Security and Identity
|
|
|
- Hugo Knight
- 10 years ago
- Views:
Transcription
1
2 Security and Identity <Insert Picture Here> Management J. Alberto Yépez Vice President Oracle Corporation
3 Agenda Corporate Background Business Drivers Oracle s Strategy Case Studies Oracle s Differentiation
4 Corporate <Insert Picture Here> Background
5 Strategic Acquisitions Applications 2005 PeopleSoft / JD Edwards (1/05) Retek (4/05) ProfitLogic (7/05) i-flex (8/05) G-Log (9/05) TempoSoft (12/05) Applications 2006 Siebel (1/06) 360Commerce (1/06) Portal Software (4/06) Demantra (6/06) Telephony@Work (6/06) Metasolv (10/06) SPL WorldGroup (11/06) Agile Software (5/07) Database 2005 TimesTen (06/05) TripleHop Technologies (06/05) Context Media (07/05) Innobase (10/05) Database 2006 Sleepycat (2/06) Middleware <2005 IronFlare (5/01) TopLink (6/02) Collaxa (1/04) Phaos Technologies (5/04) Middleware 2005 Oblix (3/05) Thor Technologies (11/05) OctetString (11/05) Middleware HotSip (2/06) Net4Call (4/06) Sigma Dynamics (8/06) Sunopsis (10/06) Stellent (11/06) Hyperion (3/07) AppForge, LODESTAR c.f.
6 Business <Insert Picture Here> Drivers
7 Today s e-government IT Challenges More Compliant Increasing regulatory demands Increasing privacy concerns Global and EU directives More Responsive More accessibility for employees, citizens and business Reduce cost, self-service environment Faster reaction to changing requirements More Secured Identity theft Intellectual property theft Organized crime Constant global threats
8 State Of Security In Public Sector Incomplete Multiple point solutions from many vendors Disparate technologies that don t work together Complex Repeated point-to-point integrations Mostly manual operations Non-compliant Difficult to enforce consistent set of policies Difficult to measure compliance with those policies
9 Security Critical To Business Continuity Amateur hackers Web site defacement Viruses Infrequent attacks Organized crime IP theft Identity theft Privacy
10 Managing Operational Risks Majority of security breaches from within organization Fragmented security policies Orphaned accounts Expired access rights Lack of aggregated audit and accountability Leaked passwords, social engineering Manual provisioning of user accounts requests prone to errors IT administrators unaware of organizational and role changes Identity theft
11 Identity Management External Internal SOA Applications Delegated Admin Identity Management Services Citizens Access Management Authentication & SSO Authorization & RBAC Identity Federation Business IT Staff Employees Identity Administration Delegated Administration Self-Registration & Self-Service User Group & Roles Management SOA Applications Auditing and Reporting Workflow and Orchestration Monitoring and Management Directory Services LDAP Directory Meta-Directory Virtual Directory Identity Provisioning Who, What, When, Where, Why Rules and Access Policies Integration Framework Applications Infrastructure Physical Assets ERP CRM OS (Unix) HR Mainframe NOS/Directories Cell Phone Physical Access
12 Oracle s <Insert Picture Here> Strategy
13 Oracle s IdM Strategy Enterprise Manager SOA Applications SOA Identity Applications & Security Business Applications Fusion Middleware Business Intelligence Databases
14 IdM is part of Fusion Middleware
15 Oracle s Identity & Security Strategy Complete, unified solution Coherent and comprehensive security Cross-silo integrated identity & security Application-centric Protecting business processes and web services (SOA) Identity & security as infrastructure, not bolt-on layer Hot-pluggable Standards-based Heterogeneous Best-of-breed components as well as integrated IAM suite
16 Identity & Access Management Access Control Authentication & Authorization Single Sign-On Federation Web Services Security Identity Administration Identity Lifecycle Administration Role & Membership Administration Provisioning & Reconciliation Compliance Automation Audit & Compliance Directory Services Virtualization Synchronization Storage Audit Data Attestation Segregation of Duties Controls Management Service Levels Configuration Performance Automation
17 Oracle I&AM Products Access Control Oracle Access Manager Oracle Enterprise Single Sign-On Oracle Identity Federation Oracle Web Services Manager Identity Administration Oracle Identity Manager Audit & Compliance Directory Services Oracle Virtual Directory Oracle Internet Directory (with Directory Integration Platform) Oracle Identity & Access Management Suite Management Oracle Enterprise Manager for Identity Management
18 Complete, Unified Security Application security Fine grained access control across applications Integrated with packaged enterprise applications Middleware security Comprehensive Identity Services Framework Integrated security with application server and SOA framework Data security Data security at rest, in transit and in archive Consolidation of management and security of auditable data Physical security Integrated logical and physical security
19 Data Privacy Ensure Data Privacy at All Levels Protect from Insider Threat Safeguard Personally Identifiable Information (PII) Efficiently and Effectively Meet Regulatory Requirements Database Vault Secure Search Label Security Advanced Security Content/ Record DB Audit Vault Multi-factor DBA Controls Authorized Search Data Classification Encrypted Data Unstructured Data Mgmt Monitor, Alert, Consolidate
20 Application Centric Security Comprehensive security for applications Single sign-on and federated access Fine grain authorization Roles and entitlements management HR and identity management process integration Identity Services Framework Identity services as infrastructure Rapid-integration enabled security platform Abstracted identity storage Centralized policy enforcement and compliance monitoring
21 Oracle IdM-App Integration Offerings Features Agent-less integration framework Application-centric centric and technology-centric centric OOTB connectors Abstraction of functional layers Componentized architecture N-tier J2EE architecture Deploys on wide range of J2EE application + DB servers Highly customizable and extensible Oracle Application Integrations Oracle e-business e Suite PeopleSoft Siebel JD Edwards Oracle Retail (H1 2007) PeopleSoft Campus (2007) Telecom/Portal (2007) Oracle Clinical Solutions (2007) SAP & Other Application Integrations SAP R/3, Basis, CUA SAP HRMS SAP Certification (2007) Lawson (2007) other tier-2 2 applications SCT Sungard Banner (2007) Cerner (2007) McKesson (2007)
22 Hot Pluggable & Open Strategy Deploy on heterogeneous platforms Application, web, DB, directory servers Operating systems Work with competition s products Business apps, Identity Management, system management Leverage open standards Use, drive and innovate Standardized on J2EE architecture
23 Heterogeneous Support Sample Integrations Portals Application/Web Servers Applications Groupware Directories Operating Systems ACF-2 & TSS RACF
24 Standards Support Contribute and lead SSTC (SAML Working Group) - Co-Chair Liberty Alliance - President, Board Member WSS, WS-SX (Web Services Security) - Author SPML - Author XACML Voting member Implement Accelerate product development Simplify product integration & minimize TCO Innovate Enable Identity Governance Framework: CARML, AAPML Standards for end-to-end security
25 <Insert Picture Here> Case Studies
26 BAMF BUSINESS CHALLENGE Have a complex IT environment consisting of multiple data stores Need of Delegated administration and group management for their applications Need of Password Sync from Active Directory to several OID data stores ORACLE SOLUTION Oracle Access Manager and Identity Manager chosen for external & 2000 internal users Identity Manager solves problems with: Delegated management of identities Password sync (e.g. with MS AD) Governance compliance RESULTS Reduced Administration costs and great user experience around password management Efficient Account creation and cancellation Password sync between OID, AD (leading directory) and Oracle database Web Single Sign-On with Application Express Apps and J2EE Apps
27 Deutsche Post World Net BUSINESS CHALLENGE With 500,000 employees in more than 220 countries Deutsche Post World Net operates an extensive IT infrastructure to link all parts of the organization. Need to expand metadirectory services with an identity access layer Simplify the user management and have to meet new security requirements. ORACLE SOLUTION Oracle Virtual Directory gives a single LDAP view on user information stored in different systems such as databases, directories, servers. Oracle Virtual Directory is fast to introduce and satisfies new authentication requirements Oracle Virtual Directory redirects authentication requests to the DPWN Active Directory or Critical Path directory RESULTS No data synchronization necessary No change/modification of existing applications Consolidated view on several user stores Consolidated view as a central service
28 Dublin City Council BUSINESS CHALLENGE No single source of user / accounts No business processes in place for account creation 17 different and very autonomous Departments, each with their own IT systems No tracking of resource moves between depts IT needs to be able to bill other dept s accurately for use of resources ORACLE SOLUTION Oracle Identity Manager chosen over Sun, Novell, CA, IBM 3500 users. Automated provisioning to MS Active Directory Full integrated suite created competitive differentiation RESULTS Expect to lower operational costs by centralizing user administration Enable operational efficiency and increase security across application environment Establish a platform for automating resource & IT account provisioning processes
29 Swedish Police BUSINESS CHALLENGE Establish secure and centralized mgt of identities across multiple enterprise directories & applications - incorporation of process workflows End users and managers have poor visibility into in-process and completed provisioning workflows Protect against locally administered changes to user entitlements directly w/in the target systems Poor mgt of user certificates within RSA Keon ORACLE SOLUTION Oracle Identity Manager selected over Novell Highly flexible and extensible product Superior support for onboarding and analysis mechanisms for orphan account detection Support for rollback/undo and escalation Mature product with solid architecture Flexibility and customizability RESULTS Significant cost avoidance (est. over $1M) for identity synchronization, workflow & administration functionality Establishment of automated role & rule-based assignment of access privileges to all managed systems Improvement of information quality by centralizing user records and cleaning existing data Detailed and easily accessible audit functionality
30 Banedanmark BUSINESS CHALLENGE Banedanmark, owned by the Danish State, operates the physical network (the rails) and the train traffic in Denmark The implementation of a new major portal project initiated a need for an identity management project consolidating and managing employees, contractors, and business partners across the enterprise ORACLE SOLUTION Oracle selected over Microsoft Oracle Identity and Access Management Suite Identity Manager Connectors to SAP and AD RESULTS First phase will focus on identity clean-up, consolidation, and provisioning using Oracle Identity Manager Phase two later this year will start focusing on access management including single sign-on
31 Scottish Government BUSINESS CHALLENGE Fragmented customer records and no single source of Citizen info across Scottish Govt. Need to integrate to the UK Government Gateway so that users can access the Citizen Account (single, electronic customer record) ORACLE SOLUTION The Scottish Govt., National Infrastructure Project selected Oracle s Identity and Access Management Suite beating out Software AG Suite will integrate UK Govt. Gateway Working with Sopra, Newell and Budge as the prime contract provider RESULTS IAM will authenticate Citizens and Govt. employees when they access the system either via the Council Website where they live (one of the 32 Local Authorities), the UK Government Gateway or the Central Portal site where the Citizen Account will be running Plan to provide a source of truth that will potentially update Govt. records and provide a better service to the 5M Citizens of Scotland where they can change personal details only once across multiple agencies as well as enroll for entitlements
32 Oracle s <Insert Picture Here> Differentiation
33 Oracle The Information Company Enterprise Manager SOA Applications SOA Identity Applications & Security Business Applications Fusion Middleware Business Intelligence Databases
34 Oracle Database Security 30 Years of Innovation Oracle Audit Vault (Beta) Oracle Database Vault DB Security Evaluation #19 Transparent Data Encryption EM Configuration Scanning Fine Grained Auditing (9i) Secure application roles Client Identifier / Identity propagation Oracle Label Security (2000) Proxy authentication Enterprise User Security Global roles Virtual Private Database (8i) Database Encryption API Strong authentication (PKI, Kerberos, RADIUS) Native Network Encryption (Oracle7) Database Auditing 1977Government customer 2007
35 Customer Advisory Board Customer Advisory Board (CAB) Share, Communicate, Partnership Quarterly meetings Monthly newsletters Knowledge sharing Roadmap prioritization Product design validation
36 Industry Recognition Leader in Enterprise Identity Provisioning (Oracle s) IAM Roadmap looks the best of all vendors Leader in Web Access Management (Oracle) Access Manager ranks as one of the more fully featured WAM products" 2006 Gartner UP MQ 2006 Gartner WAM MQ Oracle can now be viewed as a Premier Provider of Identity and Access Management Technology ** move Oracle to the shortlist of enterprise customers looking to deploy a full suite of applications with secure identity management capabilities across their everchanging IT landscapes (*)
37 Strongest Vendor According To Burton Oracle is currently the IdM vendor to beat - VantagePoint 2007: Identity and Privacy Trends in Enterprise IT
38 Partners: ISV Ecosystem Strong Authentication Physical Access Network Access Healthcare Role Management
39 Partners: System Integrators
40 Key Oracle Differentiators Complete suite of best-of-breed products Complete & best integrated identity management suite Includes compliance, virtualization and system management Market leadership validated by press and analysts Proven for large scale deployments Large, complex, and award winning deployments Broad customer base and use cases Large referenceable customer base Best long-term investment Strong support of open standards and hot-pluggable strategy Pre-integrated with Oracle products DB, middleware, apps Pre-integrated with over 50 applications and infrastructure Underpins Oracle s next generation of Fusion Applications
41
42
ORACLE FUSION MIDDLEWARE PROFILE
ORACLE FUSION MIDDLEWARE PROFILE Corporate Addvantum, is a global service provider of Information Technology consulting and services, to customers in GCC region. Addvantum has technical delivery centers
Enterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
The Unique Alternative to the Big Four. Identity and Access Management
The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration
Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration Horst Bliedung Director International Sales CEE Siemens IT Solutions and Services
OracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
US Department of Justice vs. Composed by: Henry Arayasirikul
US Department of Justice vs. Composed by: Henry Arayasirikul Overview Oracle Corporation (Oracle) is an enterprise software company that is based out of Redwood City, CA. The Company develops, manufactures,
Oracle Identity And Access Management
Oracle Identity And Access Management Ed King Senior Director, Product Management The following is intended to outline our general product direction. It is intended for information
Identity Governance Evolution
Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle
IBM Tivoli Identity Manager
Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces
Governance, Risk & Compliance for Public Sector
Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment
1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
How Can Agile Customers Benefit from Oracle Fusion Middleware Today?
How Can Agile Customers Benefit from Oracle Fusion Middleware Today? Devendra Singh VP, Development, Agile PLM Gnani Palanikumar Product Management Director, Agile PLM Markus Zirn
<Insert Picture Here> Charles Phillips. President Oracle Corporation
Charles Phillips President Oracle Corporation Oracle Corporation World s largest enterprise software vendor $18 billion revenue, FY07 300,000 global customers 235,000 Oracle Database
Enterprise Content Management Suite 11g
Introducing Oracle Enterprise Content Management Suite 11g Roberto Nogueras g Senior Principal Instructor Oracle Ibérica Agenda Enterprise Content t Management (ECM)
Identity Management Basics. OWASP May 9, 2007. The OWASP Foundation. Derek Browne, CISSP, ISSAP [email protected]. http://www.owasp.
Identity Management Basics Derek Browne, CISSP, ISSAP [email protected] May 9, 2007 Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms
RSA Identity Management & Governance (Aveksa)
RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity
Sun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
Identity Management Overview. Bill Nelson [email protected] Vice President of Professional Services
Identity Management Overview Bill Nelson [email protected] Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)
Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach [email protected]
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach [email protected] The following is intended to outline our general product direction. It is intended for information purposes
Intelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
Quest One Identity Solution. Simplifying Identity and Access Management
Quest One Identity Solution Simplifying Identity and Access Management Identity and Access Management Challenges Operational Efficiency Security Compliance Too many identities, passwords, roles, directories,
<Insert Picture Here> Oracle Database Vault
Oracle Database Vault Kamal Tbeileh Senior Principal Product Manager, Database Security The following is intended to outline our general product direction. It is intended for information
Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010
Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,
Securing the Cloud through Comprehensive Identity Management Solution
Securing the Cloud through Comprehensive Identity Management Solution Millie Mak Senior IT Specialist What is Cloud Computing? A user experience and a business model Cloud computing is an emerging style
<Insert Picture Here>
Oracle and MetaSolv Acquisition Announcement Delivering a leading end-to-end packaged software solution addressing the key business processes of the Communications Industry General
Identity Access Management Challenges and Best Practices
Identity Access Management Challenges and Best Practices Mr. Todd Rossin, Managing Director/Founder IDMWorks Special Thanks to JHU APL for providing the Parsons Auditorium for our use this evening 1 December
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management
First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2
First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2 SAP Product Management, SAP NetWeaver Identity Management & Security Kristian
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Oracle Database Security Advanced Security Option Thanos Terentes Printzios DB & Options Specialist A&C Technology Adoption Office Oracle Partner Business Development, ECEMEA 2 What is a customers INFORMATION
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management
TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management Table of Contents Executive Summary 1 SECTION 1: CHALLENGE 2 The Need for
How can Identity and Access Management help me to improve compliance and drive business performance?
SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the
FREQUENTLY ASKED QUESTIONS. Oracle Applications Strategy
FREQUENTLY ASKED QUESTIONS Oracle Applications Strategy The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT
Solution in Detail NetWeaver BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING NetWeaver IDENTITY MANAGEMENT Identity management today presents organizations with a host of challenges. System landscapes
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August
Oracle Role Manager. An Oracle White Paper Updated June 2009
Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship
Integrating Hitachi ID Suite with WebSSO Systems
Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication
<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications
Integrating your On-Premise Applications with Cloud Applications Agenda Hybrid IT Infrastructure An Emerging Trend A New Set of Challenges The Five Keys to Overcoming the Challenges
API Management: Powered by SOA Software Dedicated Cloud
Software Dedicated Cloud The Challenge Smartphones, mobility and the IoT are changing the way users consume digital information. They re changing the expectations and experience of customers interacting
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?
SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business
RSA Identity and Access Management 2014
RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and
<Insert Picture Here> Camilla Kampmann
Camilla Kampmann Senior Marketing Director, EE&CIS, Oracle Corporation Strong FY07 Financial Performance New Software License Revenue Maintenance Revenue Service Revenue Total Revenue
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information The following is intended to outline our general product direction. It is intended for information purposes only,
Trust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager ([email protected]) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
The preceding is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The preceding is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
Apache Syncope OpenSource IdM
Apache Syncope OpenSource IdM Managing Identities in Enterprise Environments Version 1.3 / 2012-07-26 Apache Syncope OpenSource IdM by http://syncope.tirasa.net/ is licensed under a Creative Commons Attribution
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
Identity and Access Management
Cut costs. Increase security. Support compliance. www.siemens.com/iam Scenarios for greater efficiency and enhanced security Cost pressure is combining with increased security needs compliance requirements
Securing your business
Securing your business Anders Askåsen Product Manager for OpenIDM * World Wide Coverage ForgeRock.com Enterprise Open Source Software ForgeRock Norway ForgeRock USA ForgeRock UK ForgeRock France Consulting
Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience
Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Oracle E-Business Suite Single Sign On Using Oracle Access Manager
Oracle E-Business Suite Single Sign On Using Oracle Access Manager Session ID#: 301 Prepared by: Pierre Paniagua Consultant AST Corporation REMINDER Check in on the COLLABORATE mobile app About Pierre
Addressing Cyber Security in Oracle Utilities Applications
Addressing Cyber Security in Oracle Utilities Applications Anthony Shorten Principal Product Manager Oracle Utilities Global Business Unit Sept, 2014 Safe Harbor Statement The following is intended to
2013 AWS Worldwide Public Sector Summit Washington, D.C.
Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company
CA Federation Manager
PRODUCT BRIEF: CA FEDERATION MANAGER CA FEDERATION MANAGER PROVIDES STANDARDS-BASED IDENTITY FEDERATION CAPABILITIES THAT ENABLE THE USERS OF ONE ORGANIZATION TO EASILY AND SECURELY ACCESS THE DATA AND
Rebuilding Corporate Trust: GRC and IT Governance. Dražen Patarić Senior Sales Consultant
Rebuilding Corporate Trust: GRC and IT Governance Dražen Patarić Senior Sales Consultant Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information
SAM Enterprise Identity Manager
SAM Enterprise Identity Manager The Next IAM Generation New, rich, full-featured business process workflow capabilities Multi-level segregation of duties management and reporting Easy-to-use and secure
Kuppinger Cole Virtual Conference The Three Elements of Access Governance
Kuppinger Cole Virtual Conference The Three Elements of Access Governance Martin Kuppinger, Kuppinger Cole [email protected] December 8th, 2009 This virtual conference is sponsored by Axiomatics and
Simplify Identity Management with the CA Identity Suite
SOLUTION BRIEF CA DATABASE IDENTITY SUITE MANAGEMENT IDENTITY FOR MANAGEMENT DB2 FOR z/os DRAFT Answer the cover question by stating how the solution can deliver the desired benefits; typically, technical
Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance
Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
Security management solutions White paper. Extend business reach with a robust security infrastructure.
Security management solutions White paper Extend business reach with a robust security infrastructure. July 2007 2 Contents 2 Overview 3 Adapt to today s security landscape 4 Drive value from end-to-end
midpoint Overview Radovan Semančík December 2015
midpoint Overview Radovan Semančík December 2015 Agenda Identity Management Introduction midpoint Introduction midpoint Architecture Conclusion Identity Management Introduction Identity Management System
SNUG June 16, 2006 The Future of PeopleSoft Integration
SNUG June 16, 2006 The Future of PeopleSoft Integration Reasons to Use Your Free PeopleSoft and Fusion Middleware Integration Tools 1 Aims and Ambitions Web Services and Process Orchestration Primer Understand
<Insert Picture Here> Oracle Web Services Manager (WSM)
Oracle Web Services Manager (WSM) Marc Chanliau Director, Product Management Outline Introduction Product Overview Typical Use-Case Scenarios Roadmap Q & A Introduction
A Technical Roadmap for Oracle Fusion Middleware, E-Business Suite Release 12 and Oracle Fusion Applications
A Technical Roadmap for Oracle Fusion Middleware, E-Business Suite Release 12 and Oracle Fusion Applications John Stouffer Oracle E-Business ACE Independent Consultant 214 535 6847 [email protected]
Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004
Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory
SAP Identity Management Overview
Identity Management Overview October 2014 Public Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password
Oracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
<Insert Picture Here> Oracle Master Data Management Strategy
Oracle Master Data Management Strategy Name Title The following is intended to outline our general product direction. It is intended for information purposes only, and may not be
Connecting Users with Identity as a Service
Ping Identity has demonstrated support for multiple workforce and external identity use cases, as well as strong service provider support. Gregg Kreizman Gartner 1 Connecting Users with Identity as a Service
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Approaches to Enterprise Identity Management: Best of Breed vs. Suites
Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity
Oracle IDM Integration with E-Business Suite & Middleware Technologies
Oracle IDM Integration with E-Business Suite & Middleware Technologies Session ID#: 14251 Prepared by: Scott Brinker IDM Security Specialist CAP Deepak Sharma Sr. Consultant AST Corporation REMINDER Check
Oracle SOA Suite: The Evaluation from 10g to 11g
KATTA Durga Reddy TATA Consultancy Services. Oracle SOA Suite: The Evaluation from 10g to 11g Introduction Oracle SOA Suite is an essential middleware layer of Oracle Fusion Middleware. It provides a complete
Why is Master Data Management getting both Business and IT Attention in Today s Challenging Economic Environment?
Why is Master Data Management getting both Business and IT Attention in Today s Challenging Economic Environment? How Can You Gear-up For Your MDM initiative? Tamer Chavusholu, Enterprise Solutions Practice
How Accenture is taking SAP NetWeaver Identity Management to the next level. Kristian Lehment, SAP AG Matthew Pecorelli, Accenture
How Accenture is taking SAP NetWeaver Identity Management to the next level Kristian Lehment, SAP AG Matthew Pecorelli, Accenture In This Session You will receive an overview of the functionality that
Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.
Security management White paper Develop effective user management to demonstrate compliance efforts and achieve business value. September 2008 2 Contents 2 Overview 3 Understand the challenges of user
Secure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
Enterprise Management Solutions Protection Profiles
Enterprise Management Solutions Protection Profiles Eric Winterton, Booz Allen Hamilton Joshua Brickman, CA Inc. September 2008 Copyright 2008 CA, Inc. and Booz Allen Hamilton. All rights reserved. All
Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, 2004 9:00 AM
Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance RSA Security and Accenture February 26, 2004 9:00 AM Agenda Laura Robinson, Industry Analyst, RSA Security Definition of
Select the right solution for identity and access governance
IBM Security Buyer s Guide June 2015 Select the right solution for identity and access governance Protecting critical assets from unauthorized access 2 Select the right solution for identity and access
