<Insert Picture Here>Key Fraud and Security Considerations forConfidence in the CloudJanuary 17th 2012
Cloud Security Executive Speaker Panel         Cloud Sourcing and Benchmarking Advisor                Ben Trowbridge      ...
Cloud Security Can be a Challenge. But Why?Can Our Data Be Safe and  Secure in the Cloud? 3   Copyright © 2011, Oracle and...
Top Cloud Security Concerns*                          1. Data access from mobile devices                           2. Acce...
Evaluating Your Cloud Provider’s Security    Best Practices Cloud Sourcing Methodology                           ??       ...
Identity Restores Control and Reduces RiskHIGHMED-HIGH                                                                    ...
Identity Bridges the Gap                                                                                                  ...
Case                                                                                                                      ...
Case                                                                               StudyOracle IDM & Authentication Cloud ...
Cloud Security Executive Speaker Panel                                    Cloud Sourcing and                              ...
Upcoming SlideShare
Loading in...5
×

Od webcast-cloud-fraud final

1,789

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,789
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Od webcast-cloud-fraud final

  1. 1. <Insert Picture Here>Key Fraud and Security Considerations forConfidence in the CloudJanuary 17th 2012
  2. 2. Cloud Security Executive Speaker Panel Cloud Sourcing and Benchmarking Advisor Ben Trowbridge GAIL COURY Marc Boroditsky CEO VP Risk Management VP I.D. Mgmt. Solutions2 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 2
  3. 3. Cloud Security Can be a Challenge. But Why?Can Our Data Be Safe and Secure in the Cloud? 3 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 3
  4. 4. Top Cloud Security Concerns* 1. Data access from mobile devices 2. Access control and I.D. Mgmt. Top 4: Identity Mgmt. 3. On going compliance concerns Related 4. Co-mingling of customers’ data Co. A Data Co. B Data Co. C Data 5. Security standards and certifications *CSO Online Article Feb 20, 20114 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 4
  5. 5. Evaluating Your Cloud Provider’s Security Best Practices Cloud Sourcing Methodology ?? Security •  Where does security fit within your Cloud Sourcing Methodology overall cloud sourcing methodology? Cloud Provider Security •  Best practices when evaluating a cloud provider’s security •  Cloud security pitfalls to avoid5 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 5
  6. 6. Identity Restores Control and Reduces RiskHIGHMED-HIGH Public Cloud RISK Private Hosted CloudMED-LOW 87% Security main barrier to Private In House Cloud cloud adoption Source: IDC Enterprise Panel, 3Q09LOW Enterprise CONTROL HIGH LOW 1990 1995 2000 2005 2008 6 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 6
  7. 7. Identity Bridges the Gap Adaptive Access Administration •  Context / Risk Aware •  Role Mgmt •  Anomaly detection Access •  Provisioning •  Access certification Scalable Repository •  Single-sign on •  Identity Analytics •  Identity Synch •  Password policy •  Certification •  Identity Virtualization •  Authorization policy Risk Management •  Reporting Audit Administration AuthN and AuthZ Identity Tools Point Solutions Platform Intelligence7 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 7
  8. 8. Case Study Oracle IDM & Authentication Cloud Service PeopleSoft | Internet-Facing Employee Self-Service Easy for Users | Hosted and Managed by Oracle Cloud Services Multi-Factor Authentication •  What you have – your computing device •  What you know – password •  What you are – knowledge questionsAnti-Fraud Features•  Personalized image, phrase, timestamp•  Device fingerprint & Virtualized keyboard•  Adaptive rules (device, location, time…) 8 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 8
  9. 9. Case StudyOracle IDM & Authentication Cloud Service Dashboard for: •  Logins •  Failed Logins •  KBA Challenges •  Blocked Logins •  Alerts •  Drilldown •  and much more9 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 9
  10. 10. Cloud Security Executive Speaker Panel Cloud Sourcing and Benchmarking Advisor Ben Trowbridge, CEO Gail Coury, VP Risk Mgmt. Marc Boroditsky, VP ID Mgmt.10 Copyright © 2011, Oracle and/or its affiliates. All rights reserved. 10
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×