Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Principal Product Manger, Oracle Bob Beach, CIO, Chevron October,

Slides:



Advertisements
Similar presentations
Embrace Mobility. Without Compromise. The apps they need. On the devices they want. Without sacrificing compliance. Strategic Approach to Mobile Security.
Advertisements

Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Confidential – Oracle Restricted 1.
Internet of Things Security Architecture
Panel Discussion: Access Without Fear Delivering an Optimal Multi-channel User Experience Forest Yin (Oracle) Paul Van Nieuwenhuyze (Electrabel) Hoang.
Virtualization of Fixed Network Functions on the Oracle Fabric Krishna Srinivasan Director, Product Management Oracle Networking Savi Venkatachalapathy.
Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Product Manager, Oracle Bob Beach, CIO, Chevron October, 2014.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Architecting a Complete Solution for the Cloud Economy Delivering Standards-Based Access Control Marc Chanliau Oracle Identity Management Bernard Diwakar.
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Advanced Metadata Modeling Modeling for the Oracle Business Intelligence Cloud.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Introduction and Update: Oracle Hyperion Financial Close Management CON8536 Richard.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
CON Software-Defined Networking in a Hybrid, Open Data Center Krishna Srinivasan Senior Principal Product Strategy Manager Oracle Virtual Networking.
Empower Enterprise Mobility. of employees use personal devices for work purposes.* of employees that typically work on employer premises, also frequently.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Policy Automation with Oracle Service Cloud Overview and Roadmap CON8909 Davin Fifield,
Oracle Fusion Pioneering the Consumerization of the Enterprise
The Safe Harbor The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Windows Server 2012 R2 Capabilities for BYOD Scenario Yuri Diogenes Senior Knowledge Engineer Data Center, Devices & Enterprise Client – CSI Team’s Page:
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
Getting Started with Oracle Compute Cloud
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. JD Edwards Summit PaaS from an Applications Perspective Charles McGuinness Director,
Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management.
Empower Enterprise Mobility Jasbir Gill Azure Mobility.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Growing Digital Media Revenues Creating Successful Media Business by Delivering.
“ Does Cloud Computing Offer a Viable Option for the Control of Statistical Data: How Safe Are Clouds” Federal Committee for Statistical Methodology (FCSM)
Market Trends Enterprise Web Applications Cloud Computing SaaS Applications BYOD Data Compliance Regulations 30 Second Elevator Pitch Web browsers have.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Matthew Berzinski Principle Product Manager Identity Management October 1, 2014.
A New IMS-Like Architecture for Enterprise Applications Reid Stidolph Master Principle Solutions Architect Communications Global Business Unit October.
Oracle E-Business Suite Order Management: Presenting the HTML and Mobile User Experience Durgaprasad Bodapati Director, Product Management Bhavana Sharma.
Dell Connected Security Solutions Simplify & unify.
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Improving Agility in Product Development and Pricing to Gain a Competitive Edge.
Hadoop 2 cluster with Oracle Solaris Zones, ZFS and unified archives Orgad Kimchi - Principal Software Engineer September 29, 2014 Oracle Confidential.
CON Software-Defined Networking in a Hybrid, Open Data Center Krishna Srinivasan Senior Principal Product Strategy Manager Oracle Virtual Networking.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
PCIT313. Today’s challenges Deliver applications to mobile platforms (BYOD) Respond to dynamic business requirements for IT: Seasonal/temporary workers.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 1.
Access and Information Protection Product Overview Andrew McMurray Technical Evangelist – Windows
Build Mobile Apps for Oracle E-Business Suite with Oracle Mobile Platform Bruce Bailey Principal Mobile/Social Solutions Consultant Jagadeesh Maira Senior.
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Planning & Budgeting Cloud Service (PBCS) Overview Business Analytics Product Group.
WebCenter in Education & Research A Transformation in Digital Business Session: CON7709 Golden Gate C3 Room, Marriott Marquis Moderator: Kevin Roebuck,
Indus Khaitan Snr. Director, Oracle Rajesh Pakkath Snr. Product Manager, Oracle Rakesh Meena Snr. Architect, Aurionpro October 26, 2015 Copyright © 2015,
User and Device Management
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. JD Edwards Summit Recruit and Learn Solutions Extend HR into the Cloud Marie Scott.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
Travel and Transportation General Session and Industry Excellence Awards Vijay Anand, Oracle Sundar Swaminathan, Oracle September 30, 2014 Copyright ©
Secure Mobile Development with NetIQ Access Manager
Tomaž Čebul Principal Consultant Microsoft Bring Your Own Device, kaj pa je to?
CON8473 – Oracle Distribution of OpenStack Ronen Kofman Director of Product Management Oracle OpenStack September, 2014 Copyright © 2014, Oracle and/or.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Total Enterprise Mobility Comprehensive Management and Security
Oracle Java Cloud Service Oracle Develop July 2013.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Daddy, what's a middle wear? An incredibly oversimplified explanation of what Middleware.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
The time to address enterprise mobility is now
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
BOMGAR REMOTE SUPPORT Karl Lankford
Access and Information Protection Product Overview October 2013
Principal Product Manager Oracle Data Science Platform
TechEd /7/ :16 AM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
Protecting your data with Azure AD
System Center Marketing
TechEd /18/ :51 PM © 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered.
OU BATTLECARD: Oracle Identity Management Training
Microsoft Virtual Academy
Presentation transcript:

Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Principal Product Manger, Oracle Bob Beach, CIO, Chevron October, 2014 Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. |

Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Oracle Confidential – Internal/Restricted/Highly Restricted3

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Chevron’s Mobility Program Q&A Oracle Confidential – Internal/Restricted/Highly Restricted4 Agenda

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | The Extended Enterprise 80 % OF USER ACCESS WILL BE MOBILE BY % OF ORGANIZATIONS PLAN TO SOCIAL ENABLE APPLICATIONS CLOUD COMPUTING WILL BECOME THE BULK OF NEW IT SPEND BY 2016 THERE WILL BE 26 BILLION CONNECTED DEVICES BY 2020 Unique Identity Requirements for Each Platform

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility Trends 81.9% of companies across the globe believe BYOD is an appropriate strategy for their business Three Top barriers to mobility: 1.Security controls 2.Legacy systems 3.Multiple OS’s Future Mobile Focus: 38% external customers 26% employees 23% senior managers 6 Source: CIO SurveyySource: Citrix Source: Current Analysis Global workforce will be mobile by 2016 Source: Gartner 40 %

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility Challenges Time spent on mobile security projects Multiple point solutions 93 % Concerned with data loss and other mobile breaches 113 phones stolen/min in US Malware rose by 197% Store credentials on the device 10% store password in clear text Use Personal Devices at work 50% Without Permission of Employers 90% not “fully aware” of devices connected to network 7 Source: Mobile Business Statistics, CSO Online 2014 Source: Information Week 2011 Source: CIO Survey 2014, Insight Crime 2014Source: Triangle Research Survey /3 76 % 89 %

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Monolithic & Fragmented Proprietary & Inconsistent Un-auditable & Un-reportable Costly & Complex State of Mobile Security Today

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Identity Fragmentation Disparate User stores Inconsistent Access Policies Reduced User Experience Risk-prone Custom Integrations Costly Compliance Enforcement User Mgt SSO Federation App Embedded Identities SSO, Adaptive Access & Provisioning Federated Cloud Apps LDAP Custom Integrations Mobile Device Management LDAP Mobile Application Management

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Chevron’s Mobility Program Q&A Oracle Confidential – Internal/Restricted/Highly Restricted10 Agenda

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Strategies for the New Digital Economy Identify the right solution Separate personal and corporate data Extend corporate identity to mobile apps Mitigate threats pre-emptively Simplify user experience Restore IT control while maintaining user privacy Mobile Security

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted12 Lock down the phone and treat it as a corporate asset – no personal data Purpose built, company owned, shared devices Determine the right solution based on your needs Device Management, Application Management or Hybrid Create a secure container that separates corporate data and apps from personal data and apps. Company Owned Personally Enabled (COPE), BYOD Control Mobile Device Management Mobile Application Management

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Separate Personal and Corporate Data Separate, protect and wipe corporate applications and data on mobile devices Enforce policies to restrict data movement Enable “Business Desktop” for access to apps, applications, files and Encrypt data-at-rest, in-transit and in-use Monitor exceptions and remediate violations Enforce controls without coding for security Secure Container

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Leverage Identity Platform for Mobile Enforce Consistent Policies Access Directory Location Data Centralized Auth Device & User Data Access Single-Sign On AuthN protocols Strong AuthN Mobile Mobile Device Mgmt Mobile App Mgmt Mobile Access Mgmt

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Mitigate threats pre-emptively by becoming context aware Trust but Verify POINT Location aware Device aware Time aware Risk aware Historical behavior

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Simplify user experience without compromising security Social & Single sign-on Trust Risk REST API OAuth iOS Android

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Improve Scale by Simplifying Administration Know Your Users, their Devices and Privileges – Restore Control Administrators Applications Cart Access on demand Unified console Simplify deployment Reduce audit exposure Improve visibility

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management Mobile Security Access Management Governance Access Request Access Governance Automated Provisioning Privileged Account Management Directory Enterprise Directory Cloud/Mobile App Directory Virtual Directory Authentication Authorization Audit Federation Mobile App Management Mobile Device Management Mobile Access Management API Security Mobile Authenticator Open, Integrated and Best of Breed

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted19 Device enrollment, administration and provisioning of apps Device and app level policy enforcement Separate, protect and wipe corporate applications and data Consistent support across multiple mobile platforms Oracle Mobile Security Solution Comprehensive Enterprise Mobility Management Secure communication to enterprise resources without VPN infra Corporate app store Provide context-driven, risk-aware access to enterprise apps Support for 3 rd party and social identities Zero-code application wrapping Secure Corporate data with device & app management Secure controls and management for enterprise apps Integrated with IDM services to avoid redundancy and overlaps Common users, roles, policies, access request, cert etc. SSO and authorization for native and browser apps Risk/policy based step up and strong authentication RESTful Identity Services

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Chevron’s Mobility Program Q&A Oracle Confidential – Internal/Restricted/Highly Restricted20 Agenda

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Chevron’s Mobility Program Q&A Oracle Confidential – Internal/Restricted/Highly Restricted21 Agenda

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 2014 ORACLE FUSION MIDDLEWARE INNOVATION ORACLE FUSION MIDDLEWARE: CELEBRATE THIS YEAR'S MOST INNOVATIVE CUSTOMER SOLUTIONS Innovation Awards Ceremony set for: Tuesday, September 30, :00-5:45pm in the LAM Research Theater (Session ID: CON7029)

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted23 Complimentary eBook Register Now

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted24 Join the Community Twitter twitter.com/OracleIDM Facebook facebook.com/OracleIDM Oracle Blogs Blogs.oracle.com/OracleIDM Oracle IdM Website oracle.com/Identity

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted25