Trends gartner iam-amit12-4-12-v1
Upcoming SlideShare
Loading in...5
×

Like this? Share it with your network

Share

Trends gartner iam-amit12-4-12-v1

  • 2,680 views
Uploaded on

 

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
2,680
On Slideshare
2,619
From Embeds
61
Number of Embeds
7

Actions

Shares
Downloads
26
Comments
0
Likes
1

Embeds 61

http://cuckoo9.okoza.com 27
http://bloggers1033.rssing.com 25
http://translate.googleusercontent.com 3
http://www.unitask.com 2
http://news.google.com 2
http://blogs.oracle.com 1
http://prsync.com 1

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Cloud mobile and social are driving the biggest re-architecture in the past 20 yearsWe responded to the trend by creating a foundation for mobile identity managementExtending access control to encompass social sign-on And embraced open standards that would make it easier for customers to adopt public and private clouds With the R2 release we set the foundation for a mobile strategy that would allow IT organizations to leverage their existing policies internally to control access from mobile applications Today most organizations see mobile access as a VPN alone activity – but VPN’s are in-effective and don’t address the fundamental challenges with application authentication and authorizationToday 76% of mobile apps store credentials on the device and 10% of those store the password in plain text. Application developers today have no alternatives With R2 we provide an alternative so organizations can get it right the first time With R2 we don’t just provide mobile sign on .. we provide the ability to collect location data and other metrics about the device including OS version.
  • Every customer we speak with has hundreds and maybe thousands of accounts that are not associated with a named user. These are “root” accounts, application schemas in a database, or other shared accounts. These are typically very powerful accounts – with broad reaching privileges. The challenge customers have is that multiple people know the passwords to these high risk accounts and hence making it impossible to be able to audit and trace the usage to a single person. As people move into cloud environments, this problem gets worse.So what we are providing here is a password checkout system for shared OS, application and database accounts. With privilege account manager we can lease an account to a user for a period of time and remove the access when the time period has expired.Today most privileged account management solutions are aimed at single systems or intended as point solutions. The gap is that the lack a 360 degree view of accessWe are taking a platform approachIt takes a platform approach leveraging the connectors, workflows, certification and closed loop remediation of OIA and OIMProvides emergency access – and removes access within a given timeframe.With service accounts – we can control the time of day the account is used etc.
  • Because of the increasing demands put on directory services, we introduced a combined hardware and software Optimized System for Unified DirectoryOracle hardware engineers and software engineers worked together to match SPARC server hardware, dedicated storage and Unified Directory Software to get the highest performance available with off the shelf components.We are seeing up to 3x performance gains, by using high speed load balancing and while maintaining a HA configurationSince we pretuned the system, customers can expect quicker implementation times due to reduced configuration and testing – which brings significantly reduces costWe extended the scale of access management testing up to 250M users
  • It’s a very interesting time to be in ITWe are seeing a very significant shift in the way IT helps drive business into new markets to capture new opportunities and to engage customers in new waysBusiness is using IT to transform that way it worksAnd the way we work for our business is changing as well
  • With internet enabled mobile devices we can now work wherever we are – we no longer need to be in an office to get our work doneOur employees want access from any location: often over public wifi and increasingly with their own devices, so that changes how we think about application access.
  • Today many companies have an identity solution that covers a handful of users or a handful of apps but what they really want to do is cover all of their apps and users. To scale they need to simplify the deployment and simplify the user experience. When the experience is simple users do more instead of calling the help desk. Simplicity enables the scale. Today most solutions take too many FTE’s to manage and deploy. Simplicity enables the operational scale Many IDM deployments stall because the solution reaches a threshold of complexity so that they become un-usable and users see depreciating returns from expanding the deployment. The flexibility in R2 enables user satisfaction so that as we grow it enables user satisfactionInstead of installing multiple offerings that are purchased separately we have consolidated into 3 convenient suites so acquiring a new component is easy.
  • We have a lot of great customer references – these are customers dealing with a lot of the same issues you are dealing with - and they have agreed to share their successLet us help you build a roadmap for success
  • Oracle is a social company, we are social internally, and we are social with our customers.I encourage you to engage us online by joining the conversation on our Facebook page, follow our tweets and read our blogs

Transcript

  • 1. 1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 2. Trends in IdentityManagementAmit JasujaSenior Vice PresidentIdentity Management, Oracle2 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 3. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 4. Oracle Identity Management 11g R2 ENABLING THE NEW DIGITAL WORKPLACE4 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 5. SIMPLIFY & INNOVATESimplified Cloud, Mobile Extreme UpgradeExperience & Social Scale Path5 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 6. CLOUD, MOBILE & SOCIAL SIGN-ONSocial Trust Mobile Sign-onREST Sign-on Device AttributesFraud Detection Location Data 6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 7. Password Vault Account Checkin PRIVLEGED Lifecycle Checkout ACCOUNT MANAGEMENT Policy Audit Control Logging7 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 8. OPTIMIZED SYSTEM DIRECTORY SERVER 3X PERFORMANCE 1/3 COST8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 9. DEMONSTRATION MOBILE SIGN-ON9 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 10. Ranjan Jain Enterprise IT Architect, IAM Cisco10 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 11. Architecture Business Suite Simplicity Friendly Consolidation Scalable Satisfied Easy Operationally Users Adoption11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 12. LET US HELP YOU GET GOING SCHEDULE A CONNECT WITH12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 13. TWITTER@ORACLEIDM facebook.com/OracleIDM blogs.oracle.com/OracleIDM Socialize with us at: www.oracle.com/identity13 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 14. 14 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.