Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach
|
|
- Francis White
- 8 years ago
- Views:
Transcription
1 R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach
2 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. 2
3 Agenda Introduction Oracle Privileged Account Manager 11gR2 OPAM and Oracle s Governance Platform OPAM and Oracle Security Solutions 3
4 Introduction 4
5 With Great Power Comes Great Risks Root Access Databases Directory Servers Unix Servers Privileged accounts are a key entry point for fraud Difficult to monitor shared accounts across multiple administrators Excessive access privileges is the number one attack vector against databases 5
6 IDM Overcome Threats and Regulations to Unlock Opportunities Threats Increased Online Threat Costly Insider Fraud Compliance Tougher Regulations Greater Focus on Risk Stronger Governance Opportunities 76% Data Stolen From Servers 86% Hacking Involve Stolen Credentials 48% Caused by Insiders 17% Involved Privilege Misuse Social Media Cloud Computing Mobile Access 2011 Data Breach Investigations Report Copyright 2011, Oracle and/or its affiliates. All right 6
7 Privileged Accounts Most Powerful but Most Unprotected Unlimited power Shared Passwords Never Changed Access not audited or certified Unix/ Linux, Windows, databases, applications, routers, firewalls etc Each and every IT asset in the enterprise 7
8 Managing Privilege Access Is Not Well Defined SCALE Manual solutions don t scale (like managing privileged access via spreadsheets) RISK Using default system passwords is prone to risk COST Deploying point solutions can increase integration costs 8
9 Two Big Management Problems IDENTIFYING PRIVILEGED ACCOUNTS TRACKING PRIVILEGED ACCOUNTS 9
10 The Right Approach is Self-Reinforcing Reporting & Certification Access Request Self-Reinforcing Auto- Provisioning VISIBILITY ACROSS COMPLETE USER ACCESS IS KEY Remediation 10
11 Privileged Account Management A Platform Approach Shared Connectors Centralized Policies Workflow Integration Reduce Risk Improve Compliance Common Reporting Copyright 2012, Oracle and/or its affiliates. All rights Reserved 11
12 Oracle Offers Security at Every Layer Security inside each later and across layers Infrastructure Security Governance & Compliance Identity&Access Management Database Security Cloud Services 12
13 Governance Password Reset Privileged Accounts Access Request Roles Based Provisioning Role Mining Attestation Separation of Duties Access Web Single Sign-on Federation Mobile, Social & Cloud External Authorization SOA Security Integrated ESSO Token Services Fraud Detection Directory LDAP Storage Virtual Directory Meta Directory Platform Security Services 13 Copyright 2013, Oracle and/or its affiliates. All rights reserved.
14 Oracle Privileged Account Manager 11gR2 Copyright 2012, Oracle and/or its affiliates. All rights Reserved 14
15 Introducing Oracle Privileged Account Manager Secure vault to centrally manage passwords for privileged and shared accounts Targets include Databases, Operating Systems and LDAP Directories, Oracle FMW applications Multiple access points for OPAM users and administrator Automatic password change using Identity Connector Framework Policy based password check-out and check-in Flexible usage policies Customizable audit reports through BI Publisher and real time status Extension to Identity Governance OIM and OIA integration for complete governance Copyright 2012, Oracle and/or its affiliates. All rights Reserved 15
16 OPAM Architecture Copyright 2011, Oracle and/or its affiliates. All right 16
17 A Typical Use Case User logs in as DBA Adds Table to DB System out of space Return DBA password HR Application Database Set DBA password for HR App Database based on password policy for HR App Database Request DBA password Return unix password Request unix password Verify OPAM User in HR DBA Role User checks in passwords DBA Oracle Privileged Account Manager LDAP Server User logs in as superuser Adds disk space Unix Server Copyright 2011, Oracle and/or its affiliates. All right 17
18 User Check-Out Password Screen Copyright 2011, Oracle and/or its affiliates. All right 18
19 Supported Clients / Targets Generic UNIX Systems Generic Database Servers Generic LDAP Directories UNIX 19
20 Default Supported Targets OPAM will support all OIM ICF connectors Will ship with following connectors Generic UNIX Any UNIX/LINUX server with SSH Generic Database Oracle 9i, 10g, 11g Any Generic LDAP Copyright 2012, Oracle and/or its affiliates. All rights Reserved 20
21 OPAM Benefits Enforce internal security policies and eliminate potential security threats from privileged users Cost-effectively enforce and attest to regulatory requirements Reduce IT costs through efficient self service and common security infrastructure Real time usage reports Customizable audit reports through BI Publisher Copyright 2012, Oracle and/or its affiliates. All rights Reserved 21
22 OPAM and Oracle Access Management OAM provides access control to OPAM service console Centralized, policy-driven services for web applications authentication Web single sign-on Session control OAAM for layered access control to OPAM service console Real-time fraud prevention Software-based multifactor authentication Copyright 2012, Oracle and/or its affiliates. All rights Reserved 22
23 OPAM and Oracle s Governance Platform Copyright 2012, Oracle and/or its affiliates. All rights Reserved 23
24 Supports Oracle Identity Manager Enterprise Roles Request access De-provision access Reuse connectors Works with request catalog 24
25 OPAM OIM and OIA a Complete Governance Platform Use case 1 OIM to provision users to OPAM directory Leverage OIM policy/role based provisioning, a system admin may be provisioned to specific LDAP groups that OPAM uses for privileged account access Workflow and approval will be followed as defined Use case 2 Request for Privileged Account Access Through OIM OIM to publish privileged account entitlements in request catalog An admin user uses access request self service, search the catalog, pick the privileged accounts he needs and submit for approval The request kicks off workflow and approval as defined The user is provisioned with group membership after approval The user can access OPAM for privileged password checkout and checkin Copyright 2012, Oracle and/or its affiliates. All rights Reserved 25
26 OPAM OIM and OIA a Complete Governance Platform Use case 3 Break glass access request through OIM Ability for admins to request emergency access to certain privileged account(s) s/he normally is not entitled to. E.g., a critical server is down but the designated server admin is not available. The admin goes through the OIM request process as defined earlier, but indicates this is break glass emergency request Submission of the request will kick off break glass workflow with minimal or auto approval (per customer process) The admin is presented with privileged password for emergency use Special alert is generated for the event and sent to security administrators The access is automatically de-provisioned afterward (e.g., after some time) Copyright 2012, Oracle and/or its affiliates. All rights Reserved 26
27 OPAM OIM and OIA a Complete Governance Platform Use case 4 delegated access Example Bob is on vacation for 3 weeks, Joe is authorized to access the accounts Bob has access to. Joe s access is revoked after Bob returns. Use case 5 Risk based certification and close-loop remediation with OIA Through existing OIM OIA integration and OIM OPAM integration, privileged access info is made available to OIA for certification. Risk can be calculated based on its privilege status and other data such as provisioning method etc If access violation is found, it can be revoked based on OIM OIA close-loop remediation Copyright 2012, Oracle and/or its affiliates. All rights Reserved 27
28 OPAM, OIM and OIA a Complete Governance Platform Central governance of regular and privileged users Complete auditing, reporting and certification of user s individual and shared accounts More secure and more compliant Copyright 2012, Oracle and/or its affiliates. All rights Reserved 28
29 OPAM and Oracle Security Solutions Copyright 2012, Oracle and/or its affiliates. All rights Reserved 29
30 OPAM and Database Security Enterprise User Security allows non-privileged users to use their enterprise LDAP/AD password to connect to the database Database Vault provides stronger separation of duties for databases OPAM manages passwords for privileged users including SYS, SYSTEM and application accounts A complete Database Security solution from Oracle Copyright 2012, Oracle and/or its affiliates. All rights Reserved 30
31 Database User Management Complete Solution Service Description Use Existing Enterprise LDAP Passwords for End-User Passwords Supported by EUS Map Database Roles to Enterprise Roles Manage SYS/SYSTEM Passwords EUS OPAM Manage Application Passwords OPAM Manage non-oracle database passwords OPAM Copyright 2011, Oracle and/or its affiliates. All right 31
32 Database Vault Integration Complete Solution Service Description Privileged user access control to limit access to application data Supported by DB Vault Multi-factor authorization for enforcing enterprise security policies DB Vault Secure application consolidation DB Vault Manage DB Vault Privileged Accounts Passwords like user_manager, sec_admin Manage SYS/SYSTEM and other DB Privileged Accounts Passwords OPAM OPAM Copyright 2011, Oracle and/or its affiliates. All right 32
33 OPAM and UNIX/LINUX User Management Oracle Authentication Services For Operating Systems (OAS4OS) enables non-privileged UNIX/LINUX users to authenticate to LDAP OAS4OS simplifies migration from NIS to LDAP OPAM provides password management for user accounts such as root and other privileged application accounts on the server Copyright 2012, Oracle and/or its affiliates. All rights Reserved 33
34 UNIX/LINUX User Management Complete Solution Service Description Use Existing Enterprise LDAP for End-User Passwords Supported by OAS4OS Map UNIX Groups & NIS Maps to LDAP OAS4OS Manage ROOT Passwords OPAM Manage superuser Application Account Manage Windows passwords OPAM OPAM Copyright 2011, Oracle and/or its affiliates. All right 34
35 Improve Security Of Oracle Middleware and Database Application passwords are often privileged and unmanaged OPAM can automatically manage application passwords for software that uses Oracle Fusion Middleware or connects to Oracle database This includes: Oracle Credential Security Framework (CSF) Oracle Wallet (planned post R2) Copyright 2012, Oracle and/or its affiliates. All rights Reserved 35
36 Summary Copyright 2012, Oracle and/or its affiliates. All rights Reserved 36
37 Summary Improves compliance and auditing of privileged account activities Can be deployed standalone or as part of complete Oracle Identity Governance platform A key components of Oracle Identity Governance Together with OIM and OIA Central governance of regular and privileged users Complete auditing, reporting and certification of user s individual and shared accounts Copyright 2012, Oracle and/or its affiliates. All rights Reserved 37
38 blogs.oracle.com/oracleidm 38
39 39
40 40
Trust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager (olaf.stullich@oracle.com) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
More informationKenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience
Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a
More informationOracle Privileged Account Manager
Oracle Privileged Account Manager Protecting and Auditing Access to Sensitive Resources O R A C L E W H I T E P A P E R A P R I L 2 0 1 5 Disclaimer The following is intended to outline our general product
More informationIdentity Governance Evolution
Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle
More informationOracle Identity Management Securing The New Digital Experience
Oracle Identity Management Securing The New Digital Experience Security: User Single Sign-On, Certifying User Access, and Masking Sensitive Data Henry Anzarouth Principal Sales Consultant, Security and
More information<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
More informationEnabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management
More informationQuest One Identity Solution. Simplifying Identity and Access Management
Quest One Identity Solution Simplifying Identity and Access Management Identity and Access Management Challenges Operational Efficiency Security Compliance Too many identities, passwords, roles, directories,
More informationOracle Fusion Middleware 11g Release 1 IDM Suite
Oracle Fusion Middleware 11g Release 1 IDM Suite Rodger King Senior Principal Support Engineer The following is intended to outline our general product direction. It is intended for information purposes
More informationKey New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance
Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics
More informationOracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
More informationOracle Mobile Security Suite. René Klomp 6 mei 2014
Oracle Mobile Security Suite René Klomp 6 mei 2014 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be
More informationOracle Mobile Security Management
Oracle Mobile Security Management Angelo Maria Bosis Technology Sales Consulting Director Milano, 19 Marzo 2014 Safe Harbor Statement The following is intended to outline our general
More informationOracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010
Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,
More informationOracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August
More informationSecuring Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationSun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
More informationCentralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan Paul.J.Sullivan@oracle.com Principal Security Consultant Kevin Moulton Kevin.moulton@oracle.com Senior Manager,
More informationCopyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
More informationSecuring Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
More information1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
More informationThese requirements led to several challenges in deploying identity related applications within the enterprise:
2 3 Directory services are key building blocks for secure identity-enabled business applications and the underlying enterprise identity management (IdM) architecture. Well-structured and organized directory
More informationQ3FY11 Oracle OPN Specialized Security Pillar Executive Webcast
Q3FY11 Oracle OPN Specialized Security Pillar Executive Webcast Today s Agenda Welcome Security Inside/Out OPN Specialized Requirements Q3 Web Cast Series Technology Play Books XMonth Next Steps Q & A
More informationSecurity Landscape of Cloud Computing
Security Landscape of Cloud Computing Amrith Nawoor Sales Consulting Team Leader East Africa & SADC 1 This document is for informational purposes. It is not a commitment to deliver any material, code,
More informationHayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks
EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector
More information1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
More informationSecurity It s an ecosystem thing
Security It s an ecosystem thing Joseph Alhadeff Vice President Global Public Policy, Chief Privacy Strategist The Security challenge in the before time. Today s Threat Environment
More informationBusiness and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis
Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that
More informationProtecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security Antonio.Mata.Gomez@oracle.com Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
More information2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
More informationIntelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
More informationIdentity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
More informationForthcoming EU Data Protection Law
Forthcoming EU Data Protection Law How Oracle can Help Patrick McLaughlin Security Architect & Oracle Fellow EMEA Technology Solutions 22 October 2015, Riga Copyright 2014 Oracle and/or its affiliates.
More informationOracle Identity Manager, Oracle Internet Directory
Oracle Identity Manager (OIM) is a user provisioning system. It defines properties for how users and groups get authorized to access compute and content resources across the enterprise. Identity Management
More informationEnterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
More informationSecurity Compliance and Data Governance: Dual problems, single solution CON8015
Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology
More informationIdentity Management with midpoint. Radovan Semančík FOSDEM, January 2016
Management with midpoint Radovan Semančík FOSDEM, January 2016 Radovan Semančík Current: Software Architect at Evolveum Architect of Evolveum midpoint Contributor to ConnId and Apache Directory API Past:
More informationidentity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
More informationHow to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options
More informationOracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Disclaimer The following is intended to outline our general product
More informationLeveraging Privileged Identity Governance to Improve Security Posture
Leveraging Privileged Identity Governance to Improve Security Posture Understanding the Privileged Insider Threat It s no secret that attacks on IT systems and information breaches have increased in both
More informationIBM Security Privileged Identity Manager helps prevent insider threats
IBM Security Privileged Identity Manager helps prevent insider threats Securely provision, manage, automate and track privileged access to critical enterprise resources Highlights Centrally manage privileged
More informationOracle IDM Integration with E-Business Suite & Middleware Technologies
Oracle IDM Integration with E-Business Suite & Middleware Technologies Session ID#: 14251 Prepared by: Scott Brinker IDM Security Specialist CAP Deepak Sharma Sr. Consultant AST Corporation REMINDER Check
More informationLeveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP
P a g e 1 Leveraging Microsoft Privileged Identity Management Features for Compliance with ISO 27001, PCI, and FedRAMP December 24, 2015 Coalfire Systems, Inc. www.coalfire.com 206-352- 6028 w w w. c o
More informationSaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
More informationOracle Identity Governance - Complete Identity Lifecycle Management
Oracle Identity Governance - Complete Identity Lifecycle Management M.Sc.Eng. Mārtiņš Orinskis, DPA Ltd lead project manager 07.11.2013 About me M.Sc.Eng. Mārtiņš Orinskis DPA Ltd lead project manager
More informationCloud Security/Access Control and Identity Management. Patrick McLaughlin, Oracle Fellow SAOUG: 14 November, 2011
Cloud Security/Access Control and Identity Management Patrick McLaughlin, Oracle Fellow SAOUG: 14 November, 2011 Agenda Evolution of IT and IdM Requirements Building and Securing Clouds Oracle Public Cloud
More informationUnderstanding Enterprise Cloud Governance
Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination
More informationAn Oracle White Paper September 2013. Directory Services Integration with Database Enterprise User Security
An Oracle White Paper September 2013 Directory Services Integration with Database Enterprise User Security Disclaimer The following is intended to outline our general product direction. It is intended
More informationIDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
More informationPrivileged Session Management Suite: Solution Overview
Privileged Session Management Suite: Solution Overview June 2012 z Table of Contents 1 The Challenges of Isolating, Controlling and Monitoring Privileged Sessions... 3 2 Cyber-Ark s Privileged Session
More informationOracle E-Business Suite Single Sign On Using Oracle Access Manager
Oracle E-Business Suite Single Sign On Using Oracle Access Manager Session ID#: 301 Prepared by: Pierre Paniagua Consultant AST Corporation REMINDER Check in on the COLLABORATE mobile app About Pierre
More informationTake Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
More informationLearn From the Experts: CyberArk Privileged Account Security. Łukasz Kajdan, Sales Manager Baltic Region Veracomp SA
Learn From the Experts: CyberArk Privileged Account Security Łukasz Kajdan, Sales Manager Baltic Region Veracomp SA Stallion Shooting Event 20.06.2014 Privileged Accounts are Targeted in All Advanced Attacks
More informationOracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts. Stephen Kost Chief Technology Officer Integrigy Corporation
Oracle E-Business Suite APPS, SYSADMIN, and oracle Securing Generic Privileged Accounts May 15, 2014 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy
More informationCONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT
CONNECTING ACCESS GOVERNANCE AND PRIVILEGED ACCESS MANAGEMENT ABSTRACT Identity and access governance should be deployed across all types of users associated with an organization -- not just regular users
More informationMySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam sastry.vedantam@oracle.com Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Oracle Database Security Advanced Security Option Thanos Terentes Printzios DB & Options Specialist A&C Technology Adoption Office Oracle Partner Business Development, ECEMEA 2 What is a customers INFORMATION
More informationComplete Database Security. Thomas Kyte http://asktom.oracle.com/
Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright
More informationAlex Wong Senior Manager - Product Management Bruce Ong Director - Product Management
Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release
More informationPrivileged. Account Management. Accounts Discovery, Password Protection & Management. Overview. Privileged. Accounts Discovery
Overview Password Manager Pro offers a complete solution to control, manage, monitor and audit the entire life-cycle of privileged access. In a single package it offers three solutions - privileged account
More informationHOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES
HOW OBSERVEIT ADDRESSES KEY HONG KONG IT SECURITY GUIDELINES The Office of the Government Chief Information Officer of The Government of the Hong Kong Special Administrative Region issued its IT Security
More informationDirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationOracle Enterprise Manager 12c
Oracle Enterprise Manager 12c CON8243 - Enterprise Manager 12c Security Cookbook: Best Practices for Large Datacenters Maureen Byrne Product Management, Oracle Marleen Gebraad, Rabobank Nagaraj Krishnappa
More informationAdministration Guide NetIQ Privileged Account Manager 3.0.1
Administration Guide NetIQ Privileged Account Manager 3.0.1 December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use
More informationSecret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
More informationCSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO 2009 by Lieberman Software Corporation. Rev 20090921a Identity Management Definitions
More informationAdditionally, as a publicly traded company, there are regulatory compliance motivations.
Case Study Retail Industry Sage, TIM & TAM Author: Mark Funk, Trinity Solutions Senior Tivoli Consultant, with over 25 years of extensive experience in the Information Technology Industry with a excellent
More information<Insert Picture Here> Oracle Database Vault
Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information
More informationSeven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
More informationSecurity management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.
Security management White paper Develop effective user management to demonstrate compliance efforts and achieve business value. September 2008 2 Contents 2 Overview 3 Understand the challenges of user
More informationGovernance, Risk & Compliance for Public Sector
Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment
More informationProvide access control with innovative solutions from IBM.
Security solutions To support your IT objectives Provide access control with innovative solutions from IBM. Highlights Help protect assets and information from unauthorized access and improve business
More informationEnterprise Mobility Suite Overview. Joe Kuster Catapult Systems
Enterprise Mobility Suite Overview Joe Kuster Catapult Systems 52% 90% >80% 52% of information workers across 17 countries report using three or more devices for work* 90% of enterprises will have two
More informationMicrosoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, peter@daalmans.com IT-Concern John Marcum Enterprise Client Management Architect / johnmarcum@outlook.com
More informationAddressing PCI Compliance
WHITE PAPER DECEMBER 2015 Addressing PCI Compliance Through Privileged Access Management 2 WHITE PAPER: ADDRESSING PCI COMPLIANCE Executive Summary Challenge Organizations handling transactions involving
More information1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
More informationSolving the Security Puzzle
Solving the Security Puzzle How Government Agencies Can Mitigate Today s Threats Abstract The federal government is in the midst of a massive IT revolution. The rapid adoption of mobile, cloud and Big
More informationAn Oracle White Paper January 2014. Oracle Identity Manager Business Overview
An Oracle White Paper January 2014 Oracle Identity Manager Business Overview Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
More informationManagement Packs for Database
Management Packs for Database Diagnostics Pack for Database Oracle Diagnostics Pack for Database offers a complete, cost-effective, and easy to use solution for managing the performance of Oracle Database
More informationRSA Identity Management & Governance (Aveksa)
RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity
More informationDirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
More informationWith Great Power comes Great Responsibility: Managing Privileged Users
With Great Power comes Great Responsibility: Managing Privileged Users Darren Harmer Senior Systems Engineer Agenda What is a Privileged User Privileged User Why is it important? Security Intelligence
More informationCA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
More informationOracle Identity Management 11gR2 Sizing and Capacity Planning
An Oracle White Paper October 2012 Oracle Identity Management 11gR2 Sizing and Capacity Planning Disclaimer The following is intended for information purposes only, and may not be incorporated into any
More informationHow To Make A Multi-Tenant Platform Secure And Secure
Authentication As A Service Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017? Jason Hart CISSP CISM VP Cloud Solutions What a great world Today's World
More information<Insert Picture Here> PCI DSS-Payment Card Industry. Security Summit 2010. Master Principal Sales Consultant - Alfredo Valenza - Oracle Italia
PCI DSS-Payment Card Industry Data Security Standard Security Summit 2010 Master Principal Sales Consultant - Alfredo Valenza - Oracle Italia This document is for informational purposes.
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationNCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
More informationManage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory Overview August 2008 Introduction... 3 Centralizing DataBase Account Management using Existing Directories with OVD...
More informationEnterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect
Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment Paul Luetje Enterprise Solutions Architect Table of Contents Welcome... 3 Purpose of this document...
More informationOracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
More informationPrivileged Account Access Management: Why Sudo Is No Longer Enough
Access Control Excellence Privileged Account Access Management: Why Sudo Is No Longer Enough The new privileged access management solutions available on the market today provide highly efficient and effective
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationDeveloping Value from Oracle s Audit Vault For Auditors and IT Security Professionals
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer
More informationWhite paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
More informationPrivilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
More informationAurora Hosted Services Hosted AD, Identity Management & ADFS
22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to
More informationMigration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015
Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Disclaimer The following is intended to outline our general product direction. It is intended
More information