Security and Identity

Similar documents
ORACLE FUSION MIDDLEWARE PROFILE

Enterprise Identity Management Reference Architecture

<Insert Picture Here> Oracle Identity And Access Management

The Unique Alternative to the Big Four. Identity and Access Management

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

OracleAS Identity Management Solving Real World Problems

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation

US Department of Justice vs. Composed by: Henry Arayasirikul

Oracle Identity And Access Management

Identity Governance Evolution

IBM Tivoli Identity Manager

Governance, Risk & Compliance for Public Sector

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

How Can Agile Customers Benefit from Oracle Fusion Middleware Today?

<Insert Picture Here> Charles Phillips. President Oracle Corporation

Enterprise Content Management Suite 11g

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

RSA Identity Management & Governance (Aveksa)

Sun and Oracle: Joining Forces in Identity Management

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Identity Management Overview. Bill Nelson Vice President of Professional Services

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Intelligent Security Design, Development and Acquisition

Quest One Identity Solution. Simplifying Identity and Access Management

<Insert Picture Here> Oracle Database Vault

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

Securing the Cloud through Comprehensive Identity Management Solution

<Insert Picture Here>

Identity Access Management Challenges and Best Practices

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

First-hand Information about the Enhanced Functionality and Integration Options Within SAP NetWeaver Identity Management 7.2

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

TECHNOLOGY BRIEF: INTEGRATED IDENTITY AND ACCESS MANAGEMENT (IAM) An Integrated Architecture for Identity and Access Management

How can Identity and Access Management help me to improve compliance and drive business performance?

FREQUENTLY ASKED QUESTIONS. Oracle Applications Strategy

BUSINESS-DRIVEN, COMPLIANT IDENTITY MANAGEMENT USING SAP NetWeaver IDENTITY MANAGEMENT

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Oracle Role Manager. An Oracle White Paper Updated June 2009

Integrating Hitachi ID Suite with WebSSO Systems

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

API Management: Powered by SOA Software Dedicated Cloud

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

RSA Identity and Access Management 2014

<Insert Picture Here> Camilla Kampmann

1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Public Information

Trust but Verify: Best Practices for Monitoring Privileged Users

The preceding is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

Apache Syncope OpenSource IdM

How To Secure A Database From A Leaky, Unsecured, And Unpatched Server

Identity and Access Management

Securing your business

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Oracle E-Business Suite Single Sign On Using Oracle Access Manager

Addressing Cyber Security in Oracle Utilities Applications

2013 AWS Worldwide Public Sector Summit Washington, D.C.

CA Federation Manager

Rebuilding Corporate Trust: GRC and IT Governance. Dražen Patarić Senior Sales Consultant

SAM Enterprise Identity Manager

Kuppinger Cole Virtual Conference The Three Elements of Access Governance

Simplify Identity Management with the CA Identity Suite

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

Global Headquarters: 5 Speen Street Framingham, MA USA P F

CA SiteMinder SSO Agents for ERP Systems

Security management solutions White paper. Extend business reach with a robust security infrastructure.

midpoint Overview Radovan Semančík December 2015

SNUG June 16, 2006 The Future of PeopleSoft Integration

<Insert Picture Here> Oracle Web Services Manager (WSM)

A Technical Roadmap for Oracle Fusion Middleware, E-Business Suite Release 12 and Oracle Fusion Applications

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

SAP Identity Management Overview

Oracle Reference Architecture and Oracle Cloud

<Insert Picture Here> Oracle Master Data Management Strategy

Connecting Users with Identity as a Service

Securing Data in Oracle Database 12c

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Oracle IDM Integration with E-Business Suite & Middleware Technologies

Oracle SOA Suite: The Evaluation from 10g to 11g

Why is Master Data Management getting both Business and IT Attention in Today s Challenging Economic Environment?

How Accenture is taking SAP NetWeaver Identity Management to the next level. Kristian Lehment, SAP AG Matthew Pecorelli, Accenture

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

Secure Cloud Computing

Enterprise Management Solutions Protection Profiles

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

Select the right solution for identity and access governance

Transcription:

Security and Identity <Insert Picture Here> Management J. Alberto Yépez Vice President Oracle Corporation

Agenda Corporate Background Business Drivers Oracle s Strategy Case Studies Oracle s Differentiation

Corporate <Insert Picture Here> Background

Strategic Acquisitions Applications 2005 PeopleSoft / JD Edwards (1/05) Retek (4/05) ProfitLogic (7/05) i-flex (8/05) G-Log (9/05) TempoSoft (12/05) Applications 2006 Siebel (1/06) 360Commerce (1/06) Portal Software (4/06) Demantra (6/06) Telephony@Work (6/06) Metasolv (10/06) SPL WorldGroup (11/06) Agile Software (5/07) Database 2005 TimesTen (06/05) TripleHop Technologies (06/05) Context Media (07/05) Innobase (10/05) Database 2006 Sleepycat (2/06) Middleware <2005 IronFlare (5/01) TopLink (6/02) Collaxa (1/04) Phaos Technologies (5/04) Middleware 2005 Oblix (3/05) Thor Technologies (11/05) OctetString (11/05) Middleware 2006+ HotSip (2/06) Net4Call (4/06) Sigma Dynamics (8/06) Sunopsis (10/06) Stellent (11/06) Hyperion (3/07) AppForge, LODESTAR c.f. http://www.oracle.com/corporate/acquisition.html

Business <Insert Picture Here> Drivers

Today s e-government IT Challenges More Compliant Increasing regulatory demands Increasing privacy concerns Global and EU directives More Responsive More accessibility for employees, citizens and business Reduce cost, self-service environment Faster reaction to changing requirements More Secured Identity theft Intellectual property theft Organized crime Constant global threats

State Of Security In Public Sector Incomplete Multiple point solutions from many vendors Disparate technologies that don t work together Complex Repeated point-to-point integrations Mostly manual operations Non-compliant Difficult to enforce consistent set of policies Difficult to measure compliance with those policies

Security Critical To Business Continuity 1996 2007 Amateur hackers Web site defacement Viruses Infrequent attacks Organized crime IP theft Identity theft Privacy

Managing Operational Risks Majority of security breaches from within organization Fragmented security policies Orphaned accounts Expired access rights Lack of aggregated audit and accountability Leaked passwords, social engineering Manual provisioning of user accounts requests prone to errors IT administrators unaware of organizational and role changes Identity theft

Identity Management External Internal SOA Applications Delegated Admin Identity Management Services Citizens Access Management Authentication & SSO Authorization & RBAC Identity Federation Business IT Staff Employees Identity Administration Delegated Administration Self-Registration & Self-Service User Group & Roles Management SOA Applications Auditing and Reporting Workflow and Orchestration Monitoring and Management Directory Services LDAP Directory Meta-Directory Virtual Directory Identity Provisioning Who, What, When, Where, Why Rules and Access Policies Integration Framework Applications Infrastructure Physical Assets ERP CRM OS (Unix) HR Mainframe NOS/Directories Cell Phone Physical Access

Oracle s <Insert Picture Here> Strategy

Oracle s IdM Strategy Enterprise Manager SOA Applications SOA Identity Applications & Security Business Applications Fusion Middleware Business Intelligence Databases

IdM is part of Fusion Middleware

Oracle s Identity & Security Strategy Complete, unified solution Coherent and comprehensive security Cross-silo integrated identity & security Application-centric Protecting business processes and web services (SOA) Identity & security as infrastructure, not bolt-on layer Hot-pluggable Standards-based Heterogeneous Best-of-breed components as well as integrated IAM suite

Identity & Access Management Access Control Authentication & Authorization Single Sign-On Federation Web Services Security Identity Administration Identity Lifecycle Administration Role & Membership Administration Provisioning & Reconciliation Compliance Automation Audit & Compliance Directory Services Virtualization Synchronization Storage Audit Data Attestation Segregation of Duties Controls Management Service Levels Configuration Performance Automation

Oracle I&AM Products Access Control Oracle Access Manager Oracle Enterprise Single Sign-On Oracle Identity Federation Oracle Web Services Manager Identity Administration Oracle Identity Manager Audit & Compliance Directory Services Oracle Virtual Directory Oracle Internet Directory (with Directory Integration Platform) Oracle Identity & Access Management Suite Management Oracle Enterprise Manager for Identity Management

Complete, Unified Security Application security Fine grained access control across applications Integrated with packaged enterprise applications Middleware security Comprehensive Identity Services Framework Integrated security with application server and SOA framework Data security Data security at rest, in transit and in archive Consolidation of management and security of auditable data Physical security Integrated logical and physical security

Data Privacy Ensure Data Privacy at All Levels Protect from Insider Threat Safeguard Personally Identifiable Information (PII) Efficiently and Effectively Meet Regulatory Requirements Database Vault Secure Search Label Security Advanced Security Content/ Record DB Audit Vault Multi-factor DBA Controls Authorized Search Data Classification Encrypted Data Unstructured Data Mgmt Monitor, Alert, Consolidate

Application Centric Security Comprehensive security for applications Single sign-on and federated access Fine grain authorization Roles and entitlements management HR and identity management process integration Identity Services Framework Identity services as infrastructure Rapid-integration enabled security platform Abstracted identity storage Centralized policy enforcement and compliance monitoring

Oracle IdM-App Integration Offerings Features Agent-less integration framework Application-centric centric and technology-centric centric OOTB connectors Abstraction of functional layers Componentized architecture N-tier J2EE architecture Deploys on wide range of J2EE application + DB servers Highly customizable and extensible Oracle Application Integrations Oracle e-business e Suite PeopleSoft Siebel JD Edwards Oracle Retail (H1 2007) PeopleSoft Campus (2007) Telecom/Portal (2007) Oracle Clinical Solutions (2007) SAP & Other Application Integrations SAP R/3, Basis, CUA SAP HRMS SAP Certification (2007) Lawson (2007) other tier-2 2 applications SCT Sungard Banner (2007) Cerner (2007) McKesson (2007)

Hot Pluggable & Open Strategy Deploy on heterogeneous platforms Application, web, DB, directory servers Operating systems Work with competition s products Business apps, Identity Management, system management Leverage open standards Use, drive and innovate Standardized on J2EE architecture

Heterogeneous Support Sample Integrations Portals Application/Web Servers Applications Groupware Directories Operating Systems ACF-2 & TSS RACF

Standards Support Contribute and lead SSTC (SAML Working Group) - Co-Chair Liberty Alliance - President, Board Member WSS, WS-SX (Web Services Security) - Author SPML - Author XACML Voting member Implement Accelerate product development Simplify product integration & minimize TCO Innovate Enable Identity Governance Framework: CARML, AAPML Standards for end-to-end security

<Insert Picture Here> Case Studies

BAMF BUSINESS CHALLENGE Have a complex IT environment consisting of multiple data stores Need of Delegated administration and group management for their applications Need of Password Sync from Active Directory to several OID data stores ORACLE SOLUTION Oracle Access Manager and Identity Manager chosen for 10.000 external & 2000 internal users Identity Manager solves problems with: Delegated management of identities Password sync (e.g. with MS AD) Governance compliance RESULTS Reduced Administration costs and great user experience around password management Efficient Account creation and cancellation Password sync between OID, AD (leading directory) and Oracle database Web Single Sign-On with Application Express Apps and J2EE Apps

Deutsche Post World Net BUSINESS CHALLENGE With 500,000 employees in more than 220 countries Deutsche Post World Net operates an extensive IT infrastructure to link all parts of the organization. Need to expand metadirectory services with an identity access layer Simplify the user management and have to meet new security requirements. ORACLE SOLUTION Oracle Virtual Directory gives a single LDAP view on user information stored in different systems such as databases, directories, email servers. Oracle Virtual Directory is fast to introduce and satisfies new authentication requirements Oracle Virtual Directory redirects authentication requests to the DPWN Active Directory or Critical Path directory RESULTS No data synchronization necessary No change/modification of existing applications Consolidated view on several user stores Consolidated view as a central service

Dublin City Council BUSINESS CHALLENGE No single source of user / accounts No business processes in place for account creation 17 different and very autonomous Departments, each with their own IT systems No tracking of resource moves between depts IT needs to be able to bill other dept s accurately for use of resources ORACLE SOLUTION Oracle Identity Manager chosen over Sun, Novell, CA, IBM 3500 users. Automated provisioning to MS Active Directory Full integrated suite created competitive differentiation RESULTS Expect to lower operational costs by centralizing user administration Enable operational efficiency and increase security across application environment Establish a platform for automating resource & IT account provisioning processes

Swedish Police BUSINESS CHALLENGE Establish secure and centralized mgt of identities across multiple enterprise directories & applications - incorporation of process workflows End users and managers have poor visibility into in-process and completed provisioning workflows Protect against locally administered changes to user entitlements directly w/in the target systems Poor mgt of user certificates within RSA Keon ORACLE SOLUTION Oracle Identity Manager selected over Novell Highly flexible and extensible product Superior support for onboarding and analysis mechanisms for orphan account detection Support for rollback/undo and escalation Mature product with solid architecture Flexibility and customizability RESULTS Significant cost avoidance (est. over $1M) for identity synchronization, workflow & administration functionality Establishment of automated role & rule-based assignment of access privileges to all managed systems Improvement of information quality by centralizing user records and cleaning existing data Detailed and easily accessible audit functionality

Banedanmark BUSINESS CHALLENGE Banedanmark, owned by the Danish State, operates the physical network (the rails) and the train traffic in Denmark The implementation of a new major portal project initiated a need for an identity management project consolidating and managing employees, contractors, and business partners across the enterprise ORACLE SOLUTION Oracle selected over Microsoft Oracle Identity and Access Management Suite Identity Manager Connectors to SAP and AD RESULTS First phase will focus on identity clean-up, consolidation, and provisioning using Oracle Identity Manager Phase two later this year will start focusing on access management including single sign-on

Scottish Government BUSINESS CHALLENGE Fragmented customer records and no single source of Citizen info across Scottish Govt. Need to integrate to the UK Government Gateway so that users can access the Citizen Account (single, electronic customer record) ORACLE SOLUTION The Scottish Govt., National Infrastructure Project selected Oracle s Identity and Access Management Suite beating out Software AG Suite will integrate UK Govt. Gateway Working with Sopra, Newell and Budge as the prime contract provider RESULTS IAM will authenticate Citizens and Govt. employees when they access the system either via the Council Website where they live (one of the 32 Local Authorities), the UK Government Gateway or the Central Portal site where the Citizen Account will be running Plan to provide a source of truth that will potentially update Govt. records and provide a better service to the 5M Citizens of Scotland where they can change personal details only once across multiple agencies as well as enroll for entitlements

Oracle s <Insert Picture Here> Differentiation

Oracle The Information Company Enterprise Manager SOA Applications SOA Identity Applications & Security Business Applications Fusion Middleware Business Intelligence Databases

Oracle Database Security 30 Years of Innovation Oracle Audit Vault (Beta) Oracle Database Vault DB Security Evaluation #19 Transparent Data Encryption EM Configuration Scanning Fine Grained Auditing (9i) Secure application roles Client Identifier / Identity propagation Oracle Label Security (2000) Proxy authentication Enterprise User Security Global roles Virtual Private Database (8i) Database Encryption API Strong authentication (PKI, Kerberos, RADIUS) Native Network Encryption (Oracle7) Database Auditing 1977Government customer 2007

Customer Advisory Board Customer Advisory Board (CAB) Share, Communicate, Partnership Quarterly meetings Monthly newsletters Knowledge sharing Roadmap prioritization Product design validation

Industry Recognition Leader in Enterprise Identity Provisioning (Oracle s) IAM Roadmap looks the best of all vendors Leader in Web Access Management (Oracle) Access Manager ranks as one of the more fully featured WAM products" 2006 Gartner UP MQ 2006 Gartner WAM MQ Oracle can now be viewed as a Premier Provider of Identity and Access Management Technology ** move Oracle to the shortlist of enterprise customers looking to deploy a full suite of applications with secure identity management capabilities across their everchanging IT landscapes (*)

Strongest Vendor According To Burton Oracle is currently the IdM vendor to beat - VantagePoint 2007: Identity and Privacy Trends in Enterprise IT

Partners: ISV Ecosystem Strong Authentication Physical Access Network Access Healthcare Role Management

Partners: System Integrators

Key Oracle Differentiators Complete suite of best-of-breed products Complete & best integrated identity management suite Includes compliance, virtualization and system management Market leadership validated by press and analysts Proven for large scale deployments Large, complex, and award winning deployments Broad customer base and use cases Large referenceable customer base Best long-term investment Strong support of open standards and hot-pluggable strategy Pre-integrated with Oracle products DB, middleware, apps Pre-integrated with over 50 applications and infrastructure Underpins Oracle s next generation of Fusion Applications