
Do you have a backup?
21
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
22. Deployment Considerations
Review architecture impact
Inventory customizations – What will be left behind?
Do you need to do Data Migration?
Are you familiar with the Release Notes?
Did you review the Pre-Upgrade Reports?
22
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
23. Considerations during Upgrade
Will upgrade be in-place or out-of-place
Do you need to do Data Migration?
Are you familiar with the Release Notes?
Did you review the Pre-Upgrade Reports?
23
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
25. Customer Panel
Anthony Undorf
Senior Architect Identity Services,
ETS
25
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Peter Boyle
Head of Identity
Services , BT
Shanti Vellanki
Sr. Manager,
Middleware and
Integration ,
Safeway
26. Demo Pods
Moscone South
Oracle Identity
Governance Suite:
Managing
Privileged Accounts
from Your Identity
Platform
26
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Moscone South
Oracle Identity
Governance Suite:
Complete Identity
Lifecycle
Management
Moscone South
Identity
Management
Monitoring with
Oracle Enterprise
Manager
27. Sessions not to miss
Monday
1.45 pm – 2:45 pm
• CON8810: Who Should have Access to What: Better Risk
Management Identity Governance
Moscone West, Room 2018
• CON8811: Converged Identity Governance for Speeding up
Business and Reducing Cost
Moscone West, Room 2018
• CON8828: Justifying and Planning a successful Identity
Management Upgrade
Moscone West, Room 2018
Tuesday
10:30 am – 11:30am
Wednesday
1.15 pm – 2.15 pm
27
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
28. Join the Oracle Community
Twitter
twitter.com/OracleIDM
Facebook
facebook.com/OracleIDM
Oracle Blogs
Blogs.oracle.com/OracleIDM
Oracle.com/Identity
28
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Notas do Editor This is our Safe Harbor statement…Please take a moment to review it… Oracle’s cloud solutions solve the problems with your current environment.Vertically integrated solutionComplete platform, including integration, management and security for cloud, across the complete stack.Complete through the stack, from applications to disk. Slide 21: Platform reduces costTaking a platform approach can save up to 48%Reduce audit deficiencies by 35%And make organizations 46% more responsive With Fusion Middleware, you can extend and maximize your existing technology investment with the same technologies used in Fusion Applications, including embedded analytics and social collaboration, and mobile and cloud computing. Oracle’s complete SOA platform lets your IT organization rapidly design, assemble, deploy, and manage adaptable business applications and—with Oracle’s business process management tools—even bring the task of modeling business processes directly to the business analysts. Oracle Business Intelligence foundation brings together all your enterprise data sources in a single, easy-to-use solution, delivering consistent insights whether it’s through ad hoc queries and analysis, interactive dashboards, scorecards, OLAP, or reporting. And, your existing enterprise applications can leverage the rich social networking capabilities and content sharing that users have come to expect in consumer software. Oracle Fusion Middleware is based on 100 percent open standards, so you aren’t locked into one deployment model when your business requirements change.