Round table guide
Upcoming SlideShare
Loading in...5
×
 

Round table guide

on

  • 2,072 views

 

Statistics

Views

Total Views
2,072
Views on SlideShare
2,064
Embed Views
8

Actions

Likes
0
Downloads
12
Comments
0

7 Embeds 8

http://www.5z5.com 2
http://blogs.oracle.com 1
http://www.rxx.co.il 1
http://www.petefinnigan.com 1
http://www.bonbudget.com 1
http://prsync.com 1
http://news.google.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • On 15 September 2011, UBS announced it had lost $2 billion due to an unauthorized tradeperformed by an unauthorized trader. With this loss, UBS has joined an infamous group of financialinstitutions that have suffered due to unauthorized trades performed by unauthorized traders.Between UBS, SociétéGénérale, and Barings Bank, authorization failures cost more than $9 billion.Authorization poses challenges to every enterprise, not just those in the financial sector. The natureof these challenges has evolved. The problems of authorization are complex and only becomingmore so. Authorization is complex in a general sense, but more specifically, reconcilingadministrative and runtime authorization information is complicated. This complexity increases thenumber of people and time needed to figure out why a person could perform an action in a system.This rising tide of complexity does not bode well for enterprises.
  • Add stories for Marc from various industries / segmentsFin Services – will be covered by BarclaysContent providers Federal AgenciesHealthcare / Consent Management
  • History / maturity of productGive examples of these different things
  • Use Oracle examples to illustrate – Fusion Apps, Public Cloud, SaaS, Fusion Middleware, WebCenter
  • Talking point: strategic for our own solutions and highlight heterogeneous message – not only Oracle
  • Join our community for regular updates on content and hear about upcoming events and news.

Round table guide Round table guide Presentation Transcript

  • <Insert Picture Here>External Authorization Round Table DiscussionVijay Chauhan, Head of Access Management ,BarclaysMarc Boroditsky, VP Product Management, OracleRoger Wigenstam, Sr. Director Product Management, Oracle
  • This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.©2012 Oracle Corporation
  • Agenda • Opening Remarks • Barclays Capital Case • Round Table Discussion • Road Map©2012 Oracle Corporation
  • Securing Data & Applications Marc Boroditsky, VPProduct Management©2012 Oracle Corporation
  • Focus on: Securing Data & Applications Context Aware External Authorization • ~50% of mission critical apps home grown • Increased audit & regulatory pressure • Increased focus on data security • Complex business policy • Brittle security & change control©2012 Oracle Corporation
  • Business Landscape Applying External Authorization Cross Industry Content Collaboration Privacy Confidentiality Regulations Audit©2012 Oracle Corporation
  • Entitlements Server Product Overview Roger Wigenstam, Sr. Director Product Management©2012 Oracle Corporation
  • What is Entitlements Server Dynamic Authorization to Data & Applications • SOA Security • Web Access Control • Application Transactions • Relational Database Information • Portals©2012 Oracle Corporation
  • Real-Time Authorization Sub-millisecond Authorization Response Time • Massively scalable External Authorization Management • Scales easily to large number of protected resources • Hundreds of millions of users • Hundreds of thousands of roles • From small workgroups to mission-critical deployments • Authorization checks enforced with real-time latency©2012 Oracle Corporation
  • Entitlements Server: Part of Oracle Identity Platform Complete, Open and Integrated Identity Governance Access Management Directory Services • Password Management • Single Sign-On & Federation • LDAP Storage • Self-Service Request & Approval • Web Services Security • Virtualized Identity Access • Roles based User Provisioning • Authentication & Fraud Prevention • LDAP Synchronization • Analytics, Policy Monitoring • Authorization & Entitlements • Next Generation (Java) Directory • Risk-based Access Certification • Access from Mobile Devices Platform Security Services Identity Services for Developers©2012 Oracle Corporation
  • Oracle Entitlements Server Summary Strategic Heterogeneous Leading • Oracle’s strategic • Standards based • Most mature solution authorization solution • Multi-language support • Largest install base • Embedded in many of our Applications • Multi-middleware • Embedded in Identity • Multi-database Platform©2012 Oracle Corporation
  • www.oracle.com/Identity www.facebook.com/OracleIDM www.twitter.com/OracleIDM blogs.oracle.com/OracleIDM©2012 Oracle Corporation