Oracle Identity Management Securing The New Digital Experience
|
|
|
- Sharyl Henderson
- 10 years ago
- Views:
Transcription
1 Oracle Identity Management Securing The New Digital Experience Security: User Single Sign-On, Certifying User Access, and Masking Sensitive Data Henry Anzarouth Principal Sales Consultant, Security and Identity Management
2 This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates. Copyright 2011, Oracle and/or its affiliates. All right 2
3 Agenda User Single Sign-On with Oracle Access Manager Certifying User Access with Oracle Identity Analytics Masking Sensitive Data with Oracle Enterprise Manager and EBS Accelerator (Masking Template) 3 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
4 The New Identity Platform Complete and Converged Identity Governance Access Management Lifecycle Management & 360 visibility Regular & Privileged identities Complete access control & SSO Fraud Detection Converged Policy Administration & Control Directory Services LDAP, Virtualization Fraud & Meta-directory Detection Unified Administration & Management Copyright 2012, Oracle and/or its affiliates. All right 4
5 Identity Management Portfolio 11gR2 Modern, Innovative & Integrated Governance Password Reset Privileged Accounts Access Request Roles Based Provisioning Role Mining Attestation Separation of Duties Access Web Single Sign-on Federation Mobile, Social & Cloud External Authorization SOA Security Integrated ESSO Token Services Fraud Detection Directory LDAP Storage Virtual Directory Meta Directory Platform Security Services Copyright 2012, Oracle and/or its affiliates. All right 5
6 Access Management: Complete and Converged SSO With E-Business Suite Copyright 2012, Oracle and/or its affiliates. All right 6
7 Copyright 2012, Oracle and/or its affiliates. All right 7
8 Copyright 2012, Oracle and/or its affiliates. All right 8
9 SSO Process Flow Copyright 2011, Oracle and/or its affiliates. All right 9
10 Copyright 2012, Oracle and/or its affiliates. All right 10
11 Copyright 2012, Oracle and/or its affiliates. All right 11
12 now certified Copyright 2012, Oracle and/or its affiliates. All right 12
13 Copyright 2012, Oracle and/or its affiliates. All right 13
14 Open World Session 2012 Oracle E-Business Suite and Security Copyright 2012, Oracle and/or its affiliates. All right 14
15 Oracle Identity Business Today 30K Customers in 45 Countries INDUSTRY LEADERSHIP These graphics were published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any of warranties of merchantability or fitness for a particular purpose. User Provisioning Identity Governance Web Access Management Copyright 2012, Oracle and/or its affiliates. All right 15
16 Identity Governance: Complete and Converged Copyright 2012, Oracle and/or its affiliates. All right 16
17 Oracle Identity Governance Governance Platform Connectors Provision Grant User Access De-Provision Monitor User Access Access Request Privileged Account Request Role Lifecycle Management Check-in/ Checkout Identity Certifications IT Audit Monitoring Rogue Detection & Reconciliation Reporting & Privileged Access Monitoring Roles Entitlements Access Catalog IT Ownership Accounts Glossaries Business Attributes 17
18 Oracle Identity Governance Suite Governance Platform Oracle Identity Manager Provisioning Reconciliation Identity Administration Access Request Oracle Identity Analytics ERP, DB and Mainframes Fusion Applications Oracle Privileged Account Manager Role Mgmt. Monitoring Dashboards Segregation of Duties Access Certification Cloud Applications Policy Management Password Check-in/ Check-out 18
19 Access Certification Making Certification sustainable Spreadsheet approach Risk Analytics Business IT collaboration 19 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
20 Attestation Sign-Off 1 Set Up Periodic Review 2 Reviewer Is Notified Goes to Self Service Reviewer Selections 3 Automated Action is taken based on Periodic Review 4 Report Built And Results Stored in DB What Is Reviewed? Who Reviews It? Start When? How Often? Certify Reject Decline Delegate Comments Result to User Automatically Terminate User Notify the Process Owner Notify Delegated Reviewer Audit Attested Data Attestation Actions Delegation & Revocation Paths 20 Copyright 2009, Oracle. All rights reserved
21 Scenario s Actors Certification & Closed Loop Remediation Manager Administrator Complete user access certification Create and track certification progress 21 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
22 Manager receives an notification for a new certification Manager Logs-in 22 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
23 23 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Manager select the new certification
24 List of all his employees is shown with a risk summary and detail information 24 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
25 1. One of the filtering criteria (Risk) is used to show high-risk users. 25 Copyright 2012, Oracle and/or its affiliates. All rights reserved. 2. ENESS is selected
26 Roles are shown (all low risk) 26 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
27 Entitlement view is selected. Several high risk elements are present. 27 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
28 Sort by risk summary. 28 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
29 View details of this entitlement 29 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Last certification action (e.g.: Revoked, Certified) Provisioning Method (e.g.: access request with OIM, Reconciliation)
30 Manager decides to revoke this access 30 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
31 Revocation action is shown along with comments. 31 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
32 Manager decides to complete all users (certify). Signature is required (Password) 32 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
33 Manager dashboard shows that all user certifications have been compeleted 33 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
34 Certification Administrator s Dashboard Administrator Logs-in 34 Copyright 2012, Oracle and/or its affiliates. All rights reserved.
35 Remedition Tracking 35 Copyright 2012, Oracle and/or its affiliates. All rights reserved. The last certification requires the revocation of an entitlement. OIM is instructed to remove the entitlement.
36 36 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Remediation has completed Administrator will view the details
37 37 Copyright 2012, Oracle and/or its affiliates. All rights reserved. The only user impacted was Elliot Ness The entitlement has been removed by OIM. This closes the remediation loop (Closed-loop remediation)
38 Maximum Security with Oracle Database Security 12c Henry Anzarouth Principal Sales Consultant, Security and Identity Management Oracle
39 Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with Basic Controls 98% records stolen from databases 84% records breached using stolen credentials 71% fell within minutes 92% discovered by third party 39
40 Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management 40
41 Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management 41
42 Encryption is the Foundation Preventive Control for Oracle Databases Oracle Advanced Security Transparent data encryption Prevents access to data at rest Requires no application changes Built-in two-tier key management Near Zero overhead with hardware Integrations with Oracle technologies e.g. Exadata, Advanced Compression, ASM, Golden Gate, DataPump, etc. Applications Disk Backups Exports Off-Site Facilities 42
43 Masking Data for Non-Production Use Preventive Control for Oracle Databases Oracle Data Masking Replace sensitive application data Extensible template library and formats Application templates available Referential integrity detected/preserved At source masking and sub-setting* Support for masking data in non-oracle databases LAST_NAME SSN SALARY AGUILAR ,000 BENSON ,000 Production Non-Production Test Dev LAST_NAME SSN SALARY ANSKEKSL ,000 *Requires use of Oracle Test Data Management Production BKJHHEIEDK ,000 43
44 Test Data Management Solutions Sensitive Data Identification Data Subsetting Data Relationship Modeling Test System Setup Data Masking 44 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
45 Data Discovery and Modeling Application Data Models Scans application schemas to model relationships between tables and columns Extract data relationships from Oracle Applications meta-data Oracle ebusiness Suite Oracle Fusion Applications Store referential relationships stored in repository Enables test data operations such as data subsetting, masking Data Relationship Modeling Sensitive Data Identification Test System Setup Data Subsetting Data Masking 45 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
46 Data Discovery and Modeling Sensitive Data Identification Sensitive data discovery Pattern-based database scanning Import from pre-built mask templates Data Masking Templates for Oracle Applications E-Business Suite Fusion Applications Data Relationship Modeling Sensitive Data Identification Test System Setup Data Subsetting Data Masking 46 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
47 Oracle Data Masking Comprehensive and Extensible Mask Library Mask formats for common sensitive data Accelerates solution deployment of masking Extensible mask routines Enables customization of business rules Define once, apply everywhere Ensures consistent enforcement of policies 47 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
48 Oracle Data Masking Sophisticated Masking Techniques Conditionbased Masking Compound Masking Compound Mask Sets of related columns masked together e.g. Address, City, State, Zip, Phone Condition-based Masking Specify separate mask format for each condition, e.g. driver s license format for each state SQL-expression based masking Use SQL functions, e.g. UPPER, SUBSTR, TO_CHAR, to generate mask values, e.g. SUBSTR(%ORIG_VALUE%,1,3) Copyright 2011, Oracle and/or its affiliates. All rights reserved.
49 E-Business Suite Data Masking E-Business Suite Masking Template Metadata for the EM Masking tool Columns, Relationships, and Masking rules for PII and Sensitive attributes for E-Business Suite products Instructions for wiping credentials after cloning (Support Note ) 950 Columns / 1900 rules 65% HCM - Payroll, Employment Details, Personal Info Also TCA, ATG, Financials, Projects Not split out by product or family De-identification needs to be done across the DB 49 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
50 Goals in Application Masking De-Identify the data Scramble identifiers of individuals (PII) Name, account, address, location, drivers license Mask sensitive data Mask the data that, if associated with PII, would cause privacy concerns Compensation Health Employment Information Maintain Data Validity 50 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
51 PersonaIIy Identifiable Information Categories Name Business Location Business Phone Business ID Accounts (Bank, debit, credit) Location External ID (drivers license) National ID (social security number) Web Site Phone 51 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
52 Personally Identifiable Information 50 Attributes Person Name Web Site Pension ID Number Maiden Name National Identifier Article Number Business Address Passport Number Civil Identifier Number Business Telephone Number Drivers License Number Hafiza Number Business Address Personal Address Social Security Number Custom Name Personal Telephone Number Trade Union Membership Number Employee Number Personal Address Pension Registration Number User Global Identifier Visa Number or Work Permit National Insurance Number Customer Number Bank Account Number Health Insurance Number Account Name Card Number (credit or debit) Personal Public Service Number Mail Stop Tax Registration Number or National Taxpayer Identifier Electronic Taxpayer Identification Number GPS Location Person Identification Number Biometrics Data Student Examination Hall Ticket Number Welfare Pension Insurance Number Digital ID Club Membership ID Unemployment Insurance Number Citizenship Number Library Card Number Government Affiliation ID Voter Identification Number Identity Card Number Military Service ID Residency Number (Green Card) Instant Messaging Address Social Insurance Number 52 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
53 Sensitive Data Compensation Employment details Nationality / Citizenship Health Information Personal information Mother's maiden name Passwords Encryption keys Audit information Session information 53 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
54 Privileged User Controls Preventive Control for Oracle Databases Database Vault Limit DBA access to application data Multi-factor SQL command rules Realms create protective zones Enforce enterprise data governance, least privilege, segregation of duties Out of the box application policies Applications Procurement HR Finance select * from finance.customers Security DBA DBA Applicatio n DBA 54
55 Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management 55
56 Database Activity Monitoring and Firewall Detective Control for Oracle and non-oracle Databases Oracle Audit Vault and Database Firewall Monitors network traffic, detect and block unauthorized activity Highly accurate SQL grammar analysis Can detect/stop SQL injection attacks Whitelist approach to enforce activity Users Apps Allow Log Alert Substitute Block Blacklists for managing high risk activity Scalable secure software appliance SQL Analysis Whitelist Blacklist Policy Factors 56
57 Audit, Report, and Alert in Real-Time Detective Control for Oracle and non-oracle Databases Oracle Audit Vault and Database Firewall Centralized secure repository delivered as secure, scalable software appliance Powerful alerting - thresholds, groupby Out-of-the box and custom reports Consolidated multi-source reporting Audit Data & Event Logs Oracle Database Firewall OS & Storage Directories Databases! Alerts Built-in Reports Custom Reports Policies SOC Auditor Built-in fine grain segregation of duties Custom Security Analyst 57
58 Oracle Audit Vault and Database Firewall New Solution for Oracle and Non-Oracle Databases Users Applications Database Firewall Allow Log Alert Substitute Block Firewall Events SOC Alerts! Auditor Security Analyst Built-in Reports Custom Reports Policies Audit Vault Audit Data OS, Directory, File System & Custom Audit Logs 58
59 Oracle Database Security Solutions Defense-in-Depth for Maximum Security PREVENTIVE DETECTIVE ADMINISTRATIVE Encryption Activity Monitoring Privilege Analysis Redaction and Masking Database Firewall Sensitive Data Discovery Privileged User Controls Auditing and Reporting Configuration Management 59
60 Oracle Database Security Solutions Customer Benefits Enterprise ready Security and compliance Simple and flexible Speed and scale Customers Worldwide Rely on Oracle oracle.com/goto/database/security-customers 60
61 Oracle Database Security Solutions Key Benefits Enterprise Ready Security and Compliance Simple and Flexible Speed and Scale 61
62 Q&A 62
63 63
64 White Papers Datasheets facebook.com/oracleidm blogs.oracle.com/oracleidm twitter.com/oracleidm Copyright 2011, Oracle and/or its affiliates. All right 64
Oracle Database Security. Paul Needham Senior Director, Product Management Database Security
Oracle Database Security Paul Needham Senior Director, Product Management Database Security Safe Harbor Statement The following is intended to outline our general product direction. It is intended for
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Solutions for securing and auditing Oracle database Edgars Ruņģis Technology Consultant Why Are Databases Vulnerable? 80% of IT Security Programs Don t Address Database Security Forrester Research Enterprises
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
Oracle Database Security
Oracle Database Security Paul Needham, Senior Director, Product Management, Database Security Target of Data Breaches 2010 Data Breach Investigations Report Type Category % Breaches
Complete Database Security. Thomas Kyte http://asktom.oracle.com/
Complete Database Security Thomas Kyte http://asktom.oracle.com/ Agenda Enterprise Data Security Challenges Database Security Strategy Oracle Database Security Solutions Defense-in-Depth Q&A 2 Copyright
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks
EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information Proteggere i dati direttamente nel database Una proposta tecnologica Angelo Maria Bosis Sales Consulting Senior Manager
Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience
Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a
Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach [email protected]
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach [email protected] The following is intended to outline our general product direction. It is intended for information purposes
Database Security & Compliance with Audit Vault and Database Firewall. Pierre Leon Database Security
Database Security & Compliance with Audit Vault and Database Firewall Pierre Leon Database Security 1 Topics Encryption Authentication Authorising highly privileged users Access control by data classification
<Insert Picture Here> Oracle Database Security Overview
Oracle Database Security Overview Tammy Bednar Sr. Principal Product Manager [email protected] Data Security Challenges What to secure? Sensitive Data: Confidential, PII, regulatory
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Cumplimiento de PMG SSI para sector Gobierno en Chile Jaime Briggs MSc CS, CISSP, CCSK Sales Manager Strategic accounts [email protected] Agenda Pilares Fundamentales de SSI Desafios de Seguridad
Identity Governance Evolution
Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
Trust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager ([email protected]) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance
Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics
Oracle Audit Vault and Database Firewall
Oracle Audit Vault and Database Firewall Angelo Maria Bosis Sales Consulting Director Oracle Italia Billions of Database Records Breached Globally 97% of Breaches Were Avoidable with
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
Sun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
An Oracle White Paper June 2009. Oracle Database 11g: Cost-Effective Solutions for Security and Compliance
An Oracle White Paper June 2009 Oracle Database 11g: Cost-Effective Solutions for Security and Compliance Protecting Sensitive Information Information ranging from trade secrets to financial data to privacy
Governance, Risk & Compliance for Public Sector
Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment
Security Compliance and Data Governance: Dual problems, single solution CON8015
Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Oracle Database Security Advanced Security Option Thanos Terentes Printzios DB & Options Specialist A&C Technology Adoption Office Oracle Partner Business Development, ECEMEA 2 What is a customers INFORMATION
Oracle Audit Vault and Database Firewall. Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska
Oracle Audit Vault and Database Firewall Morana Kobal Butković Principal Sales Consultant Oracle Hrvatska The following is intended to outline our general product direction. It is intended for information
Managing Oracle E-Business Suite Security
Managing Oracle E-Business Suite Security Erik Graversen, Senior Principal Software Developer Elke Phelps, Senior Principal Product Manager Oracle E-Business Suite Applications Technology Oracle Open World,
Enterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
Database Security Questions HOUG 2016. Fehér Lajos. Copyright 2015, Oracle and/or its affiliates. All rights reserved.
Database Security Questions HOUG 2016 Fehér Lajos 1 How Data Gets Compromised? Source: Verizon Data Breach Investigations Report Copyright 2015, Oracle and/or 2its affiliates. All rights reserved. Where
Intelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
<Insert Picture Here> Oracle Database Vault
Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information
Data Security: Strategy and Tactics for Success
Data Security: Strategy and Tactics for Success DatabaseVisions,Inc. Fairfax, Va Oracle Gold Partner Solution Provider Oracle Security Specialized www.databasevisions.com Overview Cloud Computing presents
Identity Management Overview. Bill Nelson [email protected] Vice President of Professional Services
Identity Management Overview Bill Nelson [email protected] Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)
Oracle Role Manager. An Oracle White Paper Updated June 2009
Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship
An Oracle White Paper January 2010. Access Certification: Addressing & Building on a Critical Security Control
An Oracle White Paper January 2010 Access Certification: Addressing & Building on a Critical Security Control Disclaimer The following is intended to outline our general product direction. It is intended
Oracle Database Security Solutions
Oracle Database Security Solutions Eric Cheung Senior Manager, Technology Sales Consulting [email protected] May 2008 Key Drivers for Data Security Privacy and Compliance Sarbanes-Oxley
Attestation of Identity Information. An Oracle White Paper May 2006
Attestation of Identity Information An Oracle White Paper May 2006 Attestation of Identity Information INTRODUCTION... 3 CHALLENGES AND THE NEED FOR AUTOMATED ATTESTATION... 3 KEY FACTORS, BENEFITS AND
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
Copyright 2014 Oracle and/or its affiliates. All rights reserved.
Copyright 2014 Oracle and/or its affiliates. All rights reserved. Oracle Data Masking and Subsetting Oracle Advanced Security Best Practices for Database Encryption and Redaction Todd Bottger Sr. Principal
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management
MySQL Security: Best Practices
MySQL Security: Best Practices Sastry Vedantam [email protected] Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Why Add Data Masking to Your IBM DB2 Application Environment
Why Add Data Masking to Your IBM DB2 Application Environment dataguise inc. 2010. All rights reserved. Dataguise, Inc. 2201 Walnut Ave., #260 Fremont, CA 94538 (510) 824-1036 www.dataguise.com dataguise
An Oracle White Paper April 2014. Oracle Audit Vault and Database Firewall
An Oracle White Paper April 2014 Oracle Audit Vault and Database Firewall Introduction... 2 Oracle Audit Vault and Database Firewall Overview... 3 Auditing and Monitoring Overview... 3 Audit Vault... 4
IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
Oracle Human Capital Management Cloud Securing Oracle HCM Cloud. Release 10
Oracle Human Capital Management Cloud Release 10 Oracle Human Capital Management Cloud Part Number E61339-03 Copyright 2011-2015, Oracle and/or its affiliates. All rights reserved. Authors: Suzanne Kinkead,
An Oracle White Paper July 2010. Data Masking Best Practices
An Oracle White Paper July 2010 Data Masking Best Practices Executive Overview... 1 Introduction... 1 The Challenges of Masking Data... 2 Implementing Data Masking... 2 Comprehensive Enterprise-wide Discovery
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003
Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity
Oracle Fusion Applications Security Guide. 11g Release 5 (11.1.5) Part Number E16689-05
Oracle Fusion Applications Security Guide 11g Release 5 (11.1.5) Part Number E16689-05 June 2012 Oracle Fusion Applications Security Guide Part Number E16689-05 Copyright 2011-2012, Oracle and/or its affiliates.
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Disclaimer The following is intended to outline our general product
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory Overview August 2008 Introduction... 3 Centralizing DataBase Account Management using Existing Directories with OVD...
Oracle Privileged Account Manager
Oracle Privileged Account Manager Protecting and Auditing Access to Sensitive Resources O R A C L E W H I T E P A P E R A P R I L 2 0 1 5 Disclaimer The following is intended to outline our general product
Oracle Database Security Services
Oracle Database Security Services BUSINESS CHALLENGES Public announcements of major IT security breaches have become an almost daily occurrence. The causes of publicized breaches are diverse and include
Best Practices Report
Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
Oracle Information Security Visioni
Oracle Information Security Visioni Pillar Partner Webcast Presenter: Ola Sergatchov, Senior Director Information Security Strategy t Oracle North America Technology Organization Why are you here? 1 2
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO
CSN38:Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO 2009 by Lieberman Software Corporation. Rev 20090921a Identity Management Definitions
Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices
Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitment from VMware to deliver these features in any generally
What s new in AM 9.30 Accelerating business outcomes
What s new in AM 9.30 Accelerating business outcomes AGENDA HP Asset Manager overview Relevant Trends and Improvements What s new in AM 9.30 ASSET MANAGER AND HP SOFTWARE PORTFOLIO Industry s most comprehensive
Security Landscape of Cloud Computing
Security Landscape of Cloud Computing Amrith Nawoor Sales Consulting Team Leader East Africa & SADC 1 This document is for informational purposes. It is not a commitment to deliver any material, code,
PCI Compliance in Oracle E-Business Suite
PCI Compliance in Oracle E-Business Suite May 14, 2015 Mike Miller Chief Security Officer Integrigy Corporation David Kilgallon Oracle Integration Manager CardConnect Moderated by Phil Reimann, Director
An Oracle White Paper September 2013. Directory Services Integration with Database Enterprise User Security
An Oracle White Paper September 2013 Directory Services Integration with Database Enterprise User Security Disclaimer The following is intended to outline our general product direction. It is intended
Oracle Enterprise Manager 12c New Capabilities for the DBA. Charlie Garry, Director, Product Management Oracle Server Technologies
Oracle Enterprise Manager 12c New Capabilities for the DBA Charlie Garry, Director, Product Management Oracle Server Technologies of DBAs admit doing nothing to address performance issues CHANGE AVOID
IBM InfoSphere Optim Data Masking solution
IBM InfoSphere Optim Data Masking solution Mask data on demand to protect privacy across the enterprise Highlights: Safeguard personally identifiable information, trade secrets, financials and other sensitive
An Oracle White Paper October 2013. Oracle Data Integrator 12c New Features Overview
An Oracle White Paper October 2013 Oracle Data Integrator 12c Disclaimer This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should
Obtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
Oracle s Cloud Computing Strategy
Oracle s Cloud Computing Strategy Your Strategy, Your Cloud, Your Choice Sandra Cheevers Senior Principal Product Director Cloud Product Marketing Steve Lemme Director, Cloud Builder Specialization Oracle
Test Data Management for Security and Compliance
White Paper Test Data Management for Security and Compliance Reducing Risk in the Era of Big Data WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential
Application Testing Suite Overview
Application Testing Suite Overview Steve Van Hall Principal Sales Consultant, Oracle Corporation Oracle Enterprise Manager Top-Down Application Management Application Operations Management
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC Agenda 1 What DLP is and its purpose 2 Challenges
Cost Effective Data Management for Oracle Utilities Applications
Cost Effective Data Management for Oracle Utilities Applications Anthony Shorten Principal Product Manager Oracle Utilities Global Business Unit Sept, 2014 Safe Harbor Statement The following is intended
An Oracle White Paper June 2013. Security and Compliance with Oracle Database 12c
An Oracle White Paper June 2013 Security and Compliance with Oracle Database 12c Introduction... 3 Oracle Database 12c Security... 4 Locating and Cataloging Your Sensitive Data... 4 Monitoring the Configuration
OracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
How To Manage A Privileged Account Management
Four Best Practices for Passing Privileged Account Audits October 2014 1 Table of Contents... 4 1. Discover All Privileged Accounts in Your Environment... 4 2. Remove Privileged Access / Implement Least
CON9488 The Enterprise Cloud Simplified with Oracle VM
CON9488 The Enterprise Cloud Simplified with Oracle VM Andy Herm, Senior Architect, Cloud Infrastructure, Oracle Conor Wentz, Senior Architect, Cloud Infrastructure, Oracle Honglin Su, Sr. Director of
RSA Identity Management & Governance (Aveksa)
RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity
Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, 2004 9:00 AM
Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance RSA Security and Accenture February 26, 2004 9:00 AM Agenda Laura Robinson, Industry Analyst, RSA Security Definition of
AirWatch Solution Overview
AirWatch Solution Overview Marenza Altieri-Douglas - AirWatch Massimiliano Moschini Brand Specialist Itway 2014 VMware Inc. All rights reserved. Cloud Computing 2 BYOD 3 Device aziendali? 4 From Client/Server
Securing Oracle E-Business Suite in the Cloud
Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals
Developing Value from Oracle s Audit Vault For Auditors and IT Security Professionals November 13, 2014 Michael Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer
