1 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.

Slides:



Advertisements
Similar presentations
11/2/2013 2:02:38 AM 5864_ER_FED 1 Importing Certificates into Lotus Notes R6.
Advertisements

You have been given a mission and a code. Use the code to complete the mission and you will save the world from obliteration…
What’s New in Fireware XTM
Info to Enterprise Migration Implementation Case Study: SBC Corporation Presented to the Crystal Decisions Regional Users Group for the Bay Area on October.
Polycom Unified Collaboration for IBM Lotus Sametime and IBM Lotus Notes January 2010.
1 Capability Set - Bullet. 2 Common Community Problems Too Much Information –Institutions have to SPAM their faculty and students –Too many online sources.
Chapter 1 The Study of Body Function Image PowerPoint
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 5 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 2.1 Chapter 2.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 38.
1 Chapter 40 - Physiology and Pathophysiology of Diuretic Action Copyright © 2013 Elsevier Inc. All rights reserved.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
18 Copyright © 2005, Oracle. All rights reserved. Distributing Modular Applications: Introduction to Web Services.
17 Copyright © 2005, Oracle. All rights reserved. Deploying Applications by Using Java Web Start.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Title Subtitle.
Determine Eligibility Chapter 4. Determine Eligibility 4-2 Objectives Search for Customer on database Enter application signed date and eligibility determination.
0 - 0.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
Making the System Operational
ZMQS ZMQS
© Centrify Corporation. All Rights Reserved. Evolving Enterprise Identity: From the Data Center to Cloud and Mobile Centrify Corporation
Server Access The REST of the Story David Cleary
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 1.
Welcome to Access Online for State of Iowa Cardholders.
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Lesson 6: Configuring Servers for Remote Management
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 1 Navigating the Internet of Things Laurent ZELMANOWICZ Vice President EMEA ISV, OEM.
Chapter 1: Introduction to Scaling Networks
Copyright © 2012 AirWatch, LLC. All rights reserved. Proprietary & Confidential. Mobile Content Strategies and Deployment Best Practices.
Copyright Critical Software S.A All Rights Reserved. COTS based approach for the Multilevel Security Problem Bernardo Patrão.
ABC Technology Project
Implementing Cognos Mobile
MAXIMIZE WEBFOCUS GO MOBILE! Copyright 2010, Information Builders. Slide 1 Brian Carter 3/21/12.
1 ITSS This overview deck contains two sections. Please use the links below to navigate –How to Register for ITSS Application AccessHow to Register for.
Spring 2014 RMS/EOC Proctor Caching Training. Agenda 2 Proctor caching overview Downloading & installing Cache test content.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Confidential – Oracle Restricted 1.
CAR Training Module PRODUCT REGISTRATION and MANAGEMENT Module 2 - Register a New Document - Without Alternate Formats (Run as a PowerPoint show)
© 2010 Cisco and/or its affiliates. All rights reserved.Presentation_IDCisco Confidential CISCO LEARNING CREDITS MANAGEMENT TOOL CLP ADMINISTRATOR – USER.
Sample Service Screenshots Enterprise Cloud Service 11.3.
1. SAGE Portal – Technology Specifications released – Windows and Mac Secure Browsers released SAGE Formative Upcoming Key Dates 2.
Squares and Square Root WALK. Solve each problem REVIEW:
We are learning how to read the 24 hour clock
Services Course Windows Live SkyDrive Participant Guide.
2  Industry trends and challenges  Windows Server 2012: Modern workstyle, enabled  Access from virtually anywhere, any device  Full Windows experience.
Chapter 5 Test Review Sections 5-1 through 5-4.
GG Consulting, LLC I-SUITE. Source: TEA SHARS Frequently asked questions 2.
Addition 1’s to 20.
25 seconds left…...
Services Course Windows Live SkyDrive Participant Guide.
Week 1.
20&27 May Agenda 1.Highlight the difference between system flow of e- Invoice and paper invoice – 15 minutes 2.Demonstrate the operation procedure.
We will resume in: 25 Minutes.
1 PART 1 ILLUSTRATION OF DOCUMENTS  Brief introduction to the documents contained in the envelope  Detailed clarification of the documents content.
- 1 - Defense Security Service Background: During the Fall of 2012 Defense Security Service will be integrating ISFD with the Identity Management (IdM)
How Cells Obtain Energy from Food
Bomgar Product Strategy SECURE REMOTE SUPPORT FOR THE MOBILE ENTERPRISE © 2011 Bomgar Corporation | CONFIDENTIAL BOMGAR Solution Overview Stuart McGregor.
Oracle User Productivity Kit Professional Ensuring Success with Oracle Apps
Microsoft Volume Licensing
Test Information Distribution Engine (TIDE) Copyright © 2014 American Institutes for Research. All rights reserved. Training Module.
Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Principal Product Manger, Oracle Bob Beach, CIO, Chevron October,
Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Product Manager, Oracle Bob Beach, CIO, Chevron October, 2014.
SIM205. (On-Premises) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime You manage Infrastructure (as a Service)
Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management.
User and Device Management
BOMGAR REMOTE SUPPORT Karl Lankford
Presentation transcript:

1 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.

2 CON8808: Enabling Business Growth in The New Economy Sept 23 rd 2013 Amit Jasuja Senior Vice President Identity Management & Security, Oracle

3 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. SECURE MOBILE ACCESS REQUEST AND SECURE ACCESS TO A MOBILE DEVICE, EVEN IF ITS NOT YOURS

4 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. HOW WE DID IT

5 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Access SSO Portal via Safari iPad SSO Portal Access portal & enter credentials Oracle Access Management Download & Install Secure Container Secure Container Application ACQUIRE SECURE CONTAINER APPLICATION Validate Credentials Click to Download Container

6 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. ENTERING THE ONE TIME PASSWORD Unknown Device Detected iPad Step up authentication required iPhone Fraud Detection Enter User Credentials Click to Generate Soft Token Generate Soft Token (OTP) Device Registered & Container Secured Identity Management for Mobile Enter Soft Token

7 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. ACCESSING CORPORATE APPLICATIONS AND DATA Secure Access (Oracle MAM) Corporate Fileshare iPad File view: allowed Travel App White Pages STOP File save: denied (Oracle MAM Policy) Simple SSO Cloud SSO Kerberos AuthN with AD

8 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. SINEESH KESHAV VP OF APPLICATION DEVELOPMENT SAFEWAY, INC.

9 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. SECURE PRIVILEGED ACCESS PUTTING THE PROPER CONROLS IN PLACE REDUCES YOUR RISK

10 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. HOW WE DID IT AGAIN

11 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. REQUESTING PRIVILEGED ACCESS Demo Laptop Demo Server Oracle Identity Governance Session Manager Request Privileged Access to Demo Server Approval via smartphone Approval workflow

12 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. EXECUTING PRIVILEGED COMMANDS Demo Laptop Demo Server Oracle Identity Governance Session Manager Sending startup command Command executed on Demo Server Command recorded in Session Log

13 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. REVIEWING THE PRIVILEGED ACCESS Demo Laptop Oracle Identity Governance Session Manager Access checkout history report Session Logs

14 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. COMPLETE IDENTITY GOVERNANCE UNIFIED SOLUTION FOR CERTIFICATION OF USER AND DATA ACCESS

15 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. HOW WE DID IT AGAIN

16 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Laptop Log into Identity Governance Console APPS Content Repository APPS Common Data Model -- Users -- Roles -- Entitlements -- Data CERTIFYING ACCESS - Review file metadata (sensitivity, content classification) - Review direct reports access privileges to highly sensitive document - Review direct reports access history

17 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. DOM FEDRONIC SR. BUSINESS LEADER IDENTITY & ACCESS VISA

18 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. COMPLETE IDENTITY MANAGEMENT SIMPLIFIED IDENTITY GOVERNANCE INTEGRATED PLATFORM COMPLETE ACCESS MANAGEMENT With self service for regular and privileged accounts Supporting mobile, social and cloud Rationalized architecture for scalability and security

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. 19 Worldwide Adoption M + 1.5M + DEPLOYMENTS ON 11g R2 PARTNERS TRAINED IDENTITIES MANAGED MOBILE DEVICES

20 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. TRANSFORMING THE BUSINESS SECURELY USE ANY DEVICE PROFILE BASED ACCESS AUTOMATION FOR SPEED AND SECURITY MONITORING FOR CONTROL

21 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud Complete and Integrated Best-in-class Open standards On-premise and Cloud Foundation for Oracle Fusion Applications and Oracle Cloud User Engagement Identity Management Business Process Management Content Management Business Intelligence Service Integration Data Integration Development Tools Cloud Application Foundation Enterprise Management WebSocialMobile

22 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Innovation Awards Lam Research Theater (Next to Moscone North) Session ID: CON8082 Session Title: Oracle Fusion Middleware: Meet This Years Most Impressive Innovators Venue / Room: YBCA - Lam Research Theater Date and Time: Monday Sep 23, 4:45 - 5:45 p.m. 18 Winners Across Eight Categories

23 Copyright © 2013, Oracle and/or its affiliates. All rights reserved. GET MORE INFORMATION AT OUR SESSIONS Context- and Risk-Aware Access Control: Any Device Anywhere Manish Gulati, MITRE, Ranjan Jain, Cisco Systems Inc Ashish Kolli, Oracle, Svetlana Kolomeyskaya, Oracle Monday 4:45 PM - 5:45 PM Moscone West CON8819 Securely Enabling Mobile Access for Business Transformation Verizon Wireless, Ministry of National Education Lee Howarth, Oracle, Ajay Sondhi, Oracle Tuesday 12:00 PM - 1:00 PM Moscone West CON8896 Securing Privileged Accounts with an Integrated Identity Management Solution Michael Laramie, Oracle, Olaf Stullich, Oracle, James Taylor, Oracle Wednesday 3:30 PM - 4:30 PM Moscone West CON8813

24 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.