Identity and Access Management Update. Amit Jasuja, Vice President, Oracle Identity Management

Size: px
Start display at page:

Download "Identity and Access Management Update. Amit Jasuja, Vice President, Oracle Identity Management"

Transcription

1 Identity and Access Management Update Amit Jasuja, Vice President, Oracle Identity Management

2 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remain at the sole discretion of Oracle.

3 Agenda Introduction Business Momentum and Trends Key Milestones Sun Assimilation Identity Management 11g Launch Notable Announcements Continued Customer Focus Looking Ahead 3

4 Customer Mix 4

5 Recent Trends Standalone product purchases vs suite purchases Licensing for project need then acquiring additional suite components Suite purchases driven by a re-tooling/modernizing of IdM infrastructure Adoption of complementary technologies from the stack OAAM with OAM / OIA with OIM / OES and OIA / ESSO PR with OIM Compliance/Regulations still a big driver ROI is Key but also IdM as a business enabler (extranet self-service, federation) Cloud IAM for the cloud - customer wants to use cloud apps Salesforce.com, Google Apps, Oracle On Demand IAM as a cloud service provider or enterprise wants to deliver IdM as a service 5

6 Marketplace Trends Security Modern Computing Initiatives Cloud & SaaS Services-based Application Architecture Increased focus on the Extranet Identity Assurance & Theft Prevention Higher metrics for Scalability & Performance Consolidation of Infrastructure Simplified Administration & Operational Management Standards-based frameworks for Integration Business-centric Compliance Convergence of Business Intelligence & Enterprise Security <Insert Picture Here> 6

7 Agenda Introduction Business Momentum and Trends Key Milestones Sun Assimilation Identity Management 11g Launch Notable Announcements Continued Customer Focus Looking Ahead 7

8 Integration of Sun Identity Management OpenSSO Fedlet packaged as a standalone utility, that offers rapid deployment across 3 rd party domains OIA is now integrated with OIM for integrated identity admin, role admin, provisioning & analytics solution Certifications across all Oracle platforms (OWSM, DB, OEL, WLS) for all Sun products Continued investment in performance tuning and sustaining engineering across all Sun products 8

9 Oracle Identity Management 11g Key Design Themes Suite Wide Integration & Standardization Service-Oriented Security Hot Pluggable 9

10 Service-Oriented Security Foundation for Application Security Oracle Apps 3 rd Party/Custom Apps Cloud Service Providers Web Services Declarative Security Services Authorization Federation Authentication Audit ID Admin Role Mgmt Directory Svs Identity Store, Credential Store, and Policy Store Providers Access Management Identity Administration Directory Services 10

11 Suite-Wide Integration & Standardization Complete and Integrated Suite Unified Administration Identity Administration Directory Services Access Management Unified and Modern Web 2.0 based Admin Interface Unified Installation and Configuration Common Auditing and Logging Common Policy Framework Simplified Systems Management Shared Services for: Password Management Identity Administration Single Sign-On Strong Authentication 11

12 Hot-Pluggable Comprehensive Standards and Systems Support Leading Standards: Innovate, Contribute, Implement Support All Leading Applications and Systems ACF-2 & TSS 12

13 Oracle Acquires Passlogix Passlogix provides simple, secure access to all applications Includes client-server, mainframe, desktop and web based applications Together with Oracle, addresses I&AM needs today with authentication, better password management and compliance Acquisition allows for deeper integration and better alignment of our technologies Increased investment in ESSO product features and ease of use Introduce new capabilities such as strong network authentication that supports a variety of credential types Invest in support for modern architectures, devices, browsers 13

14 Oracle Identity Management Overview Complete, Hot-Pluggable, Service-Oriented Security Identity Administration Roles based User Provisioning Self-Service Request & Approval Password Management Access Management Authentication & Fraud Prevention Single Sign-On & Federation Authorization & Entitlements Web Services Security Information Rights Management Directory Services LDAP Storage Virtualized Identity Access LDAP Synchronization Identity Governance Analytics, IT Policy Monitoring, Privacy Controls Platform Security Identity Services for Developers 14

15 A Leader in Gartner Magic Quadrants 2010 Magic Quadrant for User Provisioning 2009 Magic Quadrant for Web Access Management As of Sept. 30 th 2010 As of Nov. 12 th

16 Agenda Introduction Business Momentum and Trends Key Milestones Sun Assimilation Identity Management 11g Launch Notable Announcements Continued Customer Focus Looking Ahead 16

17 Continued Customer Focus Customer Advisory Board (NA and EMEA) CAB Membership grows in number and quality of attendees CSO Council helps validate security strategy CSO Summit, Toronto last Nov CSO Summit, NYC March 30th IDM User Groups Regional Chapters Building Long-Term Partnerships Product management sponsorship to ensure every deployment and every upgrade is a success Strong track record of customer upgrade success Sun Clarity augments other Welcome to Oracle programs Development hosted dinners at industry events (Gartner, RSA, etc.) Hands-On Workshops, SI Trainings, and more 17

18 Customer Advisory Board Share, Communicate, & Partner 18

19 Agenda Introduction Business Momentum and Trends Key Milestones Sun Assimilation Identity Management 11g Launch Notable Announcements Continued Customer Focus Looking Ahead 19

20 Priorities over next 12 months Deliver 11g releases to market and to Fusion Apps Drive market adoption of IDM 11g Sun to Oracle Oracle 10g to Oracle 11g Modular Architecture & Overall simplification Front Office, Back Office, Identity Analytics, Role Administration, Common Access Policy Model End User Focus on UI Developer Friendliness for Customizations/Extensions Innovative capabilities Cloud Enablement, Mobile Support, Identity as a Service 20

21 Upcoming Events IDM User Groups MN (Mar 3), Bay Area (Mar 11) CSO Summit, NYC (Mar 30) Security Summit (North America 10-city road tour), Mar-Apr InfoSec, Fl (Apr 19) Online Webcasts (schedule on o.com/identity) Training: Regional Events: 21

22 Engage With Us PMs within reach via your sales contact (latest technical info, analyst reports, buyers guides, product collateral, upcoming events) PM supported blogs: Identity Management Think Tank (aggregation of blog posts) Access Mgmt, Id Admin & Governance, Directory Services, Talking Identity and Independent Identity Subscribe (Twitter) OracleIDM (Facebook) Oracle Identity Management, OIA (LinkedIn) Security Newsletter IDM User Group MN (Oracle Mix) 22

Sun and Oracle: Joining Forces in Identity Management

Sun and Oracle: Joining Forces in Identity Management Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

More information

<Insert Picture Here> Oracle Identity And Access Management

<Insert Picture Here> Oracle Identity And Access Management Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.

More information

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a

More information

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010 Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach karsten.mueller-corbach@oracle.com

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach karsten.mueller-corbach@oracle.com R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach karsten.mueller-corbach@oracle.com The following is intended to outline our general product direction. It is intended for information purposes

More information

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics

More information

Oracle Fusion Middleware 11g Release 1 IDM Suite

Oracle Fusion Middleware 11g Release 1 IDM Suite Oracle Fusion Middleware 11g Release 1 IDM Suite Rodger King Senior Principal Support Engineer The following is intended to outline our general product direction. It is intended for information purposes

More information

Cloud Security/Access Control and Identity Management. Patrick McLaughlin, Oracle Fellow SAOUG: 14 November, 2011

Cloud Security/Access Control and Identity Management. Patrick McLaughlin, Oracle Fellow SAOUG: 14 November, 2011 Cloud Security/Access Control and Identity Management Patrick McLaughlin, Oracle Fellow SAOUG: 14 November, 2011 Agenda Evolution of IT and IdM Requirements Building and Securing Clouds Oracle Public Cloud

More information

Identity Governance Evolution

Identity Governance Evolution Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle

More information

RSA Identity Management & Governance (Aveksa)

RSA Identity Management & Governance (Aveksa) RSA Identity Management & Governance (Aveksa) 1 RSA IAM Enabling trusted interactions between identities and information Access Platform Authentication Federation/SSO Employees/Partners/Customers Identity

More information

Oracle Identity Governance - Complete Identity Lifecycle Management

Oracle Identity Governance - Complete Identity Lifecycle Management Oracle Identity Governance - Complete Identity Lifecycle Management M.Sc.Eng. Mārtiņš Orinskis, DPA Ltd lead project manager 07.11.2013 About me M.Sc.Eng. Mārtiņš Orinskis DPA Ltd lead project manager

More information

RSA Identity and Access Management 2014

RSA Identity and Access Management 2014 RSA Identity and Access Management 2014 1 Agenda Today s Enterprises and IAM Customer Challenges IAM Requirements RSA IAM Our Competitive Advantage Leading The Pack RSA Views on Identity Management and

More information

Federal Cloud Computing Initiative Overview

Federal Cloud Computing Initiative Overview Federal Cloud Computing Initiative Overview Program Status To support the Federal Cloud Computing Direction and Deployment Approach, the ITI Line of Business PMO has been refocused as the Cloud Computing

More information

Oracle E-Business Suite Single Sign On Using Oracle Access Manager

Oracle E-Business Suite Single Sign On Using Oracle Access Manager Oracle E-Business Suite Single Sign On Using Oracle Access Manager Session ID#: 301 Prepared by: Pierre Paniagua Consultant AST Corporation REMINDER Check in on the COLLABORATE mobile app About Pierre

More information

Q3FY11 Oracle OPN Specialized Security Pillar Executive Webcast

Q3FY11 Oracle OPN Specialized Security Pillar Executive Webcast Q3FY11 Oracle OPN Specialized Security Pillar Executive Webcast Today s Agenda Welcome Security Inside/Out OPN Specialized Requirements Q3 Web Cast Series Technology Play Books XMonth Next Steps Q & A

More information

Identity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services

Identity Management Overview. Bill Nelson bill.nelson@gca.net Vice President of Professional Services Identity Management Overview Bill Nelson bill.nelson@gca.net Vice President of Professional Services 1 Agenda Common Identity-related Requests Business Drivers for Identity Management Account (Identity)

More information

SUPERVALU Successfully Leverages Tablet Technology and Identity and Access Management Infrastructure for Increased Security and Business Productivity

SUPERVALU Successfully Leverages Tablet Technology and Identity and Access Management Infrastructure for Increased Security and Business Productivity BUYER CASE STUDY SUPERVALU Successfully Leverages Tablet Technology and Identity and Access Management Infrastructure for Increased Security and Business Productivity Sally Hudson IDC OPINION Global Headquarters:

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack

Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack White Paper Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity Stack 1. Overview 2. OpenAM 3. OpenIDM 4. OpenDJ 5. Getting Started Tech Brief: Upgrading from Sun IAM to ForgeRock Open Identity

More information

Enterprise Identity Management Reference Architecture

Enterprise Identity Management Reference Architecture Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com VENDOR PROFILE Passlogix and Enterprise Secure Single Sign-On: A Success Story Sally Hudson IDC OPINION Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

More information

Centralized Oracle Database Authentication and Authorization in a Directory

Centralized Oracle Database Authentication and Authorization in a Directory Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan Paul.J.Sullivan@oracle.com Principal Security Consultant Kevin Moulton Kevin.moulton@oracle.com Senior Manager,

More information

An Oracle White Paper Feb 2012. Buyer s Guide for Access Management

An Oracle White Paper Feb 2012. Buyer s Guide for Access Management An Oracle White Paper Feb 2012 Buyer s Guide for Access Management Oracle White Paper Buyer s Guide for Access Management Disclaimer The following is intended to outline our general product direction.

More information

Trust but Verify: Best Practices for Monitoring Privileged Users

Trust but Verify: Best Practices for Monitoring Privileged Users Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager (olaf.stullich@oracle.com) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

ORACLE FUSION MIDDLEWARE PROFILE

ORACLE FUSION MIDDLEWARE PROFILE ORACLE FUSION MIDDLEWARE PROFILE Corporate Addvantum, is a global service provider of Information Technology consulting and services, to customers in GCC region. Addvantum has technical delivery centers

More information

Identity and Access Management (IAM)

Identity and Access Management (IAM) Identity and Access Management (IAM) Emerging risks a look beyond compliance October 2013 Page 0 Agenda Why we have to think about IAM differently 2 Emerging IAM solution options 8 Solution deployment

More information

Governance, Risk & Compliance for Public Sector

Governance, Risk & Compliance for Public Sector Governance, Risk & Compliance for Public Sector Steve Hagner EMEA GRC Solution Sales From egovernment to Oracle igovernment Increase Efficiency and Transparency Oracle igovernment

More information

Oracle IDM Integration with E-Business Suite & Middleware Technologies

Oracle IDM Integration with E-Business Suite & Middleware Technologies Oracle IDM Integration with E-Business Suite & Middleware Technologies Session ID#: 14251 Prepared by: Scott Brinker IDM Security Specialist CAP Deepak Sharma Sr. Consultant AST Corporation REMINDER Check

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value IDM, 12 th November 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All

More information

Oracle Reference Architecture and Oracle Cloud

Oracle Reference Architecture and Oracle Cloud Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended

More information

The Unique Alternative to the Big Four. Identity and Access Management

The Unique Alternative to the Big Four. Identity and Access Management The Unique Alternative to the Big Four Identity and Access Management Agenda Introductions Identity and Access Management (I&AM) Overview Benefits of I&AM I&AM Best Practices I&AM Market Place Closing

More information

Arisant s Identity Management (IdM) for K-12 Education

Arisant s Identity Management (IdM) for K-12 Education Arisant s Identity Management (IdM) for K-12 Education IMPLEMENTING A NEW IDENTITY FOR ONLINE EDUCATION Top IdM Drivers Security/Privacy 81% Increase User Services & Access Disparate Systems 57% Regulatory

More information

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications Integrating your On-Premise Applications with Cloud Applications Agenda Hybrid IT Infrastructure An Emerging Trend A New Set of Challenges The Five Keys to Overcoming the Challenges

More information

Authentication: Password Madness

Authentication: Password Madness Authentication: Password Madness MSIT 458: Information Security Group Presentation The Locals Password Resets United Airlines = 83,000 employees Over 13,000 password reset requests each month through the

More information

EDUCAUSE Security Presentation. Chad Rabideau Senior Consultant Identity Management AegisUSA

EDUCAUSE Security Presentation. Chad Rabideau Senior Consultant Identity Management AegisUSA EDUCAUSE Security Presentation Chad Rabideau Senior Consultant Identity Management AegisUSA Agenda Overview of Security & Identity and Access Management (IAM) Essential Functions of IAM Identity in Higher

More information

HOL9449 Access Management: Secure web, mobile and cloud access

HOL9449 Access Management: Secure web, mobile and cloud access HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle

More information

Insight Zone. Data Security 2015. Executive Interview

Insight Zone. Data Security 2015. Executive Interview Insight Zone Data Security 2015 Executive Interview THE CLOUD = SAFE Every App, User, & Device Secured Eliminate Passwords Increase Security Ensure Compliance Identity Access Management Enterprise Single

More information

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August

More information

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management

More information

The Role of Federation in Identity Management

The Role of Federation in Identity Management The Role of Federation in Identity Management August 19, 2008 Andrew Latham Solutions Architect Identity Management 1 The Role of Federation in Identity Management Agenda Federation Backgrounder Federation

More information

Social Media Single Sign-On: Could You Be Sharing More than Your Password?

Social Media Single Sign-On: Could You Be Sharing More than Your Password? Social Media Single Sign-On: Could You Be Sharing More than Your Password? SESSION ID: HUM-W03B 2/26/14 (Wednesday) 11:20 AM - West 3005 Tom R. Smith VP, Business Dev & Strategy, CloudEntr www.cloudentr.com

More information

CA Federation Manager

CA Federation Manager PRODUCT BRIEF: CA FEDERATION MANAGER CA FEDERATION MANAGER PROVIDES STANDARDS-BASED IDENTITY FEDERATION CAPABILITIES THAT ENABLE THE USERS OF ONE ORGANIZATION TO EASILY AND SECURELY ACCESS THE DATA AND

More information

<Insert Picture Here> Oracle Web Services Manager (WSM)

<Insert Picture Here> Oracle Web Services Manager (WSM) Oracle Web Services Manager (WSM) Marc Chanliau Director, Product Management Outline Introduction Product Overview Typical Use-Case Scenarios Roadmap Q & A Introduction

More information

How can Identity and Access Management help me to improve compliance and drive business performance?

How can Identity and Access Management help me to improve compliance and drive business performance? SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the

More information

<Insert Picture Here> Oracle I&AM: Service Oriented Security - a flexible Security Foundation For Next-Generation Applications

<Insert Picture Here> Oracle I&AM: Service Oriented Security - a flexible Security Foundation For Next-Generation Applications Oracle I&AM: Service Oriented Security - a flexible Security Foundation For Next-Generation Applications Christian Patrascu, Principal Product Manager Oracle Fusion Middleware Agenda

More information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information

Accenture Foundation Platform for Oracle

Accenture Foundation Platform for Oracle Accenture Foundation Platform for Oracle 2 Oracle Accenture s pre-built, pre-tested Oracle Fusion Middleware based architecture is a strategic decision guide and implementation accelerator that improves

More information

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management

More information

Product Strategy Update OTM SIG Conference

Product Strategy Update OTM SIG Conference Product Strategy Update OTM SIG Conference Derek H. Gittoes Vice President, Product Strategy August 11, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Program Agenda 1 2 3 4 Current

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

Delivering value to the business with IAM

Delivering value to the business with IAM Delivering value to the business with IAM IDM, 18 th June 2014 Colin Miles Chief Technology Officer, Pirean Copyright 2014 Pirean Limited. All rights reserved. Safe Harbor All statements other than statements

More information

Copyright 2014, Oracle and/or its affiliates. All rights reserved.

Copyright 2014, Oracle and/or its affiliates. All rights reserved. 1 Oracle Business Intelligence in the Cloud Gherardo Infunti Business Development Director EMEA Business Analytics 2 Disclaimer THE FOLLOWING IS INTENDED TO OUTLINE OUR GENERAL PRODUCT DIRECTION. IT IS

More information

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc. 06.27.

Managing Identity & Access in On-premise and Cloud Environments. Ellen Newlands Identity Management Product Manager Red Hat, Inc. 06.27. Managing Identity & Access in On-premise and Cloud Environments Ellen Newlands Identity Management Product Manager Red Hat, Inc. 06.27.12 Agenda What is identity and access management Why should you care

More information

Evolution of Licensing at Logi Analytics From Strategy to Implementation

Evolution of Licensing at Logi Analytics From Strategy to Implementation Evolution of Licensing at Logi Analytics From Strategy to Implementation Alvin Wong Product Marketing, Logi Analytics @AVEVAGroup 1 Agenda 1. Logi Analytics and Licensing as a Differentiator 2. Shift:

More information

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory

More information

Oracle Mobile Security Suite. René Klomp 6 mei 2014

Oracle Mobile Security Suite. René Klomp 6 mei 2014 Oracle Mobile Security Suite René Klomp 6 mei 2014 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be

More information

G Cloud 6 CDG Service Definition for Forgerock Software Services

G Cloud 6 CDG Service Definition for Forgerock Software Services G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform

More information

SEC 07 : L IAM : Comment accorder sécurité et productivité?

SEC 07 : L IAM : Comment accorder sécurité et productivité? SEC 07 : L IAM : Comment accorder sécurité et productivité? Arnaud DELANDE IBM Security TSS Team Leader Arnaud.delande@fr.ibm.com 2 Multi-perimeter approach to security focuses on the data and where it

More information

2013 AWS Worldwide Public Sector Summit Washington, D.C.

2013 AWS Worldwide Public Sector Summit Washington, D.C. Washington, D.C. Next Generation Privileged Identity Management Control and Audit Privileged Access Across Hybrid Cloud Environments Ken Ammon, Chief Strategy Officer Who We Are Security software company

More information

ORACLE WEBCENTER PORTAL

ORACLE WEBCENTER PORTAL ORACLE WEBCENTER PORTAL A MODERN ENTERPRISE PORTAL WITH INTUITIVE TOOLS FOR COMPOSING CONTENT-RICH SELF- SERVICE PORTALS WITH INTEGRATED SOCIAL AND COLLABORATION SERVICES KEY FEATURES Enterprise-Grade

More information

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet

Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Andrej Zdravkovic Regional Vice President, Platform Solutions Intellinet Platforms Operations Process Productivity Alignment Marketplace What We Do Business Transformation Through Strategic. Technology-Enabled.

More information

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision

More information

How Can Agile Customers Benefit from Oracle Fusion Middleware Today?

How Can Agile Customers Benefit from Oracle Fusion Middleware Today? How Can Agile Customers Benefit from Oracle Fusion Middleware Today? Devendra Singh VP, Development, Agile PLM Gnani Palanikumar Product Management Director, Agile PLM Markus Zirn

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Total Cloud Control with Oracle Enterprise Manager 12c. Kevin Patterson, Principal Sales Consultant, Enterprise Manager Oracle

Total Cloud Control with Oracle Enterprise Manager 12c. Kevin Patterson, Principal Sales Consultant, Enterprise Manager Oracle Total Cloud Control with Oracle Enterprise Manager 12c Kevin Patterson, Principal Sales Consultant, Enterprise Manager Oracle 2 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert

More information

Simplify and Automate IT

Simplify and Automate IT Simplify and Automate IT The current state of IT INCIDENT SERVICE LEVEL DATA SERVICE REQUEST ASSET RELEASE CONFIGURATION GOVERNANCE AND COMPLIANCE EVENT AND IMPACT ENTERPRISE SCHEDULING DASHBOARDS CAPACITY

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Oracle EBS Release 12.2 from A to Z. Real Experience of a Technical Upgrade

Oracle EBS Release 12.2 from A to Z. Real Experience of a Technical Upgrade Oracle EBS Release 12.2 from A to Z. Real Experience of a Technical Upgrade Presentador: Gustavo Gonzalez, CTO gfgonzalez@itconvergence.com @ggonza4itc Presenter Gustavo González IT Convergence, Chief

More information

Introduction to Oracle Business Intelligence Standard Edition One. Mike Donohue Senior Manager, Product Management Oracle Business Intelligence

Introduction to Oracle Business Intelligence Standard Edition One. Mike Donohue Senior Manager, Product Management Oracle Business Intelligence Introduction to Oracle Business Intelligence Standard Edition One Mike Donohue Senior Manager, Product Management Oracle Business Intelligence The following is intended to outline our general product direction.

More information

The Who, What, When, Where and Why of IAM Bob Bentley

The Who, What, When, Where and Why of IAM Bob Bentley The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages

More information

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.

OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the

More information

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges 1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges

More information

An Oracle White Paper Dec 2011. Identity and Access Management: Comparing Oracle and NetIQ/Novell

An Oracle White Paper Dec 2011. Identity and Access Management: Comparing Oracle and NetIQ/Novell An Oracle White Paper Dec 2011 Identity and Access Management: Comparing Oracle and NetIQ/Novell EXECUTIVE OVERVIEW... 1 COMPARING ORACLE AND NETIQ/NOVELL IDENTITY MANAGEMENT SUITES... 2 BUSINESS RELEVANCE

More information

Oracle s Cloud Computing Strategy

Oracle s Cloud Computing Strategy Oracle s Cloud Computing Strategy Your Strategy, Your Cloud, Your Choice Sandra Cheevers Senior Principal Product Director Cloud Product Marketing Steve Lemme Director, Cloud Builder Specialization Oracle

More information

Addressing Cyber Security in Oracle Utilities Applications

Addressing Cyber Security in Oracle Utilities Applications Addressing Cyber Security in Oracle Utilities Applications Anthony Shorten Principal Product Manager Oracle Utilities Global Business Unit Sept, 2014 Safe Harbor Statement The following is intended to

More information

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management 1 Product Roadmap Disclaimer Any forward-looking indication of plans for products is preliminary and all future release

More information

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com

WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com WIPRO IDENTITY CLOUD UNLEASHING THE NEXT GENERATION OF IDENTITY AND ACCESS MANAGEMENT (IAM) www.wipro.com Table of Contents 03...Introduction 04...Wipro Cloud (WIC) as a Service Type 05...Wipro Cloud Capabilities

More information

Enterprise Content Management Strategy and Vision Roel Stalman

Enterprise Content Management Strategy and Vision Roel Stalman Enterprise Content Management Strategy and Vision Roel Stalman Vice President, Product Management Enterprise Content Management The following is intended to outline our general product direction. It is

More information

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013

MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY. EMEA Webinar July 2013 MANAGE SECURE ACCESS TO APPLICATIONS BASED ON USER IDENTITY EMEA Webinar July 2013 Protecting the Enterprise Full Footprint Mobile user Application access management & Application security Enterprise headquarters

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

<Insert Picture Here> Oracle Fusion Middleware Product Update

<Insert Picture Here> Oracle Fusion Middleware Product Update Oracle Fusion Middleware Product Update Hasan Rizvi Senior Vice President Product Development Safe Harbor Statement "Safe Harbor" Statement: Statements in this presentation relating

More information

Securing your business

Securing your business Securing your business Anders Askåsen Product Manager for OpenIDM * World Wide Coverage ForgeRock.com Enterprise Open Source Software ForgeRock Norway ForgeRock USA ForgeRock UK ForgeRock France Consulting

More information

Gabriel Magariño. Software Engineer. gabriel.magarino@gmail.com. www.javapassion.com/idm. Overview Revisited

Gabriel Magariño. Software Engineer. gabriel.magarino@gmail.com. www.javapassion.com/idm. Overview Revisited Gabriel Magariño Software Engineer gabriel.magarino@gmail.com www.javapassion.com/idm Overview Revisited Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus

More information

Higher Education Products Update. <Insert Picture Here> 02 June, 2010 DEUG. Mark Armstrong Vice President, Higher Education Product Development

Higher Education Products Update. <Insert Picture Here> 02 June, 2010 DEUG. Mark Armstrong Vice President, Higher Education Product Development Higher Education Products Update 02 June, 2010 DEUG Mark Armstrong Vice President, Higher Education Product Development Safe Harbor The following is intended to outline our general

More information

Oracle Data Integrator 11g New Features & OBIEE Integration. Presented by: Arun K. Chaturvedi Business Intelligence Consultant/Architect

Oracle Data Integrator 11g New Features & OBIEE Integration. Presented by: Arun K. Chaturvedi Business Intelligence Consultant/Architect Oracle Data Integrator 11g New Features & OBIEE Integration Presented by: Arun K. Chaturvedi Business Intelligence Consultant/Architect Agenda 01. Overview & The Architecture 02. New Features Productivity,

More information

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102

Cloud Standards. Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 Cloud Standards Arlindo Dias IT Architect IBM Global Technology Services CLOSER 2102 2011 IBM Corporation Agenda Overview on Cloud Standards Identity and Access Management Discussion 2 Overview on Cloud

More information

SAP NetWeaver & Enterprise Services Architecture

SAP NetWeaver & Enterprise Services Architecture SAP NetWeaver & Enterprise Services Architecture Market Strategy, Technology Denis Rousseau SAP NetWeaver and... Enterprise Services Architecture! Business Drives Technology! Enterprise Services Architecture!

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson

Keynote: Gartner Magic Quadrants and MarketScopes. Ant Allan Felix Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson Keynote: Gartner Magic Quadrants and MarketScopes Ant Allan Feli Gaehtgens Gregg Kreizman Earl Perkins Brian Iverson IAM Technologies by Primary Function Administration Intelligence Authentication Authorization

More information

The. Tenets of IAM. Putting Identity Management at the Center of Security. Darran Rolls, Chief Technology Officer

The. Tenets of IAM. Putting Identity Management at the Center of Security. Darran Rolls, Chief Technology Officer The 7 Tenets of IAM Putting Identity Management at the Center of Security Darran Rolls, Chief Technology Officer About SailPoint Magic Quadrant Leader, Gartner 2016 550+ Customers and Growing 95% Customer

More information

White Paper. What is an Identity Provider, and Why Should My Organization Become One?

White Paper. What is an Identity Provider, and Why Should My Organization Become One? White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today

More information

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications SOLUTION BRIEF: PROTECTING ACCESS TO THE CLOUD........................................ How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications Who should read this

More information

Identity and Access Management

Identity and Access Management Identity and Access Management Maricopa Association of Governments- Telecommunications Advisory Group Earl Perkins Notes accompany this presentation. Please select Notes Page view. These materials can

More information

Secure the Web: OpenSSO

Secure the Web: OpenSSO Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based

More information

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report

EXECUTIVE VIEW. SecureAuth IdP. KuppingerCole Report KuppingerCole Report EXECUTIVE VIEW by Dave Kearns March 2015 SecureAuth IdP SecureAuth IdP combines cloud single sign-on capabilities with strong authentication and risk-based access control while focusing

More information

Ken Bond Vice President Investor Relations

Ken Bond Vice President Investor Relations 1 Ken Bond Vice President Investor Relations 2 Safe Harbor Statement "Safe Harbor" Statement: Statements in this presentation relating to Oracle's future plans, intentions and prospects are "forward-looking

More information

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1 Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness

More information