Enviar pesquisa
Carregar
FulcrumWay Webinar - Fusion Security
•
1 gostou
•
361 visualizações
A
actjax
Seguir
Tecnologia
Vista de apresentação de diapositivos
Denunciar
Compartilhar
Vista de apresentação de diapositivos
Denunciar
Compartilhar
1 de 31
Baixar agora
Baixar para ler offline
Recomendados
Con3928 horton session con3928 fusion app on-premise installation lessons lea...
Con3928 horton session con3928 fusion app on-premise installation lessons lea...
Berry Clemens
Top Tips For AppD Adoption Success at AppD Global Tour London
Top Tips For AppD Adoption Success at AppD Global Tour London
AppDynamics
Con8439 fusion apps customs to ebs
Con8439 fusion apps customs to ebs
Berry Clemens
Con8493 simplified ui 2013 tailoring dubois_evers_teter_o'broin_uob_partner
Con8493 simplified ui 2013 tailoring dubois_evers_teter_o'broin_uob_partner
Berry Clemens
Fusion_apps extending and customizations
Fusion_apps extending and customizations
Berry Clemens
Reconsidering applications 10-90-90, AMIS UX Event
Reconsidering applications 10-90-90, AMIS UX Event
Getting value from IoT, Integration and Data Analytics
The best way to design secure software products
The best way to design secure software products
LabSharegroup
Con8442 fusion functional setup manager
Con8442 fusion functional setup manager
Berry Clemens
Recomendados
Con3928 horton session con3928 fusion app on-premise installation lessons lea...
Con3928 horton session con3928 fusion app on-premise installation lessons lea...
Berry Clemens
Top Tips For AppD Adoption Success at AppD Global Tour London
Top Tips For AppD Adoption Success at AppD Global Tour London
AppDynamics
Con8439 fusion apps customs to ebs
Con8439 fusion apps customs to ebs
Berry Clemens
Con8493 simplified ui 2013 tailoring dubois_evers_teter_o'broin_uob_partner
Con8493 simplified ui 2013 tailoring dubois_evers_teter_o'broin_uob_partner
Berry Clemens
Fusion_apps extending and customizations
Fusion_apps extending and customizations
Berry Clemens
Reconsidering applications 10-90-90, AMIS UX Event
Reconsidering applications 10-90-90, AMIS UX Event
Getting value from IoT, Integration and Data Analytics
The best way to design secure software products
The best way to design secure software products
LabSharegroup
Con8442 fusion functional setup manager
Con8442 fusion functional setup manager
Berry Clemens
Pulowaras
Pulowaras
herbalfood
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
actjax
1.suji(2)
1.suji(2)
herbalfood
Reduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniques
actjax
Conocimiento cientifico y tecnologico
Conocimiento cientifico y tecnologico
urodneyl
History of jamu
History of jamu
herbalfood
Kencur
Kencur
herbalfood
Annatto leaves
Annatto leaves
herbalfood
Basil leaves amadea et al.
Basil leaves amadea et al.
herbalfood
White Turmeric
White Turmeric
herbalfood
Biji adas
Biji adas
herbalfood
Gambir
Gambir
herbalfood
Jintan putih ppt
Jintan putih ppt
herbalfood
Health benefits of chrysanthemum
Health benefits of chrysanthemum
herbalfood
Herbal pala
Herbal pala
herbalfood
Describing places
Describing places
nuriamen
El Panel de Control
El Panel de Control
fernandoguffante
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
FulcrumWay
Con8819 context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
OracleIDM
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
Melody Liu
Securing Mobile Device Access
Securing Mobile Device Access
Artur Alves
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
Oracle
Mais conteúdo relacionado
Destaque
Pulowaras
Pulowaras
herbalfood
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
actjax
1.suji(2)
1.suji(2)
herbalfood
Reduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniques
actjax
Conocimiento cientifico y tecnologico
Conocimiento cientifico y tecnologico
urodneyl
History of jamu
History of jamu
herbalfood
Kencur
Kencur
herbalfood
Annatto leaves
Annatto leaves
herbalfood
Basil leaves amadea et al.
Basil leaves amadea et al.
herbalfood
White Turmeric
White Turmeric
herbalfood
Biji adas
Biji adas
herbalfood
Gambir
Gambir
herbalfood
Jintan putih ppt
Jintan putih ppt
herbalfood
Health benefits of chrysanthemum
Health benefits of chrysanthemum
herbalfood
Herbal pala
Herbal pala
herbalfood
Describing places
Describing places
nuriamen
El Panel de Control
El Panel de Control
fernandoguffante
Destaque
(17)
Pulowaras
Pulowaras
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
Fulcrum way webinar top 10 advanced control to improve bottomline oct 22 2013
1.suji(2)
1.suji(2)
Reduce sod access violations with effective roles management techniques
Reduce sod access violations with effective roles management techniques
Conocimiento cientifico y tecnologico
Conocimiento cientifico y tecnologico
History of jamu
History of jamu
Kencur
Kencur
Annatto leaves
Annatto leaves
Basil leaves amadea et al.
Basil leaves amadea et al.
White Turmeric
White Turmeric
Biji adas
Biji adas
Gambir
Gambir
Jintan putih ppt
Jintan putih ppt
Health benefits of chrysanthemum
Health benefits of chrysanthemum
Herbal pala
Herbal pala
Describing places
Describing places
El Panel de Control
El Panel de Control
Semelhante a FulcrumWay Webinar - Fusion Security
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
FulcrumWay
Con8819 context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
OracleIDM
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
Melody Liu
Securing Mobile Device Access
Securing Mobile Device Access
Artur Alves
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
Oracle
Security Testing for Testing Professionals
Security Testing for Testing Professionals
TechWell
Oracle ADF Architecture TV - Design - Designing for Security
Oracle ADF Architecture TV - Design - Designing for Security
Chris Muir
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Oracle
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery
TechWell
200 SNYPR Fundamentals Training Guide.pdf
200 SNYPR Fundamentals Training Guide.pdf
PowJr
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
CruzIbarra161
Oracle Fusion functional setup manager
Oracle Fusion functional setup manager
Berry Clemens
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
mfrancis
Future of Oracle Forms AUSOUG 2013
Future of Oracle Forms AUSOUG 2013
Chris Muir
Secure Engineering Practices for Java
Secure Engineering Practices for Java
Tim Ellison
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Nadine Schoene
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for Java
Chris Bailey
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine Data
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine Data
DataWorks Summit
Re-Think Mobile… Beyond Mobile‐First: Oracle Mobile Strategy and Overview
Re-Think Mobile… Beyond Mobile‐First: Oracle Mobile Strategy and Overview
Guatemala User Group
Security Testing for Testing Professionals
Security Testing for Testing Professionals
TechWell
Semelhante a FulcrumWay Webinar - Fusion Security
(20)
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
FulcrumWay - Ed. Webinar - Role & Responsibility Design Techniques that Stren...
Con8819 context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
Securing Mobile Device Access
Securing Mobile Device Access
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
Security Testing for Testing Professionals
Security Testing for Testing Professionals
Oracle ADF Architecture TV - Design - Designing for Security
Oracle ADF Architecture TV - Design - Designing for Security
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Better Security Testing: Using the Cloud and Continuous Delivery
Better Security Testing: Using the Cloud and Continuous Delivery
200 SNYPR Fundamentals Training Guide.pdf
200 SNYPR Fundamentals Training Guide.pdf
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Criterion 1A - 4 - MasteryPros and Cons Thoroughly compares the
Oracle Fusion functional setup manager
Oracle Fusion functional setup manager
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Smart and Highly Scalable Lifecycle Management for Embedded Devices - Thomas ...
Future of Oracle Forms AUSOUG 2013
Future of Oracle Forms AUSOUG 2013
Secure Engineering Practices for Java
Secure Engineering Practices for Java
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
Slidedeck Demo Kino: Street Warrior. Mobile Sicherheit auf unseren Straßen - ...
JavaOne2013: Secure Engineering Practices for Java
JavaOne2013: Secure Engineering Practices for Java
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine Data
Edge to AI: Analytics from Edge to Cloud with Efficient Movement of Machine Data
Re-Think Mobile… Beyond Mobile‐First: Oracle Mobile Strategy and Overview
Re-Think Mobile… Beyond Mobile‐First: Oracle Mobile Strategy and Overview
Security Testing for Testing Professionals
Security Testing for Testing Professionals
Último
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Stefan Dietze
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
FIDO Alliance
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
Stephen Perrenod
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
ScyllaDB
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Paige Cruz
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
FIDO Alliance
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
Memoori
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
alexjohnson7307
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
Patrick Viafore
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
Srushith Repakula
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
FIDO Alliance
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
FIDO Alliance
Overview of Hyperledger Foundation
Overview of Hyperledger Foundation
Hyperleger Tokyo Meetup
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Leah Henrickson
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
Lorenzo Miniero
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
BrainSell Technologies
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
FIDO Alliance
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
FIDO Alliance
Último
(20)
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Overview of Hyperledger Foundation
Overview of Hyperledger Foundation
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
FulcrumWay Webinar - Fusion Security
1.
Oracle Fusion Security
Simplified FulcrumWay Leading Provider of Enterprise Risk Assessment Mitigation and Remediation Solutions Enterprise Risk Management Financial Close Monitor Advanced Controls Catalog Enterprise Audit GRC Monitor Leverage Technology: Move Your Business Forward™ Give me a lever long enough and a fulcrum on which to place it, and I shall move the world - Archimedes Copyright ©. Fulcrum Information Technology, Inc.
2.
Simplifying Security with Fusion
Applications Security Console Nigel King Vice President Ryan Golden Software Architect
3.
The following is
intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
4.
Program Agenda Challenges
in Security Administration Shaping Security to Match Your Business Staying Ahead of Changes Demo Q&A 4 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
5.
Challenges in Security Administration 5 Copyright
© 2013, Oracle and/or its affiliates. All rights reserved.
6.
The Security Diaspora
One tool for role design One tool for user provisioning One tool for data security management One tool for supporting end user access and authorization issues One tool for upgrade assessment 6 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
7.
NO GLOBAL VIEW 7 Copyright
© 2013, Oracle and/or its affiliates. All rights reserved.
8.
Envision a Global
View Single UI for all security activities Visualization of the entire security model Assisted search across all security artifacts 8 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
9.
Single Entry Point 9 Copyright
© 2013, Oracle and/or its affiliates. All rights reserved.
10.
Visualizing the Security
Model 10 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
11.
Shape Security to Match
Your Business 11 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
12.
Role Design and
Customization Challenges Leverage the Fusion Applications security reference model Customize roles from a business or menu perspective Match privileges to on-screen elements Adjust the reference roles Test the resulting user interface 12 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
13.
Role Copy 13 Copyright ©
2013, Oracle and/or its affiliates. All rights reserved.
14.
Menu Simulator 14 Copyright ©
2013, Oracle and/or its affiliates. All rights reserved.
15.
Stay Ahead of
Changes 15 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
16.
Product Upgrade Challenges
Disruptive new functionality Identifying the new functionality Fitting new functionality to your existing model Identifying users that need to be (re)trained Offering a complete security assessment 16 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
17.
Role Comparison 17 Copyright ©
2013, Oracle and/or its affiliates. All rights reserved.
18.
Graphic Section Divider DEMO 18 Copyright
© 2013, Oracle and/or its affiliates. All rights reserved.
19.
Scenario: Assessing Product
Upgrade Impact Solutions Unified Search Compare Roles Security Model Visualization 19 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
20.
Scenario: Help Desk
User Missing a Menu Solutions Unified Search Security Model Visualization Graph Pivot Menu Simulator Copy Role 20 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.
21.
FulcrumWay Fusion Security and
Oracle Enterprise Governance Risk and Compliance by Tony Olivo Sr. Client Services Director Copyright © FulcrumWay Page 21 www.fulcrumway.com
22.
Fusion RBAC Security GRC Security
Components User Job Role Duty Role Data Role Privileges Module Document State Action Perspective Copyright © FulcrumWay Page 22 www.fulcrumway.com
23.
Fusion RBAC Security Manage User
Security – User Management Manage user community across the application. A user’s access is the combination of all their assigned job roles Copyright © FulcrumWay Page 23 www.fulcrumway.com
24.
Fusion RBAC Security Using Perspectives
on Objects Perspectives are used to secure data. – A Perspective node is assigned to an object. – That object is only available to a user that has that perspective node assigned to their data role for that object. Sample Perspective ABC Company North America New York Latin America Mexico Chicago Europe London Paris Los Angeles Copyright © FulcrumWay Page 24 www.fulcrumway.com
25.
Fusion RBAC Security Using Perspectives
on Objects Perspectives can be associated with various objects – AACG / TCG • Continuous Controls • Models • Incidents – EGRCM • Process • Risk • Control Copyright © FulcrumWay Page 25 www.fulcrumway.com
26.
Fusion RBAC Security EGRC Objects
Secured by RBAC AACG and TCG Models – View and Manage Access Continuous Controls – View and Manage Access Incidents – View, Manage and Investigator Access Copyright © FulcrumWay Page 26 www.fulcrumway.com
27.
Fusion RBAC Security EGRC Objects
Secured by RBAC EGRCM Following EGRCM objects have View, Manage, Review and Approve job roles – – – – – – Copyright © FulcrumWay Perspective Process Risk Control Issue Remediation Plans Page 27 www.fulcrumway.com
28.
Fusion RBAC Security Sample Job
Roles OOTB INCIDENT RESULT MANAGER JOB ROLE Copyright © FulcrumWay Page 28 www.fulcrumway.com
29.
Fusion RBAC Security Sample Job
Roles OOTB INCIDENT RESULT MANAGER JOB DATA ROLE Copyright © FulcrumWay Page 29 www.fulcrumway.com
30.
Fusion RBAC Security Sample Custom
Job Roles CUSTOM INCIDENT RESULT MANAGER JOB DATA ROLE Copyright © FulcrumWay Page 30 www.fulcrumway.com
31.
Thank You! Join
us on LinkedIn to view Summary and Q&A webinar and discussion Copyright © FulcrumWay Page 31 www.fulcrumway.com
Baixar agora