Od webcast-cloud-fraud final
Upcoming SlideShare
Loading in...5
×
 

Od webcast-cloud-fraud final

on

  • 1,999 views

 

Statistics

Views

Total Views
1,999
Views on SlideShare
1,434
Embed Views
565

Actions

Likes
0
Downloads
5
Comments
0

5 Embeds 565

http://blogs.oracle.com 558
http://news.google.com 3
https://blogs.oracle.com 2
http://www.petefinnigan.com 1
http://www.hanrss.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Od webcast-cloud-fraud final Od webcast-cloud-fraud final Presentation Transcript

  • <Insert Picture Here>Key Fraud and Security Considerations forConfidence in the CloudJanuary 17th 2012
  • Cloud Security Executive Speaker Panel Cloud Sourcing and Benchmarking Advisor Ben Trowbridge GAIL COURY Marc Boroditsky CEO VP Risk Management VP I.D. Mgmt. Solutions2 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 2
  • Cloud Security Can be a Challenge. But Why?Can Our Data Be Safe and Secure in the Cloud? 3 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 3
  • Top Cloud Security Concerns* 1. Data access from mobile devices 2. Access control and I.D. Mgmt. Top 4: Identity Mgmt. 3. On going compliance concerns Related 4. Co-mingling of customers’ data Co. A Data Co. B Data Co. C Data 5. Security standards and certifications *CSO Online Article Feb 20, 20114 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 4
  • Evaluating Your Cloud Provider’s Security Best Practices Cloud Sourcing Methodology ?? Security •  Where does security fit within your Cloud Sourcing Methodology overall cloud sourcing methodology? Cloud Provider Security •  Best practices when evaluating a cloud provider’s security •  Cloud security pitfalls to avoid5 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 5
  • Identity Restores Control and Reduces RiskHIGHMED-HIGH Public Cloud RISK Private Hosted CloudMED-LOW 87% Security main barrier to Private In House Cloud cloud adoption Source: IDC Enterprise Panel, 3Q09LOW Enterprise CONTROL HIGH LOW 1990 1995 2000 2005 2008 6 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 6
  • Identity Bridges the Gap Adaptive Access Administration •  Context / Risk Aware •  Role Mgmt •  Anomaly detection Access •  Provisioning •  Access certification Scalable Repository •  Single-sign on •  Identity Analytics •  Identity Synch •  Password policy •  Certification •  Identity Virtualization •  Authorization policy Risk Management •  Reporting Audit Administration AuthN and AuthZ Identity Tools Point Solutions Platform Intelligence7 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 7
  • Case Study Oracle IDM & Authentication Cloud Service PeopleSoft | Internet-Facing Employee Self-Service Easy for Users | Hosted and Managed by Oracle Cloud Services Multi-Factor Authentication •  What you have – your computing device •  What you know – password •  What you are – knowledge questionsAnti-Fraud Features•  Personalized image, phrase, timestamp•  Device fingerprint & Virtualized keyboard•  Adaptive rules (device, location, time…) 8 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 8
  • Case StudyOracle IDM & Authentication Cloud Service Dashboard for: •  Logins •  Failed Logins •  KBA Challenges •  Blocked Logins •  Alerts •  Drilldown •  and much more9 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 9
  • Cloud Security Executive Speaker Panel Cloud Sourcing and Benchmarking Advisor Ben Trowbridge, CEO Gail Coury, VP Risk Mgmt. Marc Boroditsky, VP ID Mgmt.10 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 10