Enterprise Identity Management Reference Architecture
|
|
- Felicia Barton
- 8 years ago
- Views:
Transcription
1 <Insert Picture Here> Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE
2 Agenda Introduction Virtualization Access Management Provisioning Demo Architecture Reference Architecture Provisioning Virtualization & Access Management (WebSSO) Solution Components Scenarios Conclusion Q&A <Insert Picture Here>
3 Introduction <Insert Picture Here>
4 Basic Concepts What is Identity Management? Identity Management (IdM) is an integrated system of business processes, policies and technologies that enable organizations to facilitate and control their users' access to critical online applications and resources while protecting confidential personal and business information from unauthorized users. -Wikipedia
5 Basic Concepts Virtualization A way to provide a consolidated view of distributed user identity from multiple, often disparate, data sources without having to construct an entire directory infrastructure. Implemented in the form of middleware, a virtual directory is a lightweight service that operates between applications and identity data. A virtual directory receives queries and directs them to the appropriate data sources -Wikipedia
6 Basic Concepts Access Management Web Access Management controls access to Web resources, providing: * Authentication Management * Policy-based Authorization * Audit & Reporting Services (optional) * Single sign-on Convenience -Wikipedia
7 Basic Concepts Enterprise Provisioning Typically managed by a CIO, and necessarily involves human resources and IT departments cooperating to: give users access to data repositories or grant authorization to systems, networks applications and databases based on a unique user identity, and appropriate for their use hardware resources, such as computers, mobile phones and pagers. As its most central responsibility, the provisioning process monitors access rights and privileges to ensure the security of an enterprise's resources and user privacy. As a secondary responsibility, it ensures compliance and minimizes the vulnerability of systems to penetration and abuse. -Wikipedia
8 Demo Architecture <Insert Picture Here>
9 Building Blocks of Architecture Access Management (AAA) WebSSO, FGA, Risk Management App 1 App 2 App 3 Virtualization LDAP v2/3.0 MS AD DB Provisioning Trusted Res. Trusted Res.
10
11 Virtualization Identity Information Proxy 3 User Repositories MS Active Directory Employees Sun iplanet Dir. Server Contractors MyCompany CRM Database - Customers Virtualized View: dc=mycompany,dc=ovd LDAP listener Employees: ou=employees,dc=mycompany,dc=ovd Contractors: ou=contractors,dc=mycompany,dc=ovd Customers: ou=customers,dc=mycompany,dc=ovd Alternative Listeners: LDAP, DSML, WS, Custom etc.
12 Virtualization
13 Solution Components <Insert Picture Here>
14 Oracle Identity Manager Oracle Identity Manager Benefits Reduced administration cost Cost effective regulatory compliance Improved security Improved service level Features Identity life-cycle management for the heterogeneous enterprise Approval and provisioning workflows Complete integration solutions: OOTB connectors & Adapter Factory Deep integration to ERP and HRMS Audit and compliance reporting and process automation
15 Oracle Access Manager Oracle Access Manager (Web) Benefits Centralized and consistent security across heterogeneous environments Reduced administration cost Improved end user experience Features Web single-sign-on Common policy management Multi-level, multi-factor authentication management Workflow driven self-service and delegated administration Web Services interfaces
16 Oracle Virtual Directory Oracle Virtual Directory Benefits Rapid application deployment Tighter controls on identity data Real-time identity information access Features Modern Java & Web Services technology Virtualization, proxy, join & routing capabilities Superior extensibility Scalable multi-site administration Direct data access
17 Demo Scenarios <Insert Picture Here>
18 Sample User HR Data Userid: umut First Name: umut Last Name: ceyhan Organization: Consultancy / Sales / HR / Finance Employee Type: Full-Time / Part-Time / Contractor User Title: Sales Consultant / Account Manager etc. Location: Athens / London / Berlin
19 Identity Roles Consultancy Role (Members of Consultancy Organization) Target Resources: MS Active Directory (OU=Consultancy) MS Exchange (mail quota 5MB) Oracle Internet Directory Denied Resources: iplanet Dir. Server Sales Role (Members of Sales Organization) Target Resources: MS Active Directory (OU=Sales) MS Exchange (mail quota 10MB) Oracle Internet Directory Denied Resources: iplanet Dir. Server
20 Identity Roles Contractor Role (Contractors) Target Resources: Sun iplanet Dir. Server Denied Resources: MS Active Directory MS Exchange Self Service Request Resource without Role: Mobile Phone
21 Demo Scenarios: Identity Lifecycle - 1 On-boarding (JOIN) Reconciliation: HR Consultant Role Provision Targets: AD, Exchange, OID Reconciliation: HR Contractor Role Provision Targets: iplanet Dir. Server Manual Creation of Customer Identity On Sample CRM application
22 Demo Scenarios: Virtualization Walking through Virtualized Services MS Active Dir., iplanet, Oracle DB Features of OVD
23 Demo Scenarios: Access Management & WebSSO Access Management & WebSSO Services Checking Central AuthN, AuthZ, Auditing Policies: Employee Portal, Contractor Portal, Customer Portal Brief info for integration with custom applications WNA Integration for better user convenience
24 Demo Scenarios: Identity Lifecycle - 2 Change in User Profile (MOVE) Trusted Recon for Identity Profile Attributes from HR Organization Change: Consultancy Sales Role Change in HR: Contractor Consultant Role
25 Demo Scenarios: Delegated Administration Self Service Request for Mobile Phone Request for entitlements Approval workflow for Mobile Phone Review & Modify of requested entitlements by Manager Manual Provisioning workflow Manual provisioning by Delegated Administrator
26 Demo Scenarios: Identity Lifecycle - 3 Off-boarding (LEAVE) Status change in user information in HR Automatical user deprovisioning
27 Demo Scenarios: Compliance and Auditing Reporting Operational Reports: Who has what etc. 22 Historical Reports: Who had what etc. 15 Attestation Configuration and Running: Mobile Phone Attest. SOD features Access policies
28 Conclusion <Insert Picture Here>
29 Leader in Magic Quadrants User Provisioning, H Web Access Management, H Magic Quadrant Disclaimer: The Magic Quadrant is copyrighted by Gartner, Inc. and is reused with permission. The Magic Quadrant is a graphical representation of a marketplace at and for a specific time period. It depicts Gartner's analysis of how certain vendors measure against criteria for that marketplace, as defined by Gartner. Gartner does not endorse any vendor, product or service depicted in the Magic Quadrant, and does not advise technology users to select only those vendors placed in the "Leaders" quadrant. The Magic Quadrant is intended solely as a research tool, and is not meant to be a specific guide to action. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
30 Market Leader According To Oracle has established itself as Leader. - The Forrester Wave: Identity And Access Management, Q Oracle reached the top of our evaluation through a combination of the breadth, depth, interoperability, and packaging of its IAM features alongside the strategy and current state of market execution on its application-centric identity vision. - The Forrester Wave: Identity And Access Management, Q1 2008
31 Service Oriented Security SECURITY AS A SERVICE!
32 Service Oriented Security Business Drivers Security is not an infrastructural issue any more NO BOLTING-ON SECURITY Security Always at Application lifecycle SOA is perfect technological foundation
33 Service-Oriented Security Expected Solutions SOA Enabled Applications Security as a Service Fine Grained Authorization Identity Governance
34 Q & A <Insert Picture Here>
35
36 Case Studies <Insert Picture Here>
37 Case Study Swedish Police BUSINESS CHALLENGE Establish secure and centralized mgt of identities across multiple enterprise directories & applications - incorporation of process workflows End users and managers have poor visibility into in-process and completed provisioning workflows Protect against locally administered changes to user entitlements directly w/in the target systems Poor mgt of user certificates within RSA Keon ORACLE SOLUTION Oracle Identity Manager selected over Novell in March 2005 Highly flexible and extensible product Superior support for onboarding and analysis mechanisms for orphan account detection Support for rollback/undo and escalation Mature product with solid architecture Flexibility and customizability RESULTS Significant cost avoidance (est. over $1M) for identity synchronization, workflow & administration functionality Establishment of automated role & rule-based assignment of access privileges to all managed systems Improvement of information quality by centralizing user records and cleaning existing data Detailed and easily accessible audit functionality
38 Case Study Polish Police BUSINESS CHALLENGE Highest requirement for security and availability Need for strong encryption (PKI), delegated management Support for local and central applications Environment has Non touchable applications and also is not a 100% reliable Network ORACLE SOLUTION Oracle Identity and Access Management Suite Oracle Internet Directory in Multimaster Cluster HA Oracle VPD Oracle Consulting Services Oracle Partner Services RESULTS Single Clustered LDAP repository of all employees and authentication attributes Single point of Identity creation (including PKI) 24/7 availability - local distributed LDAP s with fallback to central server Access Policies management both central and delegated
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
More informationIdentity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services
Identity Management Overview Bill Nelson bill.nelson@gca.net Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)
More informationSun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
More informationIDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
More informationSecurity and Identity
Security and Identity Management J. Alberto Yépez Vice President Oracle Corporation Agenda Corporate Background Business Drivers Oracle s Strategy Case Studies Oracle s Differentiation
More informationORACLE FUSION MIDDLEWARE PROFILE
ORACLE FUSION MIDDLEWARE PROFILE Corporate Addvantum, is a global service provider of Information Technology consulting and services, to customers in GCC region. Addvantum has technical delivery centers
More informationQ3FY11 Oracle OPN Specialized Security Pillar Executive Webcast
Q3FY11 Oracle OPN Specialized Security Pillar Executive Webcast Today s Agenda Welcome Security Inside/Out OPN Specialized Requirements Q3 Web Cast Series Technology Play Books XMonth Next Steps Q & A
More informationThe Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
More informationHow to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options
More informationKey New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance
Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics
More informationOracle Role Manager. An Oracle White Paper Updated June 2009
Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship
More information<Insert Picture Here> Oracle I&AM: Service Oriented Security - a flexible Security Foundation For Next-Generation Applications
Oracle I&AM: Service Oriented Security - a flexible Security Foundation For Next-Generation Applications Christian Patrascu, Principal Product Manager Oracle Fusion Middleware Agenda
More informationApache Syncope OpenSource IdM
Apache Syncope OpenSource IdM Managing Identities in Enterprise Environments Version 1.3 / 2012-07-26 Apache Syncope OpenSource IdM by http://syncope.tirasa.net/ is licensed under a Creative Commons Attribution
More informationOracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
More informationAltiris Asset Management Suite 7.0
Altiris Asset Management Suite 7.0 1 Today s Agenda 1 Asset Management Overview 2 What's New in AMS 7 3 New Process Automations (workflow) 4 Migration from 6.x to 7.0 Altiris Asset Management Suite 7.0
More information1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
More informationSimplify and Automate IT
Simplify and Automate IT Expectations have never been higher Reduce IT Costs 30% increase in staff efficiency Reduce support costs by 25% Improve Quality of Service Reduce downtime by 75% 70% faster MTTR
More information<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications
Integrating your On-Premise Applications with Cloud Applications Agenda Hybrid IT Infrastructure An Emerging Trend A New Set of Challenges The Five Keys to Overcoming the Challenges
More informationCentralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan Paul.J.Sullivan@oracle.com Principal Security Consultant Kevin Moulton Kevin.moulton@oracle.com Senior Manager,
More informationIndependent process platform
Independent process platform Megatrend in infrastructure software Dr. Wolfram Jost CTO February 22, 2012 2 Agenda Positioning BPE Strategy Cloud Strategy Data Management Strategy ETS goes Mobile Each layer
More informationSimplify and Automate IT
Simplify and Automate IT The current state of IT INCIDENT SERVICE LEVEL DATA SERVICE REQUEST ASSET RELEASE CONFIGURATION GOVERNANCE AND COMPLIANCE EVENT AND IMPACT ENTERPRISE SCHEDULING DASHBOARDS CAPACITY
More informationSun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost
Sun Infrastructure Solution for Network Identity Seamlessly extend secure access to your enterprise fast, with reduced deployment time and cost Timothy Siu SE Manager, JES Nov/10/2003 sun.com/solutions/
More informationIdentity Governance Evolution
Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle
More informationSAP Identity Management Overview
Identity Management Overview October 2014 Public Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password
More informationOracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003
Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity
More informationAirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
More informationRSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
More informationOracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August
More informationFileNet and SharePoint Better Together. Tom Moen Channel Development Manager
FileNet and SharePoint Better Together Tom Moen Channel Development Manager Agenda Introductions Who is FileNet Why FileNet ECM Content Process Connectivity SharePoint Integration FileNet $500 million
More informationOracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004
Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory
More informationCloud Database Demystified to Deliver SaaS Customer Value
Cloud Database Demystified to Deliver SaaS Customer Value 2 The business of Cloud Savvis ranks as a leader Magic Quadrant for Cloud Infrastructure-as-a-Service and Web Hosting The Magic Quadrant is copyrighted
More informationOracle Privileged Account Manager 11gR2. Karsten Müller-Corbach karsten.mueller-corbach@oracle.com
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach karsten.mueller-corbach@oracle.com The following is intended to outline our general product direction. It is intended for information purposes
More informationGovernance, Risk & Compliance for Public Sector
Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment
More informationCA Technologies Data Protection
CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security Johan.VanHove@CA.com CA Technologies Content-Aware IAM strategy CA Technologies
More informationOracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
More informationCapital Market Day 2015
Capital Market Day 2015 Digital Business Platform & Product Roadmap Dr. Wolfram Jost Chief Technology Officer February 4, 2015 1 For Internal use only. Market Application infrastructure and middleware
More informationRSA Identity Management & Governance (Aveksa)
RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity
More informationEnabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management
More informationStrategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC Agenda 1 What DLP is and its purpose 2 Challenges
More informationRole Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
More informationSelect the right solution for identity and access governance
IBM Security Buyer s Guide June 2015 Select the right solution for identity and access governance Protecting critical assets from unauthorized access 2 Select the right solution for identity and access
More informationIntegrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
More informationTake Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
More informationAdditionally, as a publicly traded company, there are regulatory compliance motivations.
Case Study Retail Industry Sage, TIM & TAM Author: Mark Funk, Trinity Solutions Senior Tivoli Consultant, with over 25 years of extensive experience in the Information Technology Industry with a excellent
More informationOracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
More informationIBM Tivoli Identity Manager
Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces
More informationThe Next Generation of IT Management. Jason Andrew Vice President, Marketing & Communications
The Next Generation of IT Management Jason Andrew Vice President, Marketing & Communications BMC Has Outperformed the Market Growing Stock Price Over 130 Percent in 5 Years BMC +134% IBM +76% HP +50% NASDAQ
More informationIntelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
More informationSimplify Identity Management with the CA Identity Suite
SOLUTION BRIEF CA DATABASE IDENTITY SUITE MANAGEMENT IDENTITY FOR MANAGEMENT DB2 FOR z/os DRAFT Answer the cover question by stating how the solution can deliver the desired benefits; typically, technical
More informationAn Oracle White Paper January 2010. Access Certification: Addressing & Building on a Critical Security Control
An Oracle White Paper January 2010 Access Certification: Addressing & Building on a Critical Security Control Disclaimer The following is intended to outline our general product direction. It is intended
More informationSecurity management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.
Security management White paper Develop effective user management to demonstrate compliance efforts and achieve business value. September 2008 2 Contents 2 Overview 3 Understand the challenges of user
More informationApproaches to Enterprise Identity Management: Best of Breed vs. Suites
Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity
More informationHow can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
More informationIdentity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com. http://www.owasp.
Identity Management Basics Derek Browne, CISSP, ISSAP Derek.Browne@Emergis.com May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms
More informationAutomated User Provisioning
Automated User Provisioning NOMINATING CATEGORY: ENTERPRISE IT MANAGEMENT INITIATIVES NOMINATOR: TONY ENCINIAS, CHIEF TECHNOLOGY OFFICER COMMONWEALTH OF PENNSYLVANIA 1 TECHNOLOGY PARK HARRISBURG, PA 17110
More informationStrategic Identity Management for Industrial Control Systems
Strategic Identity Management for Industrial Control Systems Justin Harvey Encari ICSJWG 2010 Spring Conference Ground Rules Sticking to vendor neutral Questions Welcome Email me for a copy of the deck:
More information<Insert Picture Here> Tomaž Poštuvan. Oracle Software Tomaz.Postuvan@oracle.com
Uporaba oblaka pri širitvi infrastrukture naše organizacije Tomaž Poštuvan Pi Principal i lsales Consultant t Oracle Software Tomaz.Postuvan@oracle.com Agenda Hybrid IT Infrastructure
More informationOracle Mobile Security Suite. René Klomp 6 mei 2014
Oracle Mobile Security Suite René Klomp 6 mei 2014 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be
More informationProvisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1
Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness
More informationOracle Identity Governance - Complete Identity Lifecycle Management
Oracle Identity Governance - Complete Identity Lifecycle Management M.Sc.Eng. Mārtiņš Orinskis, DPA Ltd lead project manager 07.11.2013 About me M.Sc.Eng. Mārtiņš Orinskis DPA Ltd lead project manager
More informationThe real trend of the Future Workspace. John Phillips Enterprise Technology Strategist Microsoft Corporation john.phillips@microsoft.
The real trend of the Future Workspace John Phillips Enterprise Technology Strategist Microsoft Corporation john.phillips@microsoft.com Communications.... Our Vision Create experiences that combine the
More informationNovell Cloud Security Service Reducing Risk by Securing the Cloud. Stefan Stiehl Senior Sales Technology Specialist sstiehl@novell.
Novell Cloud Security Service Reducing Risk by Securing the Cloud Stefan Stiehl Senior Sales Technology Specialist sstiehl@novell.com Disclaimer for Product in Development Unpublished Work of Novell, Inc.
More informationGovernment of Canada Directory Services Architecture. Presentation to the Architecture Framework Advisory Committee November 4, 2013
Government of Canada Directory Services Architecture Presentation to the Architecture Framework Advisory Committee November 4, 2013 1 Agenda TIME TOPICS PRESENTERS 9:00 9:15 Opening Remarks Objective for
More informationProduct Strategy Update OTM SIG Conference
Product Strategy Update OTM SIG Conference Derek H. Gittoes Vice President, Product Strategy August 11, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Program Agenda 1 2 3 4 Current
More informationIntroduction to Oracle Business Intelligence Standard Edition One. Mike Donohue Senior Manager, Product Management Oracle Business Intelligence
Introduction to Oracle Business Intelligence Standard Edition One Mike Donohue Senior Manager, Product Management Oracle Business Intelligence The following is intended to outline our general product direction.
More informationQuest One Identity Solution. Simplifying Identity and Access Management
Quest One Identity Solution Simplifying Identity and Access Management Identity and Access Management Challenges Operational Efficiency Security Compliance Too many identities, passwords, roles, directories,
More informationWhat s new in AM 9.30 Accelerating business outcomes
What s new in AM 9.30 Accelerating business outcomes AGENDA HP Asset Manager overview Relevant Trends and Improvements What s new in AM 9.30 ASSET MANAGER AND HP SOFTWARE PORTFOLIO Industry s most comprehensive
More informationBUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT
Solution in Detail NetWeaver BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING NetWeaver IDENTITY MANAGEMENT Identity management today presents organizations with a host of challenges. System landscapes
More informationIdentity Management with midpoint. Radovan Semančík FOSDEM, January 2016
Management with midpoint Radovan Semančík FOSDEM, January 2016 Radovan Semančík Current: Software Architect at Evolveum Architect of Evolveum midpoint Contributor to ConnId and Apache Directory API Past:
More informationBEA BPM an integrated solution for business processes modelling. Frederik Frederiksen Principal PreSales Consultant BEA Systems
BEA BPM an integrated solution for business processes modelling Frederik Frederiksen Principal PreSales Consultant BEA Systems Agenda What is BPM? BEA AquaLogic BPM Suite Industry View Customers BPM and
More informationBusiness and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis
Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that
More informationmidpoint Overview Radovan Semančík December 2015
midpoint Overview Radovan Semančík December 2015 Agenda Identity Management Introduction midpoint Introduction midpoint Architecture Conclusion Identity Management Introduction Identity Management System
More informationMicrosoft Business Intelligence solution. What makes Microsoft BI difference
Business Intelligence today Microsoft Business Intelligence solution What makes Microsoft BI difference Case study and Demo Gartner BI Platform Software Revenue (in $Billions) CIO Priorities: Data Analysis
More informationTECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for
More informationEnterprise content management solutions Better decisions, faster. Storing, finding and managing content in the digital enterprise.
Enterprise content management solutions Better decisions, faster Storing, finding and managing content in the digital enterprise. Streamlines the collection, protection, sharing and distribution of digital
More informationC a r l G o e t h a l s T e r r e m a r k E u r o p e. C a r l. g o e t h a l s @ t e r r e m a r k. c o m
Cloud Computing for Government & Enterprise C a r l G o e t h a l s T e r r e m a r k E u r o p e C a r l. g o e t h a l s @ t e r r e m a r k. c o m Agenda Some history on Terremark State of Cloud Public
More informationTrust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager (olaf.stullich@oracle.com) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
More informationMagic Quadrant and Microsoft Dynamics CRM ERM
Leader in Forrester Wave ratings (Large & Midsized) 2 nd year as a Leader in the Gartner Customer Service MQ Mitsubishi Caterpillar Forklift Europe received the all-up Gartner CRM Excellence Award ISS
More informationWhite paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
More informationOracle Fusion Middleware 11g Release 1 IDM Suite
Oracle Fusion Middleware 11g Release 1 IDM Suite Rodger King Senior Principal Support Engineer The following is intended to outline our general product direction. It is intended for information purposes
More informationIdentity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
More informationWhite Paper Delivering Web Services Security: The Entrust Secure Transaction Platform
White Paper Delivering Web Services Security: September 2003 Copyright 2003 Entrust. All rights reserved. Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries.
More informationjourney to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
More informationINFORMATION SECURED. Manage the End-to-End User Identity Lifecycle. Oracle Identity Management
INFORMATION SECURED Manage the End-to-End User Identity Lifecycle Oracle Identity Management Identify Users Accurately. Protect Information Assets Absolutely. Leading companies depend on Oracle s best-in-class
More informationManage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory Overview August 2008 Introduction... 3 Centralizing DataBase Account Management using Existing Directories with OVD...
More informationOracle Access Manager. An Oracle White Paper
Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
More informationIan White EPM Specialist Microsoft
Ian White EPM Specialist Microsoft A bit of background A lot of demo Some closing thoughts Cost Reduction Enhance Efficiency Drive Growth Probably you have heard this 100 times Alignment Enhance strategic
More informationIBM Security & Privacy Services
Enter Click Here The challenge of identity management Today organizations are facing paradoxical demands for greater information access and more stringent information security. You must deliver more data
More informationCompany Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
More informationOracle Identity Manager. An Oracle White Paper June 2006
Oracle Identity Manager An Oracle White Paper June 2006 Oracle Identity Manager Introduction... 3 Key Benefits... 4 Features... 5 Self-Service And Delegated Administration... 5 Workflow And Policy... 5
More informationSAM Enterprise Identity Manager
SAM Enterprise Identity Manager The Next IAM Generation New, rich, full-featured business process workflow capabilities Multi-level segregation of duties management and reporting Easy-to-use and secure
More informationWhen millions need access: Identity management in an increasingly connected world
IBM Software Thought Leadership White Paper January 2011 When millions need access: Identity management in an increasingly connected world Best practice solutions that scale to meet today s huge numbers
More informationBusiness-Driven, Compliant Identity Management
Solution in Detail NetWeaver NetWeaver Identity Business-Driven, Compliant Identity Using NetWeaver Identity Managing users in heterogeneous IT landscapes presents many challenges for organizations. System
More informationVermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision
More informationWelcome to online seminar on. Oracle PIM Data Hub. Presented by: Rapidflow Apps Inc
Welcome to online seminar on Oracle PIM Data Hub Presented by: Rapidflow Apps Inc September 2010 Agenda PIM Data Hub Overview What is PIM Data Hub? Benefits of PIM Data Hub Who needs PIM Data Hub PIM Implementation
More informationRSA Identity and Access Management 2014
RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and
More informationThe Oracle Mobile Security Suite: Secure Adoption of BYOD
An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will
More informationOracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010
Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,
More informationOracle IDM Integration with E-Business Suite & Middleware Technologies
Oracle IDM Integration with E-Business Suite & Middleware Technologies Session ID#: 14251 Prepared by: Scott Brinker IDM Security Specialist CAP Deepak Sharma Sr. Consultant AST Corporation REMINDER Check
More informationComplete Database Security. Thomas Kyte http://asktom.oracle.com/
Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright
More information