Energy Ecosystem Overview David Miller Chief Security Officer.

Slides:



Advertisements
Similar presentations
Pennsylvania Banner Users Group 2008 Fall Conference Campus Identity Management in a Banner World.
Advertisements

Govern the Flow of Data: Moving from Chaos to Control
Office 365 Identity June 2013 Microsoft Office365 4/2/2017
The Internet2 NET+ Services Program Jerry Grochow Interim Vice President CSG January, 2012.
Libraries in FE Colleges Capita Library Management System Demonstration May 2013.
Microsoft Identity Solutions
WSO2 Identity Server Road Map
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
Federal Student Aid Technical Architecture Initiatives Sandy England
Prepared by Dept. of Information Technology & Telecommunication, October 24, 2005 Enterprise Directory Services and Identity Management.
Virtual techdays INDIA │ august 2010 Managing Active Directory Using Microsoft Forefront Identity Manager: Amol R Bhandarkar │ Tech Specialist –
Copyrights 2002 Introduction to SAP Enterprise Portals September SAP Enterprise Portal 101 Naeem Hashmi Chief Technology Officer Information Frameworks.
Identity and Access Management: Strategy and Solution Sandeep Sinha Lead Product Manager Windows Server Product Management Redmond,
Identity and Access Management IAM. 2 Definition Identity and Access Management provide the following: – Mechanisms for identifying, creating, updating.
Identity Management, what does it solve By Gautham Mudra.
Identity and Access Management
Access and Identity Management for Enterprise Portals Rohit Gupta Director, Identity Management Product Management Oracle Corporation.
Cloud Computing Will Crowley Monica Lopez Jaimie Morrison.
Optimizing Business Operations Business Priorities Presentation.
© 2008 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Automates Infrastructure Outsourcing.
Microsoft Identity and Access Solutions Market Trends and Futures
Cognizance Identity and Access Management Identity Management ● Authentication ● Authorization ● Administration The next generation security solution
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
SOA – Development Organization Yogish Pai. 2 IT organization are structured to meet the business needs LOB-IT Aligned to a particular business unit for.
Rev Jul-o6 Oracle Identity Management Automate Provisioning to Oracle Applications and Beyond Kenny Gilbert Director of Technology Services.
Identity and Access Management PM COP Forum May 20, 2014Tuesday10100 AMLamont Library.
Quarterly Customer Meeting Active Directory Federation Services (ADFS) April 2015.
Lecture 6: Cloud Computing By D. Najla Al-Nabhan 1.
Hosted by How to Maximize the Benefits From Your SAP Investment Jim Shepherd Senior Vice President AMR Research.
High Performance Through Self Service KronosWorks 10/22/2003.
CFO Summit. Microsoft Business Solutions Customer Relationship Management (aka Microsoft CRM) Building Profitable Customer Relationships Alex Simons Product.
Cisco Confidential © 2013 Cisco and/or its affiliates. All rights reserved. 1 Grow with Cisco’s Made-for-Midmarket Portfolio Inspire Growth, Productivity,
Presented by: Presented by: Tim Cameron CommIT Project Manager, Internet 2 CommIT Project Update.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
NYCDOE Division of Instructional and Information Technology Oren Hamami Chief Information Security Officer New York City Department of Education.
PRESENTATION | OBLIX CORPORATE OVERVIEW Oblix Introduction Securely Managing Business in a Connected World.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Last Updated 1/17/02 1 Business Drivers Guiding Portal Evolution Portals Integrate web-based systems to increase productivity and reduce.
Building a Fully Trusted Authentication Environment
Access resources in a federation partner organization.
2015 NetSymm Overview NETSYMM OVERVIEW December
Not by robot alone does RPA live
Presentation to The BIM Summit 2016 SECURE COLLABORATION FOR BIM Delivering a Secure Common Data Platform and a Collaborative Business Process for BIM.
Introducing Novell ® Identity Manager 4 Insert Presenter's Name (16pt) Insert Presenter's Title (14pt) Insert Company/ (14pt)
David Saslav Principal Product Manager Database and Application Server Technologies Oracle Corporation.
Powering the Cloud and Mobile Enterprise. The World is Changing Software is One Industry Employees CIOs are Technology Operators THE WORLD BEFORE Software.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
The Four Pillars of Identity: A Solution for Online Success Tom Shinder Principle Writer and Knowledge Engineer, SCD iX Solutions Group Microsoft Corporation.
#SummitNow Using Alfresco and Cloud Apps in Harmony 5 th November 2013 Santiago Rodríguez Antonio D. Pérez.
Applicatieplatform congres 12 & 13 maart. Microsoft Application Platform A Lifecycle View Sam Guckenheimer Group Product Planner Visual Studio Team System.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
ADFS - Does it Still have a Place? Fitting into the EMS puzzle Frank C. Drewes III 2016 Redmond Summit | Identity.
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
® Copyright Vena Solutions Inc. 1 VENA WEBINAR BETTER ENTERPRISE BUDGETING WITH MICROSOFT EXCEL® Presented by Steve Welsh Director, Solutions Engineering.
Reduce Risk Across Hybrid IT
Reduce Risk Across Hybrid IT
Law Enforcement Information Sharing Program (LEISP) Federated Identity Management Pilot February 27, 2006.
Introduction to Windows Azure AppFabric
Andras Cser, Principal Analyst Eve Maler, Principal Analyst
SaaS Application Deep Dive
Prime Service Catalog 12.0 SAML 2.0 Single Sign-On Support
Reduce Risk Across Hybrid IT
Company Overview & Strategy
Building A Community of Trust to Transform Medicines Development
Identity Infrastructure Fundamentals and Key Capabilities
Microsoft Azure Launches Enterprise Product Costing Solution into the Future, into the Cloud “FACTON EPC is the modern, sustainable software solution for.
Matthew Levy Azure AD B2B vs B2C Matthew Levy
Presentation transcript:

Energy Ecosystem Overview David Miller Chief Security Officer

Covisint Summary “In a league of their own with no direct competitors” – IDC Research World’s Largest, Global B2B Ecosystem Automotive Energy Financial Services Healthcare Travel Global Business: Detroit (MI) Frankfurt (Germany) Shanghai (China) Analyst Recognition: “Covisint has been a visionary in leveraging the cloud” – Gartner $800 million investment 18,000,000+ Identities

Issues in Energy Industry VisibilityTrustComplianc e TechnologyCostChange User Experience

Issues in Energy Industry VisibilityTrustComplianc e TechnologyCostChange User Experience

Issues in Energy Industry VisibilityTrustComplianc e TechnologyCostChange User Experience

VisibilityTrustComplianc e TechnologyCostChange User Experience Identity Lifecycle Management Federation Management Audit and Attestation Brokering and Protocol Trans SSO, Portals and Dashboards SaaS - Always up to Date SaaS - Lower TCO Energy Industry Solution

Shell Oil Joint Ventures Contractors Business Partners Employees Executive Leadership Suppliers Shell Oil Ecosystem Challenges:  Diverse, loosely coupled workforce with special identity and security requirements.  Need to provide provisioning services for ~ 750,000 identities of contractors and joint ventures  Goal = Institute highly secure provisioning throughout extended workforce Results:  Quick provisioning and de-provisioning  Improved security and auditing  Better security visibility across contractors and joint ventures

How Covisint helped Shell? Phase I: Implement Basic Identity Lifecycle Management Single point of administration for JV’s, partners, suppliers, and other extended enterprise identities Invite and register organizations Delegate authority and administration Invite, register & credential end users via self-service Orchestrated application provisioning Attestation features Strong audit & reporting capabilities

Phase II: Enhanced Identity Lifecycle Management Rich user profiles for employees of JV’s, partners, suppliers, and other extended workforce constituents Role definitions and assignments (leveraging delegated model) Service package definitions and assignments (leveraging roles and rules) Request & Approval workflows Federated provisioning: On first federation (SAML) Web services (SPML) Administrator managed (orchestrated, manual) Identity Synchronization (IDSync)

Phase III: Federated Single Sign-on Outbound Federation: your users accessing externally hosted applications connected to Covisint Inbound Federation: external users accessing your applications connected to Covisint Federated Sign On: User credentialed by your organization or a third party federate inbound or outbound via Covisint Direct Authentication: Users that are credentialed by Covisint sign in directly to Covisint, and subsequently federate to your applications or externally hosted applications connected to Covisint

Benefits Shell has seen Benefits of Cloud Model Lower Total Cost of Ownership Expenses are operational - rather than capital Time to market Speed to value Enhanced security posture Focus on your core competencies Covisint's experience = reduced project risk

Thank you.