Identity Governance Evolution



Similar documents
Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Trust but Verify: Best Practices for Monitoring Privileged Users

<Insert Picture Here> Oracle Identity And Access Management

Oracle Identity Management Securing The New Digital Experience

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

RSA Identity Management & Governance (Aveksa)

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Oracle Privileged Account Manager

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Identity and Access Management for the Hybrid Enterprise

Quest One Identity Solution. Simplifying Identity and Access Management

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

The Top 5 Federated Single Sign-On Scenarios

An Oracle White Paper January Oracle Identity Manager Business Overview

Sun and Oracle: Joining Forces in Identity Management

Oracle E-Business Suite Single Sign On Using Oracle Access Manager

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Oracle Identity Governance - Complete Identity Lifecycle Management

Enterprise Identity Management Reference Architecture

What s New in Centrify Privilege Service Centrify Identity Platform 15.4

The Principles of Audit Automation for Access Control

Securing the Cloud through Comprehensive Identity Management Solution

Gabriel Magariño. Software Engineer. Overview Revisited

Governance, Risk & Compliance for Public Sector

<Insert Picture Here> Tomaž Poštuvan. Oracle Software

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Oracle IDM Integration with E-Business Suite & Middleware Technologies

The. Tenets of IAM. Putting Identity Management at the Center of Security. Darran Rolls, Chief Technology Officer

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

OracleAS Identity Management Solving Real World Problems

Feature Comparison. Help Desk. Ticket Management. to Ticket. Fully Customizable User Interface. Escalation Rules.

Developing an Identity Management Strategy

ADAPTABLE IDENTITY GOVERNANCE AND MANAGEMENT

Identity Access Management Challenges and Best Practices

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

Take Control of Identities & Data Loss. Vipul Kumra

G Cloud 6 CDG Service Definition for Forgerock Software Services

Introduction to Identity and Access Management for the engineers. Radovan Semančík April 2014

The Unique Alternative to the Big Four. Identity and Access Management

managing SSO with shared credentials

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Oracle Fusion Middleware 11g Release 1 IDM Suite

Azure Active Directory

Extending Identity and Access Management

Oracle Reference Architecture and Oracle Cloud

Identity Management Overview. Bill Nelson Vice President of Professional Services

The 7 Tenets of Successful Identity & Access Management

Identity & Access Management

Select the right solution for identity and access governance

Leveraging Privileged Identity Governance to Improve Security Posture

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

identity management in Linux and UNIX environments

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

SAP Identity Management Overview

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Kuppinger Cole Virtual Conference The Three Elements of Access Governance

A Smarter Way to Manage Identity

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Copyright 11/1/2010 BMC Software, Inc 1

RSA Identity and Access Management 2014

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

WHITE PAPER. Active Directory and the Cloud

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Centralized Oracle Database Authentication and Authorization in a Directory

Securing your business

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. Identity-centric Security: The ca Securecenter Portfolio

IBM WebSphere Cast Iron Cloud Integration

Security and Identity

Security management White paper. Develop effective user management to demonstrate compliance efforts and achieve business value.

C21 Introduction to User Access

ABOUT TOOLS4EVER ABOUT DELOITTE RISK SERVICES

Apache Syncope OpenSource IdM

Integrating Hitachi ID Suite with WebSSO Systems

Cayosoft Administrator. Modern Administration. Cayosoft.com. Unify, Simplify and Secure Microsoft Administration. Features at a Glance

Open Data Center Alliance Usage: Identity Management Interoperability Guide rev. 1.0

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

Identity & Access Management Gliding Flight. Paolo Ottolino PMP CISSP ISSAP CISA CISM OPST ITIL

It s 2014 Do you Know where Your digital Identity is? Rapid Compliance with Governance Driven IAM. Toby Emden Vice President Strategy and Practices

JumpCloud is your Directory-as-a-Service. A fully managed directory to rule your infrastructure whether on-premise or in the cloud.

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Business-Driven, Compliant Identity Management

Webinar Self-service in Microsoft Azure AD Premium

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

CLOUDFORMS Open Hybrid Cloud

Groot, Groter, Groots(t)

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Transcription:

<Insert Picture Here> Identity Governance Evolution Paola Marino Principal Sales Consultant

Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform

Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform

Oracle Identity & Access Platform Identity, Access, Governance Directory Services LDAP, Virtualization & Meta-directory Identity Governance Lifecycle Management & 360 visibility Access Management Complete access control & SSO Unified Administration & Management Regular & Privileged Identities Converged Policy Admin & Control

Oracle Identity & Access Platform Identity, Access, Governance Directory Services LDAP, Virtualization & Meta-directory Identity Governance Lifecycle Management & 360 visibility Access Management Complete access control & SSO Unified Administration & Management Regular & Privileged Identities Converged Policy Admin & Control

Oracle Identity Governance Recognition INDUSTRY LEADERSHIP User Provisioning Identity Governance

Complete Identity Governance Complete and Integrated Identity Admin Identity Analytics Privileged Account management Self-service provisioning Compliance Reporting Closed Loop Remediation Integrated Identity Administration & Analytics Control and audit Administrative Accounts Role Based Provisioning with automated approval Fraud workflows Detection Role Mining and Attestation Separation of Duties reporting Fraud Detection Centralized Password Reset

Oracle Identity Governance Platform Connectors Provision Grant User Access De-Provision Monitor User Access Access Request Privileged Account Request Role Lifecycle Management Check-in/ Checkout Identity Certifications IT Audit Monitoring Rogue Detection & Reconciliation Reporting & Privileged Access Monitoring Roles Entitlements Access Catalog IT Ownership Accounts Glossaries Business Attributes

End-User Empowered Access Catalog & Shopping Cart Simplified Search Tracking & Visibility Browse Compare & Select Track Receipt Confirmation

Business-User Tasks Simplified Risk-Based Certification & Approval Workflows High-risk focus Flessible processes

IT Administrators Monitored... Passwords Check-In/Out & Break-Glass & Audit & Certification Root Access Reduced risk Improved compliance User logs in as DBA Adds Table to DB System out of space Return HR DBA Password HR Application Database Set Password based on Password Policy DBA Request HR DBA Password (Check-Out) User releases Password (Checks-In) Oracle Privileged Account Management Verify User in HR DBA Role DataBases Directory Servers Unix Servers

Oracle Identity Governance Platform Auditing Attestation Segregation of Duties Process & Transaction Control Fraud Detection COMPLETE, &

Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform

Cloud Identity Management Dimensions Are you using cloud apps? c Are you building cloud apps? c Do you need IdM but don t want to maintain it? Identity as a Bridge to Cloud Identity as a Foundation for Cloud Identity Hosted as a Cloud Service

Oracle Identity Platform Is Cloud-Ready Partners Social Networks SaaS Apps On Premise Apps Desktop/Mobile

SaskTel Provides Security as a Cloud Service Security as a Service Situation: Cloud Infrastructure provider in Canada wanted to extend service offerings by providing security as a service Challenge: Time to market to create the platform and user experience Solution: Built security as a service on Oracle Identity Platform. Result: Faster time to market and new revenue channel for SaskTel

Northern Trust Private Platform as a Service Middleware & Applications Situation: 180 customer facing applications Challenge: Provide authorization & authentication as a service Solution: Oracle WebLogic & Oracle Identity management as private Platform as a Service Result: 80% utilization, reduced support costs across all applications and improved customer experience.

Securing The Oracle Cloud Inside Out Secure Infrastructure as a Service Situation: Oracle cloud needed security for customer data and applications Challenge: Provide single sign-on and web app authorization with central management Solution: Oracle Identity Manager, Oracle Internet Directory & Oracle Access Manager Result: High scale user provisioning, authentication & authorization

Taking a Platform Approach Building on Components of Fusion Middleware User Interface Customization Performance Fusion Middleware

Oracle Identity Business Today 30K Customers in 45 Countries

Oracle Identity Management 11g R2 ENABLING THE SECURING THE