Presentation is loading. Please wait.

Presentation is loading. Please wait.

Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Principal Product Manger, Oracle Bob Beach, CIO, Chevron October,

Similar presentations


Presentation on theme: "Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Principal Product Manger, Oracle Bob Beach, CIO, Chevron October,"— Presentation transcript:

1

2 Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Principal Product Manger, Oracle Bob Beach, CIO, Chevron October, 2014 Oracle Confidential – Internal/Restricted/Highly RestrictedCopyright © 2014, Oracle and/or its affiliates. All rights reserved. |

3 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Oracle Confidential – Internal/Restricted/Highly Restricted3

4 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Chevron’s Mobility Program Q&A 1 2 3 4 Oracle Confidential – Internal/Restricted/Highly Restricted4 Agenda

5 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | The Extended Enterprise 80 % OF USER ACCESS WILL BE MOBILE BY 2020 44% OF ORGANIZATIONS PLAN TO SOCIAL ENABLE APPLICATIONS CLOUD COMPUTING WILL BECOME THE BULK OF NEW IT SPEND BY 2016 THERE WILL BE 26 BILLION CONNECTED DEVICES BY 2020 Unique Identity Requirements for Each Platform

6 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility Trends 81.9% of companies across the globe believe BYOD is an appropriate strategy for their business Three Top barriers to mobility: 1.Security controls 2.Legacy systems 3.Multiple OS’s Future Mobile Focus: 38% external customers 26% employees 23% senior managers 6 Source: CIO SurveyySource: Citrix Source: Current Analysis Global workforce will be mobile by 2016 Source: Gartner 40 %

7 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility Challenges Time spent on mobile security projects Multiple point solutions 93 % Concerned with data loss and other mobile breaches 113 phones stolen/min in US Malware rose by 197% Store credentials on the device 10% store password in clear text Use Personal Devices at work 50% Without Permission of Employers 90% not “fully aware” of devices connected to network 7 Source: Mobile Business Statistics, CSO Online 2014 Source: Information Week 2011 Source: CIO Survey 2014, Insight Crime 2014Source: Triangle Research Survey 2014 2/3 76 % 89 %

8 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Monolithic & Fragmented Proprietary & Inconsistent Un-auditable & Un-reportable Costly & Complex State of Mobile Security Today

9 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Identity Fragmentation Disparate User stores Inconsistent Access Policies Reduced User Experience Risk-prone Custom Integrations Costly Compliance Enforcement User Mgt SSO Federation App Embedded Identities SSO, Adaptive Access & Provisioning Federated Cloud Apps LDAP Custom Integrations Mobile Device Management LDAP Mobile Application Management

10 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Chevron’s Mobility Program Q&A 1 2 3 4 Oracle Confidential – Internal/Restricted/Highly Restricted10 Agenda

11 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Strategies for the New Digital Economy Identify the right solution Separate personal and corporate data Extend corporate identity to mobile apps Mitigate threats pre-emptively Simplify user experience Restore IT control while maintaining user privacy Mobile Security

12 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted12 Lock down the phone and treat it as a corporate asset – no personal data Purpose built, company owned, shared devices Determine the right solution based on your needs Device Management, Application Management or Hybrid Create a secure container that separates corporate data and apps from personal data and apps. Company Owned Personally Enabled (COPE), BYOD Control Mobile Device Management Mobile Application Management

13 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Separate Personal and Corporate Data Separate, protect and wipe corporate applications and data on mobile devices Enforce policies to restrict data movement Enable “Business Desktop” for access to apps, applications, files and email Encrypt data-at-rest, in-transit and in-use Monitor exceptions and remediate violations Enforce controls without coding for security Secure Container

14 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Leverage Identity Platform for Mobile Enforce Consistent Policies Access Directory Location Data Centralized Auth Device & User Data Access Single-Sign On AuthN protocols Strong AuthN Mobile Mobile Device Mgmt Mobile App Mgmt Mobile Access Mgmt

15 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Mitigate threats pre-emptively by becoming context aware Trust but Verify POINT Location aware Device aware Time aware Risk aware Historical behavior

16 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Simplify user experience without compromising security Social & Single sign-on Trust Risk REST API OAuth iOS Android

17 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Improve Scale by Simplifying Administration Know Your Users, their Devices and Privileges – Restore Control Administrators Applications Cart Access on demand Unified console Simplify deployment Reduce audit exposure Improve visibility

18 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Oracle Identity Management Mobile Security Access Management Governance Access Request Access Governance Automated Provisioning Privileged Account Management Directory Enterprise Directory Cloud/Mobile App Directory Virtual Directory Authentication Authorization Audit Federation Mobile App Management Mobile Device Management Mobile Access Management API Security Mobile Authenticator Open, Integrated and Best of Breed

19 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted19 Device enrollment, administration and provisioning of apps Device and app level policy enforcement Separate, protect and wipe corporate applications and data Consistent support across multiple mobile platforms Oracle Mobile Security Solution Comprehensive Enterprise Mobility Management Secure communication to enterprise resources without VPN infra Corporate app store Provide context-driven, risk-aware access to enterprise apps Support for 3 rd party and social identities Zero-code application wrapping Secure Corporate data with device & app management Secure controls and management for enterprise apps Integrated with IDM services to avoid redundancy and overlaps Common users, roles, policies, access request, cert etc. SSO and authorization for native and browser apps Risk/policy based step up and strong authentication RESTful Identity Services

20 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Chevron’s Mobility Program Q&A 1 2 3 4 Oracle Confidential – Internal/Restricted/Highly Restricted20 Agenda

21 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Enterprise Mobility - Trends and Challenges Strategies to Secure the Mobile Enterprise Chevron’s Mobility Program Q&A 1 2 3 4 Oracle Confidential – Internal/Restricted/Highly Restricted21 Agenda

22 Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | 2014 ORACLE FUSION MIDDLEWARE INNOVATION ORACLE FUSION MIDDLEWARE: CELEBRATE THIS YEAR'S MOST INNOVATIVE CUSTOMER SOLUTIONS Innovation Awards Ceremony set for: Tuesday, September 30, 2014 5:00-5:45pm in the LAM Research Theater (Session ID: CON7029)

23 Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted23 Complimentary eBook Register Now www.mhprofessional.com/mobsec

24 Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted24 Join the Community Twitter twitter.com/OracleIDM Facebook facebook.com/OracleIDM Oracle Blogs Blogs.oracle.com/OracleIDM Oracle IdM Website oracle.com/Identity

25 Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |Oracle Confidential – Internal/Restricted/Highly Restricted25

26


Download ppt "Beyond Brute Force Strategies for Securely leveraging Mobile Devices Rajesh Pakkath, Sr. Principal Product Manger, Oracle Bob Beach, CIO, Chevron October,"

Similar presentations


Ads by Google