IBM. How can we support the requirement of creating dynamic, flexible and cost effective solution in the IAM area?

Size: px
Start display at page:

Download "IBM. How can we support the requirement of creating dynamic, flexible and cost effective solution in the IAM area?"

Transcription

1 IBM How can we support the requirement of creating dynamic, flexible and cost effective solution in the IAM area? Sven-Erik Vestergaard Nordic Security Architect IBM Software group

2 Security is becoming a board room discussion Business results Brand image Supply chain Legal exposure Impact of hacktivism Audit risk Sony estimates potential $1B long term impact $171M / 100 customers HSBC data breach discloses 24K private banking customers Epsilon breach impacts 100 national brands TJX estimates $150M class action settlement in release of credit / debit card info Lulzsec 50-day hack-at-will spree impacts Nintendo, CIA, PBS, UK NHS, UK SOCA, Sony Zurich Insurance PLc fined 2.275M ($3.8M) for the loss and exposure of 46K customer records Can this happen to us? 2

3 Security challenges are impacting innovation External threats Sharp rise in external attacks from non-traditional sources Cyber attacks Organized crime Corporate espionage State-sponsored attacks Social engineering Internal threats Ongoing risk of careless and malicious insider behavior Administrative mistakes Careless inside behavior Internal breaches Disgruntled employee actions Mix of private / corporate data Compliance Growing need to address an increasing number of mandates National regulations Industry standards Local mandates Impacting innovation Mobility Cloud / Virtualization Social Business Business Intelligence 3

4 Do we need Policy Management to handle the challenges? 4

5 Policy & Policy Management Policy - What is it? Principle or rule to guide decisions and achieve a desired and rational outcome Contains attributes detailing the 'what', the 'how', the 'where', and the 'when' Published, it becomes the standardized guidelines used by a system to govern its behavior within its environment and transactions 5 Policy Management provides an approach for efficiently and effectively addressing the many risks and requirements inherent in electronic communication: Policy definition (structured way to declare policy constraints) Policy enforcement, according to defined policies Policy monitoring (ability to collect and report Policy Analytics)

6 Policy Reference Architecture Policy Lifecycle Management Business Policy Business Policy domains for behavior and performance Service Development Lifecycle Situational Business Business Service Level Awareness Process Services Management Policy Lifecycle Service Lifecycle & Governance Policy Architectural Policy & Governance Policy Author Transform Architectural Policy domains for SOA Resources Process Service Information Model Assemble Enforce Operational Policy Deploy Monitor Operational Policy domains that are non-functional Manage Enablers Security Monitor Mediation Service Support & Delivery Policy 6

7 Policy aligns individual roles with broader business objectives Business layer Capture policy as business statements that describe the intent of the business or specific business level policy (e.g.) Compliance officer requires personal information be protected (e.g.) Business requires that information be available within 3 seconds of request Architecture layer Capture policy as requirements and architectural standards that address resources (e.g.) Limit client credit report access to owning managers (e.g.) A particular provider service must respond within 2 seconds in order to meet business need of end to end 3 second response 7 Operational layer Operational Policy are actionable statements that provide specific runtime actions (e.g.) Configure message security to support digital signature and restricted authorization (e.g.) Mediation layer will reroute traffic to secondary endpoint if primary endpoint does not respond in 2 seconds

8 Policy Tree Example of deriving policy from business requirements through the various policy layers Business Requirement Comply with all laws and regulations Business Policy Keep consumer data private as called for by EU privacy reg. Architectural Policy Encrypt consumer name, address, phone numbers and social security number when such data is stored Encrypt consumer name, address, phone numbers and social security number when such data is transmitted Operational Policy Access control via userid & password sign on to corporate LDAP directory for any attempt to access private consumer data Encrypt consumer name, address, Phone numbers and social security number in ESB gateway before transmitting 8

9 Same Architectural Pattern applied across key scenarios Architectural Pattern for Service Policy: Key Scenario: SLA Management Author Store Monitor Author Store Monitor Repository WSRR ALE e.g. Consumer Enforce Provider Consumer Enforce Provider Middleware e.g. Key Scenario: Security Key Scenario: Service Support & Delivery Author Store Monitor Author Store Monitor TSPM / WSRR WSRR DP AMCT Consumer Enforce Provider Consumer Deploy Provider 9

10 Elements of an Policy Lifecycle Management solution Policy Authoring (Author) Policy Selection Creating instances of standard domains (security, transactions) Predefine some domains and provide tooling for those domains Policy Creation Allowing users to create policy Policy Distribution (Transform) Storage and assignment of policies to resources Transform to an actionable form Pushing updates or notifications of change to PEPs / PDPs Policy administration Lifecycle and governance of policies Making service descriptions and/or associated policies available Tivoli NetView Pushing updates or notifications of change to PEPs / PDPs Policy Enforcement (Enforce) Policy Authoring Policy Decision Points (PDPs) and Policy Enforcement Points client (PEPs) DataPower XS40 Enforcement of policies relating to metadata Enforcement of policies relating to SOA endpoint interactions 1 Policy Policy Tivoli NetView icy Registry Repository 2 Record Alerts Distribute Policy Security Enforcement Enforce Middleware 3 Policies Nortel L7 Module DataPower XS40 Tivoli Access Manager Web service DataPower XS40 WebSphere App Server Tivoli Access Manager Monitor 4 Policies MQ S 10 Policy Monitoring (Monitor) DataPower XS40 Recording decisions made by PDPs and PEPs Monitor, measure, and analyze policies Displaying and reporting on information about policy results Web service client Nortel L7 Module MQ Server Web Services Endpoint

11 Security Infrastructure Security Services Applications & Services Policy Mgmt IBM Reference Architecture for IT Security Integrated Policy Management Services ws-securitypolicy, XACML, etc. Web Services XML Security Gateway ws-security ws-security Enterprise Service Bus Security. Enforcement Presentation/Application Server Enterprise Information System Web Federated SSO (Point of Contact) Security Enforcement ws-trust, XACML ws-trust, XACML AAA Security Services ws-trust, XACML Audit Events Identity and Access Management Enterprise Enterprise Directory Directory Enterprise Auditing & Compliance 11

12 So how do you start? Get Ecxecutive sponsorship Get Stakeholders Application assement Policies, start with the most strategic and less complicated (don t boil the ocean) Identify opereation requirements But most important, stay faithful to the new strategiy 12

13 Questions?? z z z z z z z 13

Security Intelligence Solutions

Security Intelligence Solutions Security Intelligence Solutions Know what is going on inside your enterprise with QRadar Joseph Skocich, WW Sales Integration Executive Q1 Labs, an IBM Company June 2012 jskocich@us.ibm.com What is Security

More information

Security strategies to stay off the Børsen front page

Security strategies to stay off the Børsen front page Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the

More information

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance

Effectively Using Security Intelligence to Detect Threats and Exceed Compliance Effectively Using Security Intelligence to Detect Threats and Exceed Compliance Chris Poulin Security Strategist, IBM Reboot Conference 2012 1 Security Threats Affect the Business Business Brand image

More information

Security Metrics & The Boardroom How does security articulate business value. Rick Miller IBM, Director Managed Security Services

Security Metrics & The Boardroom How does security articulate business value. Rick Miller IBM, Director Managed Security Services Security Metrics & The Boardroom How does security articulate business value Rick Miller IBM, Director Managed Security Services Session ID: SECT-203 Session Classification: General Interest 2011 The Year

More information

General Introduction to IBM (R) Rational (R) Asset Manager

General Introduction to IBM (R) Rational (R) Asset Manager General Introduction to IBM (R) Rational (R) Asset Manager Peter Smith Certified IT Specialist, IBM 2007 IBM Corporation Objectives! Background: Issues and Challenges!Asset Management and SOA! Define Asset

More information

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements

More information

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

2011 Cyber Security and the Advanced Persistent Threat A Holistic View 2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem

More information

Glinda Cummings World Wide Tivoli Security Product Manager

Glinda Cummings World Wide Tivoli Security Product Manager Featured Speaker IBM Security Solutions! Glinda Cummings World Wide Tivoli Security Product Manager 2010 IBM Corporation IBM Security Solutions! How IBM defines Cloud Computing IBM Security Solutions!

More information

Acknowledgments. p. 55

Acknowledgments. p. 55 Preface Acknowledgments About the Author Introduction p. 1 IBM SOA Foundation p. 2 Service Design and Service Creation p. 2 Service Integration p. 3 Service Connectivity p. 5 Service Security and Management

More information

Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB

Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB IBM Software for WebSphere Redbook Overview Patterns: SOA Design with WebSphere Message Broker and WebSphere ESB Presenter: Kim Clark Email: kim.clark@uk.ibm.com Date: 27/02/2007 SOA Design with WebSphere

More information

Realizing business flexibility through integrated SOA policy management.

Realizing business flexibility through integrated SOA policy management. SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished

More information

Avoiding Web Services Chaos with WebSphere Service Registry and Repository

Avoiding Web Services Chaos with WebSphere Service Registry and Repository IBM Software Group Avoiding Web s Chaos with WebSphere Registry and Repository David Buchanan David Ben Buchanan J Briden Consulting IT Specialist Consulting IT IT Specialist WebSphere Software WebSphere

More information

Security as Architecture A fine grained multi-tiered containment strategy

Security as Architecture A fine grained multi-tiered containment strategy 1 Security as Architecture A fine grained multi-tiered containment strategy Andras R. Szakal IBM Distinguished Engineer Chief Software Architect, U.S. Federal SWG aszakal@us.ibm.com 2 Objectives Cybersecurity

More information

Service management White paper. Manage access control effectively across the enterprise with IBM solutions.

Service management White paper. Manage access control effectively across the enterprise with IBM solutions. Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access

More information

Cybercrime: the New Reality of Information Security

Cybercrime: the New Reality of Information Security Cybercrime: the New Reality of Information Security Christina Peters, Senior Counsel, Security and Privacy IBM Jack Danahy, Director for Advanced Security, IBM Security Systems Thomas X. Grasso, Jr. Supervisory

More information

OPENIAM ACCESS MANAGER. Web Access Management made Easy

OPENIAM ACCESS MANAGER. Web Access Management made Easy OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access

More information

APIs The Next Hacker Target Or a Business and Security Opportunity?

APIs The Next Hacker Target Or a Business and Security Opportunity? APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone

More information

Web Services Security with SOAP Security Proxies

Web Services Security with SOAP Security Proxies Web Services Security with Security Proxies Gerald Brose, PhD Technical Product Manager Xtradyne Technologies AG OMG Web Services Workshop USA 22 April 2003, Philadelphia Web Services Security Risks! Exposure

More information

SOA OPERATIONS EXCELLENCE WITH PROGRESS ACTIONAL WHITE PAPER

SOA OPERATIONS EXCELLENCE WITH PROGRESS ACTIONAL WHITE PAPER SOA OPERATIONS EXCELLENCE WITH PROGRESS ACTIONAL WHITE PAPER TABLE OF CONTENTS > 1.0 Service-Oriented Architecture: Benefits and IT Operations Challenges 1 > 2.0 Progress Actional for SOA Operations 4

More information

Using Security Intelligence to Stay out of the Headlines

Using Security Intelligence to Stay out of the Headlines Using Security Intelligence to Stay out of the Headlines Chris Poulin IBM, Security Systems Session ID: DAS-309 Session Classification: Intermediate Welcome to the SIEM Crime Scene Remove yourself from

More information

goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services

goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services goberlin a Trusted Cloud Marketplace for Governmental and Commercial Services Data Protection and Security Considerations in an egovernment Cloud in Germany Dr. Klaus-Peter Eckert Public Sector Cloud Forum

More information

An Open Policy Framework for Cross-vendor Integrated Governance

An Open Policy Framework for Cross-vendor Integrated Governance An Open Policy Framework for Cross-vendor Integrated Governance White Paper Intel SOA Expressway An Open Policy Framework for Cross-vendor Integrated Governance Intel SOA Expressway delivers a pluggable

More information

Managing SOA Security and Operations with SecureSpan

Managing SOA Security and Operations with SecureSpan Managing SOA Security and Operations with SecureSpan Francois Lascelles Technical Director, Layer 7 Technologies 1 Customers Revenue About Layer 7 Layer 7 is the leading vendor of security and governance

More information

Service Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008

Service Oriented Networks Security. David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 Service Oriented Networks Security David Brossard, M.Eng, SCEA Senior Security Researcher, BT Innovate Globecom 2008 While empowering new business models, SON leads to a proliferation of application networks

More information

NCTA Cloud Architecture

NCTA Cloud Architecture NCTA Cloud Architecture Course Specifications Course Number: 093019 Course Length: 5 days Course Description Target Student: This course is designed for system administrators who wish to plan, design,

More information

Securing Web Services From Encryption to a Web Service Security Infrastructure

Securing Web Services From Encryption to a Web Service Security Infrastructure Securing Web Services From Encryption to a Web Service Security Infrastructure Kerberos WS-Security X.509 TLS Gateway OWSM WS-Policy Peter Lorenzen WS-Addressing Agent SAML Policy Manager Technology Manager

More information

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies

Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because

More information

Nastel Technologies 48 South Service Road Melville, NY, USA 11747. Copyright 2014 Nastel Technologies, Inc.

Nastel Technologies 48 South Service Road Melville, NY, USA 11747. Copyright 2014 Nastel Technologies, Inc. Nastel Technologies 48 South Service Road Melville, NY, USA 11747 Copyright 2014 Nastel Technologies, Inc. Nastel Technologies, Inc. VENDOR PROFILE Middleware management and "Middleware-centric" application

More information

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT

How Microsoft runs IT. Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT How Microsoft runs IT Ludwig Wilhelm CIO Central & Eastern Europe Microsoft IT 2 Source: Accenture Cloudrise: Rewards & Risks at the Dawn of Cloud Computing, November 2010 3 Source: Accenture Cloudrise:

More information

Securely Managing and Exposing Web Services & Applications

Securely Managing and Exposing Web Services & Applications Securely Managing and Exposing Web Services & Applications Philip M Walston VP Product Management Layer 7 Technologies Layer 7 SecureSpan Products Suite of security and networking products to address the

More information

Redpaper Axel Buecker Craig Forster Sridhar Muppidi Borna Safabakhsh

Redpaper Axel Buecker Craig Forster Sridhar Muppidi Borna Safabakhsh Redpaper Axel Buecker Craig Forster Sridhar Muppidi Borna Safabakhsh IBM Tivoli Security Policy Manager Introduction In a growing number of enterprises, policies are the key mechanism by which the capabilities

More information

Secure Identity in Cloud Computing

Secure Identity in Cloud Computing Secure Identity in Cloud Computing Michelle Carter The Aerospace Corporation March 20, 2013 The Aerospace Corporation 2013 All trademarks, service marks, and trade names are the property of their respective

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

Unifying IT Vision Through Enterprise Architecture

Unifying IT Vision Through Enterprise Architecture Unifying IT Vision Through Enterprise Architecture A model for Strategic Alignment Northeast Ohio Information Technology & Enterprise Architects (NEO-ITEA) Presentation To: Integrate 2010: Uniting the

More information

Federal Enterprise Architecture and Service-Oriented Architecture

Federal Enterprise Architecture and Service-Oriented Architecture Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010

More information

Cisco Advanced Malware Protection for Endpoints

Cisco Advanced Malware Protection for Endpoints Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection

More information

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations

More information

Creating a Strong Security Infrastructure for Exposing JBoss Services

Creating a Strong Security Infrastructure for Exposing JBoss Services Creating a Strong Security Infrastructure for Exposing JBoss Services JBoss Enterprise SOA Platform Service Clients Service Gateway Enterprise Services Blake Dournaee, Product Management, Intel SOA Products

More information

Service Virtualization: Managing Change in a Service-Oriented Architecture

Service Virtualization: Managing Change in a Service-Oriented Architecture Service Virtualization: Managing Change in a Service-Oriented Architecture Abstract Load balancers, name servers (for example, Domain Name System [DNS]), and stock brokerage services are examples of virtual

More information

Data Mining Governance for Service Oriented Architecture

Data Mining Governance for Service Oriented Architecture Data Mining Governance for Service Oriented Architecture Ali Beklen Software Group IBM Turkey Istanbul, TURKEY alibek@tr.ibm.com Turgay Tugay Bilgin Dept. of Computer Engineering Maltepe University Istanbul,

More information

Tomáš Müller IT Architekt 21/04/2010 ČVUT FEL: SOA & Enterprise Service Bus. 2010 IBM Corporation

Tomáš Müller IT Architekt 21/04/2010 ČVUT FEL: SOA & Enterprise Service Bus. 2010 IBM Corporation Tomáš Müller IT Architekt 21/04/2010 ČVUT FEL: SOA & Enterprise Service Bus Agenda BPM Follow-up SOA and ESB Introduction Key SOA Terms SOA Traps ESB Core functions Products and Standards Mediation Modules

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

SOMA, RUP and RMC: the right combination for Service Oriented Architecture

SOMA, RUP and RMC: the right combination for Service Oriented Architecture SOMA, RUP and RMC: the right combination for Service Oriented Architecture WebSphere User Group, Bedfont, 4th March, 2008 Keith Mantell Senior Solution Architect IBM Rational keith_mantell@uk.ibm.com March

More information

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with

More information

API Management: Powered by SOA Software Dedicated Cloud

API Management: Powered by SOA Software Dedicated Cloud Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting

More information

Integrating Mobile apps with your Enterprise

Integrating Mobile apps with your Enterprise Integrating Mobile apps with your Enterprise Jonathan Marshall marshalj@uk.ibm.com @jmarshall1 Agenda Mobile apps and the enterprise Integrating mobile apps with Enterprise Applications Mobile apps and

More information

How To Write An Architecture For An Bm Security Framework

How To Write An Architecture For An Bm Security Framework Security Reference Architecture James (Jimmy) Darwin James.Darwin@au.ibm.com 2010 IBM Corporation 0 Reference Architectures As part of the Time-to-Value Initiative, Reference Architectures have been identified

More information

Securing and protecting the organization s most sensitive data

Securing and protecting the organization s most sensitive data Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au

More information

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Ragy Magdy Regional Channel Manager MEA IBM Security Systems Ragy Magdy Regional Channel Manager MEA IBM Security Systems 1 Started my career in Security in 2003 by Joining ISS 2005 was named the ISS Regional Manager for the Middle East 2006 ISS was acquired by

More information

WebSphere Integration Solutions. IBM Day Minsk 2014. Anton Litvinov WebSphere Connectivity Professional Central Eastern Europe

WebSphere Integration Solutions. IBM Day Minsk 2014. Anton Litvinov WebSphere Connectivity Professional Central Eastern Europe WebSphere Integration Solutions IBM Day Minsk 2014 Ann Litvinov WebSphere Connectivity Professional Central Eastern Europe 1 Agenda 1 Understand vision for ESB capabilities 2 Understand DataPower Basics

More information

Enterprise Reference Architecture

Enterprise Reference Architecture Prepared by Enterprise Planning and Architecture Strategies Team Page 1 of 19 Control Page: Revision History: Version No Revised Date Author Comments 03/18/2011 Anitha Ramakrishnan Initial Version Page

More information

CA Single Sign-On Migration Guide

CA Single Sign-On Migration Guide CA Single Sign-On Migration Guide Web access management (WAM) systems have been a part of enterprises for decades. It is critical to control access and audit applications while reducing the friction for

More information

Integrated Systems & Solutions. Some Performance and Security Findings Relative to a SOA Ground Implementation. March 28, 2007. John Hohwald.

Integrated Systems & Solutions. Some Performance and Security Findings Relative to a SOA Ground Implementation. March 28, 2007. John Hohwald. Some Performance and Security Findings Relative to a SOA Ground Implementation March 28, 2007 John Hohwald Slide 1 Ground SOA Implementation Issues SOA Benchmarking Benchmarked a variety of vendors IBM

More information

Addressing Cyber Security in Oracle Utilities Applications

Addressing Cyber Security in Oracle Utilities Applications Addressing Cyber Security in Oracle Utilities Applications Anthony Shorten Principal Product Manager Oracle Utilities Global Business Unit Sept, 2014 Safe Harbor Statement The following is intended to

More information

Federated Identity and Trust Management

Federated Identity and Trust Management Redpaper Axel Buecker Paul Ashley Neil Readshaw Federated Identity and Trust Management Introduction The cost of managing the life cycle of user identities is very high. Most organizations have to manage

More information

<Insert Picture Here> Oracle Web Services Manager (WSM)

<Insert Picture Here> Oracle Web Services Manager (WSM) Oracle Web Services Manager (WSM) Marc Chanliau Director, Product Management Outline Introduction Product Overview Typical Use-Case Scenarios Roadmap Q & A Introduction

More information

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and

More information

IBM Tivoli Federated Identity Manager

IBM Tivoli Federated Identity Manager IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations

More information

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities

Table of Contents. Application Vulnerability Trends Report 2013. Introduction. 99% of Tested Applications Have Vulnerabilities Application Vulnerability Trends Report : 2013 Table of Contents 3 4 5 6 7 8 8 9 10 10 Introduction 99% of Tested Applications Have Vulnerabilities Cross Site Scripting Tops a Long List of Vulnerabilities

More information

POTENTIAL DHH TECHNICAL ARCHITECTURE

POTENTIAL DHH TECHNICAL ARCHITECTURE POTENTIAL DHH TECHNICAL ARCHITECTURE SPECIFICALLY FOR CONSIDERATION REGARDING IMPLEMENTATIONS OF MEDS AND MMIS.NET, Java, Dynamics, SharePoint, ColdFusion, etc. BUSINESS APPLICATIONS PLATFORM GOVERNANCE

More information

JBOSS ENTERPRISE SOA PLATFORM AND JBOSS ENTERPRISE DATA SERVICES PLATFORM VALUE PROPOSITION AND DIFFERENTIATION

JBOSS ENTERPRISE SOA PLATFORM AND JBOSS ENTERPRISE DATA SERVICES PLATFORM VALUE PROPOSITION AND DIFFERENTIATION JBOSS ENTERPRISE SOA PLATFORM AND JBOSS ENTERPRISE DATA SERVICES PLATFORM VALUE PROPOSITION AND DIFFERENTIATION Service-oriented architecture (SOA) gives enterprises the ability to identify and respond

More information

Entitlements Access Management for Software Developers

Entitlements Access Management for Software Developers Entitlements Access Management for Software Developers Market Environment The use of fine grained entitlements and obligations control for access to sensitive information and services in software applications

More information

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Reaching the Cloud era in the EU Riga 16 June 2015 Jonathan Sage Government and Regulatory Affairs Cyber Security

More information

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES CONTENTS About Tools4ever... 3 About Deloitte Risk Services... 3 HelloID... 4 Microsoft Azure... 5 HelloID Security Architecture... 6 Scenarios... 8 SAML Identity Provider (IDP)... 8 Service Provider SAML

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing

More information

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems

Core Feature Comparison between. XML / SOA Gateways. and. Web Application Firewalls. Jason Macy jmacy@forumsys.com CTO, Forum Systems Core Feature Comparison between XML / SOA Gateways and Web Application Firewalls Jason Macy jmacy@forumsys.com CTO, Forum Systems XML Gateway vs Competitive XML Gateways or Complementary? and s are Complementary

More information

IBM SOA Foundation products overview

IBM SOA Foundation products overview IBM SOA Foundation products overview Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 4.0.3 Unit objectives After completing this unit, you

More information

SOA Adoption Challenges

SOA Adoption Challenges Introduction Raju Alluri SOA adoption is evolutionary rather than revolutionary. It is a journey and not an end state. There are many challenges in the SOA journey. First and foremost, the challenge is

More information

SERVICE ORIENTED ARCHITECTURE

SERVICE ORIENTED ARCHITECTURE SERVICE ORIENTED ARCHITECTURE Introduction SOA provides an enterprise architecture that supports building connected enterprise applications to provide solutions to business problems. SOA facilitates the

More information

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with

More information

Safeguarding the cloud with IBM Security solutions

Safeguarding the cloud with IBM Security solutions Safeguarding the cloud with IBM Security solutions Maintain visibility and control with proven solutions for public, private and hybrid clouds Highlights Address cloud concerns with enterprise-class solutions

More information

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 5

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 5 Course Page - Page 1 of 5 WebSphere Application Server 7.0 Administration on Windows BSP-1700 Length: 5 days Price: $ 2,895.00 Course Description This course teaches the basics of the administration and

More information

Beyond the SOA/BPM frontiers Towards a complete open cooperative environment

Beyond the SOA/BPM frontiers Towards a complete open cooperative environment Beyond the SOA/BPM frontiers Towards a complete open cooperative environment This presentation has been used during a webinar delivered within SpagoWorld Webinar Center: http://www.spagoworld.org/xwiki/bin/view/spagoworld/webinarcenter

More information

Improve your mobile application security with IBM Worklight

Improve your mobile application security with IBM Worklight Improve your mobile application security with IBM Worklight Contents 1 Introduction 2 IBM Worklight overview 4 Enabling mobile security with IBM Worklight 6 Integrating IBM Worklight with enterprise security

More information

IBM WebSphere DataPower Integration Appliance XI52

IBM WebSphere DataPower Integration Appliance XI52 IBM WebSphere DataPower Integration Appliance XI52 Save time, reduce cost, and improve security with this purpose-built appliance for application integration Highlights Save time, reduce cost and improve

More information

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

Mobile, Cloud, Advanced Threats: A Unified Approach to Security Mobile, Cloud, Advanced Threats: A Unified Approach to Security David Druker, Ph.D. Senior Security Solution Architect IBM 1 Business Security for Business 2 Common Business Functions Manufacturing or

More information

SOA and API Management

SOA and API Management SOA and API Management Leveraging Your Investment in Service Orientation Version 1.0 December 2013 John Falkl General Manager, Technology, Strategy & Integration Haddon Hill Group, Inc. Contents Introduction...

More information

SOA Design Patterns for VistA Evolution: Web Technologies Data Sharing for VistA Evolution

SOA Design Patterns for VistA Evolution: Web Technologies Data Sharing for VistA Evolution SOA Design Patterns for VistA Evolution: Web Technologies Data Sharing for VistA Evolution Office of Technology Strategies (OTS) Architecture, Strategy, and Design (ASD) Office of Information and Technology

More information

IBM API Management Overview. 2014 IBM Corporation

IBM API Management Overview. 2014 IBM Corporation IBM API Management Overview Please Note IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole discretion. Information regarding potential

More information

Onegini Token server / Web API Platform

Onegini Token server / Web API Platform Onegini Token server / Web API Platform Companies and users interact securely by sharing data between different applications The Onegini Token server is a complete solution for managing your customer s

More information

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Data Security: Fight Insider Threats & Protect Your Sensitive Data Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand

More information

Introduction to Cyber Security / Information Security

Introduction to Cyber Security / Information Security Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be

More information

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Security Inside Out Latest Innovations in Oracle Database 12c Jukka Männistö Database Architect Oracle Nordic Coretech Presales The 1995-2014 Security Landscape Regulatory Landscape HIPAA, SOX (2002),

More information

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s

More information

Exam Name: IBM WebSphere Process Server V6.2,

Exam Name: IBM WebSphere Process Server V6.2, Vendor: IBM Exam Code: 000-375 Exam Name: IBM WebSphere Process Server V6.2, System Administration Version: DEMO 1.A company has an IBM WebSphere Process Server clustered environment running. A system

More information

PTW Exchange Brasil 2007 19 de Setembro, São Paulo, SP, BR. 1

PTW Exchange Brasil 2007 19 de Setembro, São Paulo, SP, BR. 1 1 Enterprise Infrastructure Products Overview and Roadmap VP of Products, Enterprise Infrastructure Products The Pressure on IT Business Demands Change Develop new products and services Speed business

More information

SOA Management with Oracle Enterpise Manager. An Oracle White Paper March 2007

SOA Management with Oracle Enterpise Manager. An Oracle White Paper March 2007 SOA Management with Oracle Enterpise Manager An Oracle White Paper March 2007 NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

Contents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com

Contents. 1010 Huntcliff, Suite 1350, Atlanta, Georgia, 30350, USA http://www.nevatech.com Sentinet Overview Contents Overview... 3 Architecture... 3 Technology Stack... 4 Features Summary... 6 Repository... 6 Runtime Management... 6 Services Virtualization and Mediation... 9 Communication and

More information

SOA Software: Troubleshooting Guide for Policy Manager for DataPower

SOA Software: Troubleshooting Guide for Policy Manager for DataPower SOA Software: Troubleshooting Guide for Policy Manager for DataPower Troubleshooting Guide for Policy Manager for DataPower 1 SOA Software Policy Manager Troubleshooting Guide for Policy Manager for DataPower

More information

An Oracle White Paper February 2014. Oracle Data Integrator 12c Architecture Overview

An Oracle White Paper February 2014. Oracle Data Integrator 12c Architecture Overview An Oracle White Paper February 2014 Oracle Data Integrator 12c Introduction Oracle Data Integrator (ODI) 12c is built on several components all working together around a centralized metadata repository.

More information

Protecting personally identifiable information: What data is at risk and what you can do about it

Protecting personally identifiable information: What data is at risk and what you can do about it Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most

More information

Approach to Service Management

Approach to Service Management Approach to Service Management In SOA Space Gopala Krishna Behara & Srikanth Inaganti Abstract SOA Management covers the Management and Monitoring of applications, services, processes, middleware, infrastructure,

More information

Policy Driven Practices for SOA

Policy Driven Practices for SOA Independent Insight for Oriented Practice Policy Driven Practices for SOA Lawrence Wilkes CBDI Forum www.cbdiforum.com Agenda! Enterprise SOA Challenge! SOA Policy Areas! Layered Architecture as a basis

More information

Introducing SOA Governance Suite. Magnus Wettemark, Solution Consultant Manager Software AG

Introducing SOA Governance Suite. Magnus Wettemark, Solution Consultant Manager Software AG Introducing SOA Governance Suite Magnus Wettemark, Solution Consultant Manager Software AG webmethods SOA Offering Layer 7 Service Mediation webmethods X-Broker Service Enablement wm ESB / EntireX / Applinx.Net

More information

zenterprise The Ideal Platform For Smarter Computing Eliminating Redundant Software

zenterprise The Ideal Platform For Smarter Computing Eliminating Redundant Software zenterprise The Ideal Platform For Smarter Computing Eliminating Redundant Software Eliminating Redundant Software Is Harder To Do Than Infrastructure Consolidation but potential savings are greater! To

More information

IBM Security Systems Trends and IBM Framework

IBM Security Systems Trends and IBM Framework IBM Security Systems Trends and IBM Framework Alex Kioni CISSP, CISM, CEH, ITILv3 Security Systems Lead Technical Consultant Central, East & West Africa Region 1 Agenda IBM X-Force 2013 Mid Year Trend

More information

Business Process Management Tampereen Teknillinen Yliopisto

Business Process Management Tampereen Teknillinen Yliopisto Business Process Management Tampereen Teknillinen Yliopisto 31.10.2007 Kimmo Kaskikallio IT Architect IBM Software Group IBM SOA 25.10.2007 Kimmo Kaskikallio IT Architect IBM Software Group Service Oriented

More information

SOA Governance and the Service Lifecycle

SOA Governance and the Service Lifecycle IBM SOA SOA Governance and the Service Lifecycle Naveen Sachdeva sachdeva@us.ibm.com IBM Software Group 2007 IBM Corporation IBM SOA Agenda What is SOA Governance? Why SOA Governance? Importance of SOA

More information

JOURNAL OF OBJECT TECHNOLOGY

JOURNAL OF OBJECT TECHNOLOGY JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,

More information