SlideShare a Scribd company logo
1 of 17
CON8902 - Developing
Secure Mobile Applications
Mark Wilcox
Senior Product Manager
September 2013
This document is for informational purposes. It is not a commitment to
deliver any material, code, or functionality, and should not be relied
upon in making purchasing decisions. The development, release, and
timing of any features or functionality described in this document
remains at the sole discretion of Oracle. This document in any form,
software or printed matter, contains proprietary information that is the
exclusive property of Oracle. This document and information
contained herein may not be disclosed, copied, reproduced or
distributed to anyone outside Oracle without prior written consent of
Oracle. This document is not part of your license agreement nor can
it be incorporated into any contractual agreement with Oracle or its
subsidiaries or affiliates.
Copyright © 2011, Oracle and/or its affiliates. All right

2
Oracle Fusion Middleware
Business Innovation Platform for the Enterprise and Cloud
 Complete and Integrated
Web

Social

Mobile

 Best-in-class

User Engagement
Business
Process
Management

 Open standards
Content
Management

Service Integration

Business
Intelligence

Data Integration

Identity Management
Development
Tools

Cloud Application
Foundation

 On-premise and Cloud
 Foundation for Oracle
Fusion Applications and
Oracle Cloud

Enterprise
Management

3
Program Agenda
 Define the problem and solution
 Partner Demo and Presentation

 Oracle Shows The Developer Demo

4
The Mobile and Social Access Promise

Anytime Anywhere Access

New Tools for Business

Personal and Business Devices

Mobile, Social and Cloud Access

Copyright © 2012, Oracle and/or its affiliates. All right

Mobile and Social Access is
changing the landscape

5
The Mobile and Social Access Problems
Security
Proliferation of Devices

Cannot leverage existing security

Limited device control

A compliance challenge

Copyright © 2012, Oracle and/or its affiliates. All right

How to centrally manage the security
and be complaint?

6
The Mobile and Social Access Problems
User Experience
Native Applications

No Native Single Sign-on

Password Help Desk Calls

Inconsistent Login Experience

Copyright © 2012, Oracle and/or its affiliates. All right

How to improve user experience and
productivity?

7
Oracle Access Management
Mobile & Social Overview

Mobile Security

Social
Sign-On

Cloud Access

Standards
Support

8
Mobile Security
Device Fingerprinting & Tracking
Device Registration

Access Management

Oracle
SDK

OAM Service

Native App

Lost & Stolen Devices
GPS/WIFI Location Awareness

OAAM Service
Risk-based KBA & OTP

Web App

REST

Transactional risk analysis

Mobile and
Social

Directory User Profile Services
Security App

9
Client SDKs
Native Libraries for iOS and JAVA
Store/Access Keys, Tokens, Handles
and other secure data
Access Mobile Device Information
(OS, Carrier, Geolocation, IP/MAC)

Quickly build security into your
mobile applications

Support KBA, OTP via Email and SMS

Manage Single Sign-on

Copyright © 2012, Oracle and/or its affiliates. All right

10
Mobile & Social Access Management
Deployment Architecture

Corporate DMZ

Corporate Network
Oracle Access Manager

OAM Agent

Directory Services

OES PDP
Mobile and Social
Oracle Adaptive Access
Manager

OES PDP

Oracle Enterprise
Gateway
Web Services Manager Service Bus

HTTP/REST/SOAP/OAuth
Clients
Copyright © 2011, Oracle and/or its affiliates. All right

Context Aware Authorization
and Data Redaction

11

SOAP/REST and
Legacy Web Services

11
Partner Presentation

Vivek Lodhi
ERS Specialist Manager , Deloitte &
Touche LLP

Copyright © 2011, Oracle and/or its affiliates. All right

12
Oracle Developer Demo

DEMO

Copyright © 2011, Oracle and/or its affiliates. All right

13
Summary
• Mobile security is more than device management
• Use a Mobile-focused security product to simplify the
development of secure mobile applications
• Oracle provides an end to end mobile security
solution that leverages existing investments in access
management

Copyright © 2012, Oracle and/or its affiliates. All right

14
Next Steps
• Partners
• Contact Partner Training Services to learn how they can help
you learn Oracle Access Management Secure Mobile
Development

• Customers
• Contact your Oracle Account Representative to learn more

Copyright © 2012, Oracle and/or its affiliates. All right

15
16
17

More Related Content

What's hot

Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access ManagementDLT Solutions
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2OracleIDM
 
Oracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationOracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationDelivery Centric
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCloudIDSummit
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation Delivery Centric
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)GregOracle
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIMTamim Khan
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15Mike Lemons
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerOracleIDM
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a PriorityOkta-Inc
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Ping Identity
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1OracleIDM
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise ReportOkta-Inc
 
Layer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOALayer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOACA API Management
 

What's hot (20)

Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
Oracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationOracle Directory Services - Customer Presentation
Oracle Directory Services - Customer Presentation
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity Service
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIM
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements Server
 
5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority5 Top Enterprises Making IAM a Priority
5 Top Enterprises Making IAM a Priority
 
Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Oracle Identity Manager Basics
Oracle Identity Manager BasicsOracle Identity Manager Basics
Oracle Identity Manager Basics
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 
Okta Digital Enterprise Report
Okta Digital Enterprise ReportOkta Digital Enterprise Report
Okta Digital Enterprise Report
 
Layer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOALayer 7: Building Multi Enterprise SOA
Layer 7: Building Multi Enterprise SOA
 

Viewers also liked

Utilities Digital Data Driven Innovation
Utilities Digital Data Driven Innovation Utilities Digital Data Driven Innovation
Utilities Digital Data Driven Innovation Riccardo Romani
 
Five Journeys to (your) Cloud Infrastructure
Five Journeys to (your) Cloud InfrastructureFive Journeys to (your) Cloud Infrastructure
Five Journeys to (your) Cloud InfrastructureRiccardo Romani
 
Oracle Crm On Demand Release 17 Life Sciences Edition
Oracle Crm On Demand Release 17 Life Sciences EditionOracle Crm On Demand Release 17 Life Sciences Edition
Oracle Crm On Demand Release 17 Life Sciences EditionShane_Boyd
 
Ea2009 Cloud Computing Discussion
Ea2009 Cloud Computing DiscussionEa2009 Cloud Computing Discussion
Ea2009 Cloud Computing DiscussionMarc Caltabiano
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 
An Enterprise Perspective on Cloud Innovation
An Enterprise Perspective on Cloud InnovationAn Enterprise Perspective on Cloud Innovation
An Enterprise Perspective on Cloud InnovationOpen Data Center Alliance
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Oracle Cloud Networking And Security Exposed
Oracle Cloud Networking And Security Exposed Oracle Cloud Networking And Security Exposed
Oracle Cloud Networking And Security Exposed Riccardo Romani
 
C5 journey to_the_cloud_with_oracle_sparc
C5 journey to_the_cloud_with_oracle_sparcC5 journey to_the_cloud_with_oracle_sparc
C5 journey to_the_cloud_with_oracle_sparcDr. Wilfred Lin (Ph.D.)
 
Develop, deploy and manage tomorrow’s applications…today presentation 1
Develop, deploy and manage tomorrow’s applications…today presentation 1Develop, deploy and manage tomorrow’s applications…today presentation 1
Develop, deploy and manage tomorrow’s applications…today presentation 1Justin Dorfman
 
Creative Traction Methodology - For Early Stage Startups
Creative Traction Methodology - For Early Stage StartupsCreative Traction Methodology - For Early Stage Startups
Creative Traction Methodology - For Early Stage StartupsTommaso Di Bartolo
 
Hansel & Droessler - Update on Changing Federal NAAQS & What They Mean for You
Hansel & Droessler - Update on Changing Federal NAAQS & What They Mean for YouHansel & Droessler - Update on Changing Federal NAAQS & What They Mean for You
Hansel & Droessler - Update on Changing Federal NAAQS & What They Mean for YouEnvironmental Initiative
 
IT in Healthcare
IT in HealthcareIT in Healthcare
IT in HealthcareNetApp
 
B. ejemplo plan de asignatura
B.  ejemplo plan de asignaturaB.  ejemplo plan de asignatura
B. ejemplo plan de asignaturaimac_angel
 

Viewers also liked (17)

Utilities Digital Data Driven Innovation
Utilities Digital Data Driven Innovation Utilities Digital Data Driven Innovation
Utilities Digital Data Driven Innovation
 
Five Journeys to (your) Cloud Infrastructure
Five Journeys to (your) Cloud InfrastructureFive Journeys to (your) Cloud Infrastructure
Five Journeys to (your) Cloud Infrastructure
 
Wk7 assgnsykesr
Wk7 assgnsykesrWk7 assgnsykesr
Wk7 assgnsykesr
 
Oracle Crm On Demand Release 17 Life Sciences Edition
Oracle Crm On Demand Release 17 Life Sciences EditionOracle Crm On Demand Release 17 Life Sciences Edition
Oracle Crm On Demand Release 17 Life Sciences Edition
 
Ea2009 Cloud Computing Discussion
Ea2009 Cloud Computing DiscussionEa2009 Cloud Computing Discussion
Ea2009 Cloud Computing Discussion
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
An Enterprise Perspective on Cloud Innovation
An Enterprise Perspective on Cloud InnovationAn Enterprise Perspective on Cloud Innovation
An Enterprise Perspective on Cloud Innovation
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Oracle Cloud Networking And Security Exposed
Oracle Cloud Networking And Security Exposed Oracle Cloud Networking And Security Exposed
Oracle Cloud Networking And Security Exposed
 
C5 journey to_the_cloud_with_oracle_sparc
C5 journey to_the_cloud_with_oracle_sparcC5 journey to_the_cloud_with_oracle_sparc
C5 journey to_the_cloud_with_oracle_sparc
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Azure Biz
Azure BizAzure Biz
Azure Biz
 
Develop, deploy and manage tomorrow’s applications…today presentation 1
Develop, deploy and manage tomorrow’s applications…today presentation 1Develop, deploy and manage tomorrow’s applications…today presentation 1
Develop, deploy and manage tomorrow’s applications…today presentation 1
 
Creative Traction Methodology - For Early Stage Startups
Creative Traction Methodology - For Early Stage StartupsCreative Traction Methodology - For Early Stage Startups
Creative Traction Methodology - For Early Stage Startups
 
Hansel & Droessler - Update on Changing Federal NAAQS & What They Mean for You
Hansel & Droessler - Update on Changing Federal NAAQS & What They Mean for YouHansel & Droessler - Update on Changing Federal NAAQS & What They Mean for You
Hansel & Droessler - Update on Changing Federal NAAQS & What They Mean for You
 
IT in Healthcare
IT in HealthcareIT in Healthcare
IT in Healthcare
 
B. ejemplo plan de asignatura
B.  ejemplo plan de asignaturaB.  ejemplo plan de asignatura
B. ejemplo plan de asignatura
 

Similar to Con8902 developing secure mobile applications-final

Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Wise Men Oracle Mobility Webinar- 11-December-2014
Wise Men Oracle Mobility Webinar- 11-December-2014Wise Men Oracle Mobility Webinar- 11-December-2014
Wise Men Oracle Mobility Webinar- 11-December-2014Wise Men
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewGuatemala User Group
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation Delivery Centric
 
Building Better Mobile Backends with Oracle Mobile Cloud Service
Building Better Mobile Backends with Oracle Mobile Cloud Service	Building Better Mobile Backends with Oracle Mobile Cloud Service
Building Better Mobile Backends with Oracle Mobile Cloud Service Guatemala User Group
 
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...Steven Davelaar
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everythingDr. Wilfred Lin (Ph.D.)
 
Exploring Oracle Enterprise Mobility using Oracle Mobile Solutions
Exploring Oracle Enterprise Mobility using Oracle Mobile SolutionsExploring Oracle Enterprise Mobility using Oracle Mobile Solutions
Exploring Oracle Enterprise Mobility using Oracle Mobile SolutionsWise Men
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...Dr. Wilfred Lin (Ph.D.)
 
Oracle E-Business Suitre mobile apps ADF
Oracle E-Business Suitre mobile apps ADFOracle E-Business Suitre mobile apps ADF
Oracle E-Business Suitre mobile apps ADFBerry Clemens
 
Oracle Mobile Solution Overview
Oracle Mobile Solution OverviewOracle Mobile Solution Overview
Oracle Mobile Solution OverviewMee Nam Lee
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...GregOracle
 
Con9437 ad ffor_ebs and mobile
Con9437 ad ffor_ebs and mobileCon9437 ad ffor_ebs and mobile
Con9437 ad ffor_ebs and mobileBerry Clemens
 
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...RapidValue
 

Similar to Con8902 developing secure mobile applications-final (20)

Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Wise Men Oracle Mobility Webinar- 11-December-2014
Wise Men Oracle Mobility Webinar- 11-December-2014Wise Men Oracle Mobility Webinar- 11-December-2014
Wise Men Oracle Mobility Webinar- 11-December-2014
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
 
MCSDataSheet
MCSDataSheetMCSDataSheet
MCSDataSheet
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
Building Better Mobile Backends with Oracle Mobile Cloud Service
Building Better Mobile Backends with Oracle Mobile Cloud Service	Building Better Mobile Backends with Oracle Mobile Cloud Service
Building Better Mobile Backends with Oracle Mobile Cloud Service
 
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everything
 
Exploring Oracle Enterprise Mobility using Oracle Mobile Solutions
Exploring Oracle Enterprise Mobility using Oracle Mobile SolutionsExploring Oracle Enterprise Mobility using Oracle Mobile Solutions
Exploring Oracle Enterprise Mobility using Oracle Mobile Solutions
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...
 
Oracle E-Business Suitre mobile apps ADF
Oracle E-Business Suitre mobile apps ADFOracle E-Business Suitre mobile apps ADF
Oracle E-Business Suitre mobile apps ADF
 
Oracle Mobile Solution Overview
Oracle Mobile Solution OverviewOracle Mobile Solution Overview
Oracle Mobile Solution Overview
 
Oracle mobile cloud service
Oracle mobile cloud serviceOracle mobile cloud service
Oracle mobile cloud service
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
 
Oracle's Cloud Strategy
Oracle's Cloud StrategyOracle's Cloud Strategy
Oracle's Cloud Strategy
 
Con9437 ad ffor_ebs and mobile
Con9437 ad ffor_ebs and mobileCon9437 ad ffor_ebs and mobile
Con9437 ad ffor_ebs and mobile
 
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...
 

More from OracleIDM

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12OracleIDM
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2OracleIDM
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 
Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6OracleIDM
 

More from OracleIDM (18)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 
Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6Csooow12 amit-jasuja-securing-new-experience6
Csooow12 amit-jasuja-securing-new-experience6
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 

Con8902 developing secure mobile applications-final

  • 1. CON8902 - Developing Secure Mobile Applications Mark Wilcox Senior Product Manager September 2013
  • 2. This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates. Copyright © 2011, Oracle and/or its affiliates. All right 2
  • 3. Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud  Complete and Integrated Web Social Mobile  Best-in-class User Engagement Business Process Management  Open standards Content Management Service Integration Business Intelligence Data Integration Identity Management Development Tools Cloud Application Foundation  On-premise and Cloud  Foundation for Oracle Fusion Applications and Oracle Cloud Enterprise Management 3
  • 4. Program Agenda  Define the problem and solution  Partner Demo and Presentation  Oracle Shows The Developer Demo 4
  • 5. The Mobile and Social Access Promise Anytime Anywhere Access New Tools for Business Personal and Business Devices Mobile, Social and Cloud Access Copyright © 2012, Oracle and/or its affiliates. All right Mobile and Social Access is changing the landscape 5
  • 6. The Mobile and Social Access Problems Security Proliferation of Devices Cannot leverage existing security Limited device control A compliance challenge Copyright © 2012, Oracle and/or its affiliates. All right How to centrally manage the security and be complaint? 6
  • 7. The Mobile and Social Access Problems User Experience Native Applications No Native Single Sign-on Password Help Desk Calls Inconsistent Login Experience Copyright © 2012, Oracle and/or its affiliates. All right How to improve user experience and productivity? 7
  • 8. Oracle Access Management Mobile & Social Overview Mobile Security Social Sign-On Cloud Access Standards Support 8
  • 9. Mobile Security Device Fingerprinting & Tracking Device Registration Access Management Oracle SDK OAM Service Native App Lost & Stolen Devices GPS/WIFI Location Awareness OAAM Service Risk-based KBA & OTP Web App REST Transactional risk analysis Mobile and Social Directory User Profile Services Security App 9
  • 10. Client SDKs Native Libraries for iOS and JAVA Store/Access Keys, Tokens, Handles and other secure data Access Mobile Device Information (OS, Carrier, Geolocation, IP/MAC) Quickly build security into your mobile applications Support KBA, OTP via Email and SMS Manage Single Sign-on Copyright © 2012, Oracle and/or its affiliates. All right 10
  • 11. Mobile & Social Access Management Deployment Architecture Corporate DMZ Corporate Network Oracle Access Manager OAM Agent Directory Services OES PDP Mobile and Social Oracle Adaptive Access Manager OES PDP Oracle Enterprise Gateway Web Services Manager Service Bus HTTP/REST/SOAP/OAuth Clients Copyright © 2011, Oracle and/or its affiliates. All right Context Aware Authorization and Data Redaction 11 SOAP/REST and Legacy Web Services 11
  • 12. Partner Presentation Vivek Lodhi ERS Specialist Manager , Deloitte & Touche LLP Copyright © 2011, Oracle and/or its affiliates. All right 12
  • 13. Oracle Developer Demo DEMO Copyright © 2011, Oracle and/or its affiliates. All right 13
  • 14. Summary • Mobile security is more than device management • Use a Mobile-focused security product to simplify the development of secure mobile applications • Oracle provides an end to end mobile security solution that leverages existing investments in access management Copyright © 2012, Oracle and/or its affiliates. All right 14
  • 15. Next Steps • Partners • Contact Partner Training Services to learn how they can help you learn Oracle Access Management Secure Mobile Development • Customers • Contact your Oracle Account Representative to learn more Copyright © 2012, Oracle and/or its affiliates. All right 15
  • 16. 16
  • 17. 17

Editor's Notes

  1. Voice over … none of this constitutes a commitment to deliver futures
  2. With Fusion Middleware, you can extend and maximize your existing technology investment with the same technologies used in Fusion Applications, including embedded analytics and social collaboration, and mobile and cloud computing. Oracle’s complete SOA platform lets your IT organization rapidly design, assemble, deploy, and manage adaptable business applications and—with Oracle’s business process management tools—even bring the task of modeling business processes directly to the business analysts. Oracle Business Intelligence foundation brings together all your enterprise data sources in a single, easy-to-use solution, delivering consistent insights whether it’s through ad hoc queries and analysis, interactive dashboards, scorecards, OLAP, or reporting. And, your existing enterprise applications can leverage the rich social networking capabilities and content sharing that users have come to expect in consumer software. Oracle Fusion Middleware is based on 100 percent open standards, so you aren’t locked into one deployment model when your business requirements change.
  3. Oracle Access Manager for Mobile and Social OverviewConnects mobile users to identity services using REST interfacesOrganizations can bridge the security gap between the enterprise and mobile devices. With RESTful identity services, rich mobile applications can access stateless identity functions from mobile devices which are limited by processing capacity and battery power. Organizations can maketheir backend services and data available in a secure manner by simply exposing these through virtual REST API’s in the DMZ. Messages, security tokens, and protocols are automatically translated between formats appropriate for mobile devices and the source system. REST API’s can mash up information from multiple sources and be protected from a wide variety of attacks (denial of service, sql injection, content retrieval attacks, etcetc), usage can be monitored, and all your Oracle Access Management technologies can be leveraged for further protection. Delivers SSO and Authorization for native mobile applications Traditional mobile security solutions like VPN tunnels are limited in that they cannot overcome the problem of SSO for native mobile apps. OAM-M&S simplifies SSO across rich mobile apps and browser applications. This reduces the number of logins required for enterprise applications from the native mobile screen. Authorization can control what transactions end users are able to perform from a device and under what conditions. Perhaps only transactions below a given amount are allowed from a mobile device. An organizations REST API’s require authorization, what data is accessible to a given user must be controlled and monitored. A users location and device state may need to be taken into account. Enables sign on from 3rd party and Social identities to Enterprise resourcesWith the proliferation of social networking sites, there is a need for relying parties to consume identities from internet identity providers like Facebook, Twitter, LinkedIn, Google and Yahoo. Many of these providers support user centric federation standards like OpenID and Oauth. OAM-M&S enables organizations to accept internet identities for signing on users to low value applications like blogs, communities, etc. This in turn can provide a seamless user experience for users without the burden of additional logins.Single Sign-On covers web applications, native mobile applications, and also the RESTful API’s and web services accessed from the device.Supports industry standards (OpenID, OAuth)Oracle IDM supports OpenID and Oauth. So with Oracle Identity Management we are making it easier for relying parties to accept identities from internet identity providers like Facebook, Twitter, LinkedIn, Google and Yahoo.  
  4. Mobile Security – web and mobile appDevice registration and fingerprintLost & stolen device securityGPS/WIFI based location awareness
  5. Oracle Adaptive Access ManagerDevice Fingerprinting and Registration DatabaseRisk-Based Authentication that Factors Mobile ContextOracle Enterprise GatewayEnables Mobile Application REST API’s and protects API’s, webservices, and SOA infrastructure from external threats and invalid / suspicious requestsExtends Access Management with authentication, authorization, audit to REST API’s, web servicesOracle Entitlement ServerMake AuthorizationDecisions and Redact Data based on User,Mobile, or any other ContextExternalize AuthorizationPolicies from Application CodeOracle Access Management : Mobile & SocialMobile Identity and Access GatewayAuthentication, Registration, and User Profile Services for MobileOracle Web Services ManagerLast mile security for an organizations backend web services and SOA infrastructure Embedded agentsNative Mobile Security SDKNative Login Screens / Secure Credential StorageEasy Integration w/ SSO and Web Services SecurityNative Mobile Security AppsLogin App for Native and Web Apps Providing Device ContextNative White Pages App Integrated w/ User Profile Services