SlideShare a Scribd company logo
1 of 21
Download to read offline
Enterprise Mobility: Secure Containerization
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |
Secure	
  Containerization
Abilitare	
  all’utilizzo	
  aziendale	
  i	
  device	
  mobili	
  personali	
  
!
Domenico	
  Catalano	
  
Security	
  Principal	
  Sales	
  Consultant	
  
!
Small	
  Device	
  -­‐	
  Big	
  Data:	
  Sicurezza	
  in	
  un	
  mondo	
  senza	
  Fili	
  
La	
  Sapienza	
  -­‐	
  4	
  	
  Luglio	
  2014
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  |
Safe	
  Harbor	
  Statement
The	
  following	
  is	
  intended	
  to	
  outline	
  our	
  general	
  product	
  direction.	
  It	
  is	
  intended	
  for	
  
information	
  purposes	
  only,	
  and	
  may	
  not	
  be	
  incorporated	
  into	
  any	
  contract.	
  It	
  is	
  not	
  a	
  
commitment	
  to	
  deliver	
  any	
  material,	
  code,	
  or	
  functionality,	
  and	
  should	
  not	
  be	
  relied	
  upon	
  
in	
  making	
  purchasing	
  decisions.	
  The	
  development,	
  release,	
  and	
  timing	
  of	
  any	
  features	
  or	
  
functionality	
  described	
  for	
  Oracle’s	
  products	
  remains	
  at	
  the	
  sole	
  discretion	
  of	
  Oracle.
Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
3
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
Program	
  Agenda
1
2
3
4
5
Challenges	
  
Mobile	
  Device	
  Risks	
  
New	
  Security	
  Requirements	
  
Demo	
  
Q&A
4
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
Bring	
  Your	
  Own	
  Device	
  (BYOD)
A	
  new	
  mobile	
  security	
  imperative
5
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
Challenges
By	
  2015	
  there	
  will	
  be	
  as	
  
many	
  as	
  6.7B	
  personal	
  
smartphones	
  used	
  globally 89%
of	
  employees	
  are	
  using	
  
smartphone	
  devices	
  for	
  
work,	
  and	
  nearly	
  half	
  of	
  
them	
  are	
  doing	
  so	
  without	
  
permission
IT
IT	
  Organization	
  are	
  un-­‐
prepared	
  for	
  the	
  new	
  
security	
  requirements	
  and	
  
regulatory	
  challenges
The	
  proliferation	
  is	
  
complicated	
  by	
  the	
  variety	
  
of	
  platforms	
  and	
  operating	
  
system	
  versions
6
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
The	
  Rules	
  have	
  Changed
Mobile	
  devices	
  have	
  redefined	
  
perimeter	
  security
The	
  Network	
  is	
  no	
  longer	
  the	
  main	
  
point	
  of	
  control
The	
  new	
  security	
  perimeter	
  is	
  users,	
  
devices,	
  and	
  data
7
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
Mobile	
  Device	
  Risk
Vulnerabilities
8
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
76%
of	
  all	
  enterprise	
  data	
  breaches	
  
are	
  the	
  result	
  of	
  weak	
  or	
  stolen	
  
credentials	
  
9
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
Mobile	
  Malware
Mobile	
  Device	
  Risk
• Mobile	
  malware	
  has	
  increased	
  58%	
  from	
  2011	
  to	
  2012.	
  
• The	
  most	
  common	
  activity	
  carried	
  out	
  by	
  malware	
  today	
  is	
  stealing	
  
sensitive	
  data	
  on	
  the	
  device.	
  
• Half	
  of	
  all	
  attacks	
  target	
  organization	
  of	
  2500	
  employees	
  or	
  more.	
  
• Mobile	
  device	
  are	
  a	
  key	
  target	
  for	
  Cybercriminals.
10
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
Lost	
  or	
  Stolen	
  Devices
Mobile	
  Device	
  Risk
11
• In	
  the	
  US	
  alone,	
  113	
  cell	
  phone	
  are	
  lost	
  or	
  stolen	
  every	
  minute.	
  
• Today	
  84%	
  of	
  organisations	
  have	
  a	
  firm	
  policy	
  that	
  departing	
  employees	
  
must	
  surrender	
  their	
  personal	
  devices.	
  
• Organizations	
  should	
  consider	
  what	
  might	
  the	
  end	
  user	
  delete,	
  or	
  retain	
  
before	
  turning	
  their	
  devices	
  in.	
  
• There	
  are	
  no	
  consistent	
  and	
  common	
  policies	
  across	
  mobile	
  devices,	
  
whether	
  personal	
  or	
  corporate	
  owned.
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
Application	
  Management
Mobile	
  Device	
  Risk
• Applications	
  have	
  quickly	
  became	
  the	
  greatest	
  enabler	
  for	
  business	
  to	
  
empower	
  their	
  employees	
  with	
  real	
  time	
  data.	
  
• Application	
  can	
  be	
  a	
  conduit	
  for	
  privileged	
  access	
  abuse,	
  misuse	
  and	
  data	
  
theft.	
  
• It	
  is	
  predicted	
  that	
  25%	
  of	
  enterprises	
  will	
  have	
  their	
  own	
  application	
  stores	
  
by	
  2017.
12
Balance	
  between	
  Securing	
  Enterprise	
  Application	
  data	
  and	
  Employee	
  Privacy
New	
  Security	
  Requirements
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
New	
  Security	
  Requirements
Identity	
  Management	
  
Secure	
  Container	
  
Single	
  Sign-­‐on	
  
Application	
  Management	
  
VPN	
  Independent	
  
Device	
  Provisioning	
  
Multi-­‐user	
  Devices	
  
Lost	
  &	
  Stolen	
  Device
14
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
Mobile	
  Security	
  Strategy
15
CONTAINERS CONTROLS EXPERIENCE
Isolate	
  corporate	
  data,	
  
support	
  remote	
  wipe,	
  
restrict	
  data	
  transfer
Secure	
  applications	
  &	
  
communication,	
  
corporate	
  application	
  
store
Role	
  based	
  access,	
  self	
  
service	
  request,	
  sign-­‐on	
  
fraud	
  detection
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
Containerization
How	
  are	
  Secure	
  Containers	
  made?
• Application	
  Wrapping	
  
• Functionality	
  injected	
  into	
  existing	
  applications	
  
• Enforces	
  security	
  at	
  the	
  application	
  level	
  
– Data	
  encryption	
  at	
  rest	
  
– Authentication	
  
– Policy	
  Enforcement	
  
• No	
  code	
  changes	
  required	
  by	
  developer
16
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
Key	
  Management
Cryptography
• Secure	
  Container	
  uses	
  a	
  key	
  hierarchy	
  to	
  protect	
  data.	
  	
  
• All	
  keys	
  are	
  derived	
  from	
  user	
  credentials	
  that	
  are	
  never	
  stored.	
  
• Key	
  hierarchy	
  involves	
  multiple	
  keys	
  to	
  support	
  different	
  sensitivity	
  of	
  data	
  
– Unique	
  key	
  used	
  for	
  the	
  user’s	
  authentication	
  certificate.	
  
– A	
  different	
  key	
  is	
  used	
  for	
  the	
  browser	
  cache.	
  
• The	
  Security	
  Container	
  distributes	
  and	
  manages	
  keys	
  for	
  all	
  the	
  enterprise	
  
apps.
17
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
Oracle’s	
  Mobile	
  Security	
  Components
18
Authentication / SSO
Data at Rest
Encryption
Data in Transit
Encryption
DLP
Policy
Browser
PIM 

(email, calendar, contacts,
tasks, notes)
Doc Editor
App Catalog
File Manager
Secure Intranet
Secure Mail
Secure Files
App Distribution
Secure Apps Enterprise
Apps
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
Oracle	
  Mobile	
  Security:	
  

Demo
19
DEMO
Copyright	
  ©	
  2014	
  Oracle	
  and/or	
  its	
  affiliates.	
  All	
  rights	
  reserved.	
  	
  | Oracle	
  Confidential	
  –	
  Internal/Restricted/Highly	
  Restricted
20
Enterprise Mobility: Secure Containerization

More Related Content

What's hot

The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionEnclaveSecurity
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldUL Transaction Security
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesAugmentedWorldExpo
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Kenneth de Brucq
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTechWell
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyLogicalis Australia
 
Selex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security ForumSelex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security ForumLeonardo
 
Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White PaperSybase Türkiye
 
CIS14: Network-Aware IAM
CIS14: Network-Aware IAMCIS14: Network-Aware IAM
CIS14: Network-Aware IAMCloudIDSummit
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation SlidesIvanti
 
Simplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsIvanti
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesIvanti
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1Andris Soroka
 
Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti
 
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Flexera
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFFaleh M.
 
2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINALRick Kingsley
 

What's hot (20)

The intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protectionThe intersection of cool mobility and corporate protection
The intersection of cool mobility and corporate protection
 
BYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile WorldBYOD Webinar for SAP: Securing Data in a Mobile World
BYOD Webinar for SAP: Securing Data in a Mobile World
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart GlassesPete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
Pete Wassell (Augmate Corportation) Security in the Enterprise Smart Glasses
 
Ivanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified ITIvanti: Access the Power of Unified IT
Ivanti: Access the Power of Unified IT
 
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
Dell Solutions Tour 2015 - Reduce IT admin work load and reduce complexity an...
 
Tips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile AppsTips and Tricks for Building Secure Mobile Apps
Tips and Tricks for Building Secure Mobile Apps
 
Preparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility StrategyPreparing an Effective BYOD or Mobility Strategy
Preparing an Effective BYOD or Mobility Strategy
 
Selex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security ForumSelex Es main conference brief for Kingdom Cyber Security Forum
Selex Es main conference brief for Kingdom Cyber Security Forum
 
Afaria Technical White Paper
Afaria Technical White PaperAfaria Technical White Paper
Afaria Technical White Paper
 
CIS14: Network-Aware IAM
CIS14: Network-Aware IAMCIS14: Network-Aware IAM
CIS14: Network-Aware IAM
 
2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides2021 English Part One Anti-phishing Webinar Presentation Slides
2021 English Part One Anti-phishing Webinar Presentation Slides
 
Simplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security ControlsSimplify Security with Ivanti Security Controls
Simplify Security with Ivanti Security Controls
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Navigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation SlidesNavigating Zero Trust Presentation Slides
Navigating Zero Trust Presentation Slides
 
DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1DSS ITSEC Conference 2012 - Forescout NAC #1
DSS ITSEC Conference 2012 - Forescout NAC #1
 
Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2Ivanti threat thursday deck october v2
Ivanti threat thursday deck october v2
 
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
Internet of Things Experts Share Perspectives on Monetizing the Internet of T...
 
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDFEMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
EMEA ENTERPRISE IT SOLUTIONS AND SECURITY SERVICES PROFILE.PDF
 
2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL2015 Angelbeat_ConvergenceMsg-FINAL
2015 Angelbeat_ConvergenceMsg-FINAL
 

Viewers also liked

Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMADomenico Catalano
 
User-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformUser-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformDomenico Catalano
 
Were Hiring! Internal Recruiter in Dallas, Atlanta and Chicago
Were Hiring! Internal Recruiter in Dallas, Atlanta and ChicagoWere Hiring! Internal Recruiter in Dallas, Atlanta and Chicago
Were Hiring! Internal Recruiter in Dallas, Atlanta and Chicago5854869
 
internal hiring_slide_AU
internal hiring_slide_AUinternal hiring_slide_AU
internal hiring_slide_AUKasturi Pathak
 
Referrals & Internal Mobility | Talent Connect London 2015
Referrals & Internal Mobility | Talent Connect London 2015Referrals & Internal Mobility | Talent Connect London 2015
Referrals & Internal Mobility | Talent Connect London 2015LinkedIn Talent Solutions
 
Your Next Hire Is Right in Front of You: Leveraging Internal Mobility & Talen...
Your Next Hire Is Right in Front of You: Leveraging Internal Mobility & Talen...Your Next Hire Is Right in Front of You: Leveraging Internal Mobility & Talen...
Your Next Hire Is Right in Front of You: Leveraging Internal Mobility & Talen...LinkedIn Talent Solutions
 
Leveraging Internal Mobility and Talent Networks -- Breakout Session at Talen...
Leveraging Internal Mobility and Talent Networks -- Breakout Session at Talen...Leveraging Internal Mobility and Talent Networks -- Breakout Session at Talen...
Leveraging Internal Mobility and Talent Networks -- Breakout Session at Talen...LinkedIn Talent Solutions
 
Future of Mobility
Future of MobilityFuture of Mobility
Future of MobilitySimon Guest
 
Talent Mobility: The Key to Engagement, Retention, and Performance
Talent Mobility: The Key to Engagement, Retention, and PerformanceTalent Mobility: The Key to Engagement, Retention, and Performance
Talent Mobility: The Key to Engagement, Retention, and PerformanceBen Eubanks
 
BPO & KPO Recruitment Strategy
BPO & KPO Recruitment StrategyBPO & KPO Recruitment Strategy
BPO & KPO Recruitment StrategySIVA PRIYA
 
Career planning and internal mobility
Career planning and internal mobilityCareer planning and internal mobility
Career planning and internal mobilityJayesh Ganekar
 
Internal mobility & separations
Internal mobility & separationsInternal mobility & separations
Internal mobility & separationsKalpana Udhaya
 
Recruitment & Selection Process in BAT (British American Tobacco)
Recruitment & Selection Process in BAT (British American Tobacco)Recruitment & Selection Process in BAT (British American Tobacco)
Recruitment & Selection Process in BAT (British American Tobacco)Syeda Nafisa Noor
 
Questionnaire on Work Culture
Questionnaire on Work CultureQuestionnaire on Work Culture
Questionnaire on Work CultureVenkata Vihari K
 

Viewers also liked (20)

Protecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMAProtecting Personal Data in a IoT Network with UMA
Protecting Personal Data in a IoT Network with UMA
 
User-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management PlatformUser-Access Manager: Key to Life Management Platform
User-Access Manager: Key to Life Management Platform
 
Were Hiring! Internal Recruiter in Dallas, Atlanta and Chicago
Were Hiring! Internal Recruiter in Dallas, Atlanta and ChicagoWere Hiring! Internal Recruiter in Dallas, Atlanta and Chicago
Were Hiring! Internal Recruiter in Dallas, Atlanta and Chicago
 
internal hiring_slide_AU
internal hiring_slide_AUinternal hiring_slide_AU
internal hiring_slide_AU
 
Getting a Step Ahead- Internal Hiring
Getting a Step Ahead- Internal Hiring Getting a Step Ahead- Internal Hiring
Getting a Step Ahead- Internal Hiring
 
Referrals & Internal Mobility | Talent Connect London 2015
Referrals & Internal Mobility | Talent Connect London 2015Referrals & Internal Mobility | Talent Connect London 2015
Referrals & Internal Mobility | Talent Connect London 2015
 
Your Next Hire Is Right in Front of You: Leveraging Internal Mobility & Talen...
Your Next Hire Is Right in Front of You: Leveraging Internal Mobility & Talen...Your Next Hire Is Right in Front of You: Leveraging Internal Mobility & Talen...
Your Next Hire Is Right in Front of You: Leveraging Internal Mobility & Talen...
 
Leveraging Internal Mobility and Talent Networks -- Breakout Session at Talen...
Leveraging Internal Mobility and Talent Networks -- Breakout Session at Talen...Leveraging Internal Mobility and Talent Networks -- Breakout Session at Talen...
Leveraging Internal Mobility and Talent Networks -- Breakout Session at Talen...
 
Ericsson Mobility Report, June 2015
Ericsson Mobility Report, June 2015Ericsson Mobility Report, June 2015
Ericsson Mobility Report, June 2015
 
Future of Mobility
Future of MobilityFuture of Mobility
Future of Mobility
 
Talent Mobility: The Key to Engagement, Retention, and Performance
Talent Mobility: The Key to Engagement, Retention, and PerformanceTalent Mobility: The Key to Engagement, Retention, and Performance
Talent Mobility: The Key to Engagement, Retention, and Performance
 
Shaping Your Internal Hiring Recruitment Strategy
Shaping Your Internal Hiring Recruitment StrategyShaping Your Internal Hiring Recruitment Strategy
Shaping Your Internal Hiring Recruitment Strategy
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
BPO & KPO Recruitment Strategy
BPO & KPO Recruitment StrategyBPO & KPO Recruitment Strategy
BPO & KPO Recruitment Strategy
 
Career planning and internal mobility
Career planning and internal mobilityCareer planning and internal mobility
Career planning and internal mobility
 
Internal mobility & separations
Internal mobility & separationsInternal mobility & separations
Internal mobility & separations
 
Recruitment & Selection Process in BAT (British American Tobacco)
Recruitment & Selection Process in BAT (British American Tobacco)Recruitment & Selection Process in BAT (British American Tobacco)
Recruitment & Selection Process in BAT (British American Tobacco)
 
Hiring process flow chart
Hiring process flow chartHiring process flow chart
Hiring process flow chart
 
Bhavesh Chandaria- Leveraging Internal Mobility & Talent Networks
Bhavesh Chandaria- Leveraging Internal Mobility & Talent Networks Bhavesh Chandaria- Leveraging Internal Mobility & Talent Networks
Bhavesh Chandaria- Leveraging Internal Mobility & Talent Networks
 
Questionnaire on Work Culture
Questionnaire on Work CultureQuestionnaire on Work Culture
Questionnaire on Work Culture
 

Similar to Enterprise Mobility: Secure Containerization

Securing Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesSecuring Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesArtur Alves
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Indus Khaitan
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsEric Vétillard
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
Business Intelligence Challenge, Oracle, Doug Tait, TADSummit
Business Intelligence Challenge, Oracle, Doug Tait, TADSummitBusiness Intelligence Challenge, Oracle, Doug Tait, TADSummit
Business Intelligence Challenge, Oracle, Doug Tait, TADSummitAlan Quayle
 
Demo intelligent user experience with oracle mobility for publishing
Demo  intelligent user experience with oracle mobility for publishingDemo  intelligent user experience with oracle mobility for publishing
Demo intelligent user experience with oracle mobility for publishingVasily Demin
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudMarketingArrowECS_CZ
 
Mobile Mumbo Jumbo - Demystifying the World of Enterprise Mobility with Oracle
Mobile Mumbo Jumbo - Demystifying the World of Enterprise Mobility with OracleMobile Mumbo Jumbo - Demystifying the World of Enterprise Mobility with Oracle
Mobile Mumbo Jumbo - Demystifying the World of Enterprise Mobility with OracleChris Muir
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewGuatemala User Group
 
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)jeckels
 
Primavera Mobile Applications - Now and Beyond
Primavera Mobile Applications - Now and BeyondPrimavera Mobile Applications - Now and Beyond
Primavera Mobile Applications - Now and Beyondp6academy
 
Cómo terminar tu Planeación Financiera antes de las 6PM
Cómo terminar tu Planeación Financiera antes de las 6PMCómo terminar tu Planeación Financiera antes de las 6PM
Cómo terminar tu Planeación Financiera antes de las 6PMOracleOfficeOfFinance
 
Let's Talk Mobile
Let's Talk MobileLet's Talk Mobile
Let's Talk MobileChris Muir
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraLuca Martelli
 
ODA Target Markets – Partnering to Win
ODA Target Markets – Partnering to WinODA Target Markets – Partnering to Win
ODA Target Markets – Partnering to WinMarketingArrowECS_CZ
 
Oracle Document Cloud Service
Oracle Document Cloud ServiceOracle Document Cloud Service
Oracle Document Cloud ServiceArush Jain
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Javaterrencebarr
 

Similar to Enterprise Mobility: Secure Containerization (20)

Securing Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal DevicesSecuring Corporate Applications and Data on Personal Devices
Securing Corporate Applications and Data on Personal Devices
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
 
Threat Modeling for the Internet of Things
Threat Modeling for the Internet of ThingsThreat Modeling for the Internet of Things
Threat Modeling for the Internet of Things
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
Business Intelligence Challenge, Oracle, Doug Tait, TADSummit
Business Intelligence Challenge, Oracle, Doug Tait, TADSummitBusiness Intelligence Challenge, Oracle, Doug Tait, TADSummit
Business Intelligence Challenge, Oracle, Doug Tait, TADSummit
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
Demo intelligent user experience with oracle mobility for publishing
Demo  intelligent user experience with oracle mobility for publishingDemo  intelligent user experience with oracle mobility for publishing
Demo intelligent user experience with oracle mobility for publishing
 
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
 
Mobile Mumbo Jumbo - Demystifying the World of Enterprise Mobility with Oracle
Mobile Mumbo Jumbo - Demystifying the World of Enterprise Mobility with OracleMobile Mumbo Jumbo - Demystifying the World of Enterprise Mobility with Oracle
Mobile Mumbo Jumbo - Demystifying the World of Enterprise Mobility with Oracle
 
Oaux wearables uob_rh.klm
Oaux wearables uob_rh.klmOaux wearables uob_rh.klm
Oaux wearables uob_rh.klm
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
 
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
Approaches for WebLogic Server in the Cloud (OpenWorld, September 2014)
 
Primavera Mobile Applications - Now and Beyond
Primavera Mobile Applications - Now and BeyondPrimavera Mobile Applications - Now and Beyond
Primavera Mobile Applications - Now and Beyond
 
Cómo terminar tu Planeación Financiera antes de las 6PM
Cómo terminar tu Planeación Financiera antes de las 6PMCómo terminar tu Planeación Financiera antes de las 6PM
Cómo terminar tu Planeación Financiera antes de las 6PM
 
Let's Talk Mobile
Let's Talk MobileLet's Talk Mobile
Let's Talk Mobile
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
 
Upc jornadas tic 2015 final
Upc jornadas tic 2015 finalUpc jornadas tic 2015 final
Upc jornadas tic 2015 final
 
ODA Target Markets – Partnering to Win
ODA Target Markets – Partnering to WinODA Target Markets – Partnering to Win
ODA Target Markets – Partnering to Win
 
Oracle Document Cloud Service
Oracle Document Cloud ServiceOracle Document Cloud Service
Oracle Document Cloud Service
 
Enabling the-Connected-Car-Java
Enabling the-Connected-Car-JavaEnabling the-Connected-Car-Java
Enabling the-Connected-Car-Java
 

Recently uploaded

110 Philippines. quiz bee Power PoInt Presentation
110 Philippines. quiz bee Power PoInt Presentation110 Philippines. quiz bee Power PoInt Presentation
110 Philippines. quiz bee Power PoInt PresentationNorHaiFatun
 
Retail marketing Supply chain management SLIDESHARE.pptx
Retail marketing Supply chain management SLIDESHARE.pptxRetail marketing Supply chain management SLIDESHARE.pptx
Retail marketing Supply chain management SLIDESHARE.pptxBharathBunny10
 
DAY 06 A Revelation 03-10-2024 PpPT.pptx
DAY 06 A Revelation 03-10-2024 PpPT.pptxDAY 06 A Revelation 03-10-2024 PpPT.pptx
DAY 06 A Revelation 03-10-2024 PpPT.pptxFamilyWorshipCenterD
 
Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...
Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...
Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...Kayode Fayemi
 
LAUNCH: Intersections between violence against children and violence against ...
LAUNCH: Intersections between violence against children and violence against ...LAUNCH: Intersections between violence against children and violence against ...
LAUNCH: Intersections between violence against children and violence against ...UNICEF Office of Research - Innocenti
 
2024 QRC PLM Recruitment Praesentation.pdf
2024 QRC PLM Recruitment Praesentation.pdf2024 QRC PLM Recruitment Praesentation.pdf
2024 QRC PLM Recruitment Praesentation.pdfJoerg Speikamp
 
Self Editing Your Novel Part 3: Who's Telling This Story?
Self Editing Your Novel Part 3: Who's Telling This Story?Self Editing Your Novel Part 3: Who's Telling This Story?
Self Editing Your Novel Part 3: Who's Telling This Story?Beth Jusino
 
wonder woman:quiz on female achievements
wonder woman:quiz on female achievementswonder woman:quiz on female achievements
wonder woman:quiz on female achievementsRemya Roshni
 
BaruwaRaquella_Retail Store Presentation.pptx
BaruwaRaquella_Retail Store Presentation.pptxBaruwaRaquella_Retail Store Presentation.pptx
BaruwaRaquella_Retail Store Presentation.pptxRaquellaBaruwa
 
Evaluating LLM Models for Production Systems Methods and Practices -
Evaluating LLM Models for Production Systems Methods and Practices -Evaluating LLM Models for Production Systems Methods and Practices -
Evaluating LLM Models for Production Systems Methods and Practices -alopatenko
 

Recently uploaded (12)

110 Philippines. quiz bee Power PoInt Presentation
110 Philippines. quiz bee Power PoInt Presentation110 Philippines. quiz bee Power PoInt Presentation
110 Philippines. quiz bee Power PoInt Presentation
 
Retail marketing Supply chain management SLIDESHARE.pptx
Retail marketing Supply chain management SLIDESHARE.pptxRetail marketing Supply chain management SLIDESHARE.pptx
Retail marketing Supply chain management SLIDESHARE.pptx
 
DAY 06 A Revelation 03-10-2024 PpPT.pptx
DAY 06 A Revelation 03-10-2024 PpPT.pptxDAY 06 A Revelation 03-10-2024 PpPT.pptx
DAY 06 A Revelation 03-10-2024 PpPT.pptx
 
Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...
Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...
Leadership in Difficult Times- Strategies for Overcoming Challenges - Reflect...
 
Tethex Cards - complete presentation in English
Tethex Cards - complete presentation in EnglishTethex Cards - complete presentation in English
Tethex Cards - complete presentation in English
 
LAUNCH: Intersections between violence against children and violence against ...
LAUNCH: Intersections between violence against children and violence against ...LAUNCH: Intersections between violence against children and violence against ...
LAUNCH: Intersections between violence against children and violence against ...
 
NOC_SXSW_Non-ObviousThinking_2024_SLIDES.pptx
NOC_SXSW_Non-ObviousThinking_2024_SLIDES.pptxNOC_SXSW_Non-ObviousThinking_2024_SLIDES.pptx
NOC_SXSW_Non-ObviousThinking_2024_SLIDES.pptx
 
2024 QRC PLM Recruitment Praesentation.pdf
2024 QRC PLM Recruitment Praesentation.pdf2024 QRC PLM Recruitment Praesentation.pdf
2024 QRC PLM Recruitment Praesentation.pdf
 
Self Editing Your Novel Part 3: Who's Telling This Story?
Self Editing Your Novel Part 3: Who's Telling This Story?Self Editing Your Novel Part 3: Who's Telling This Story?
Self Editing Your Novel Part 3: Who's Telling This Story?
 
wonder woman:quiz on female achievements
wonder woman:quiz on female achievementswonder woman:quiz on female achievements
wonder woman:quiz on female achievements
 
BaruwaRaquella_Retail Store Presentation.pptx
BaruwaRaquella_Retail Store Presentation.pptxBaruwaRaquella_Retail Store Presentation.pptx
BaruwaRaquella_Retail Store Presentation.pptx
 
Evaluating LLM Models for Production Systems Methods and Practices -
Evaluating LLM Models for Production Systems Methods and Practices -Evaluating LLM Models for Production Systems Methods and Practices -
Evaluating LLM Models for Production Systems Methods and Practices -
 

Enterprise Mobility: Secure Containerization

  • 2. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Secure  Containerization Abilitare  all’utilizzo  aziendale  i  device  mobili  personali   ! Domenico  Catalano   Security  Principal  Sales  Consultant   ! Small  Device  -­‐  Big  Data:  Sicurezza  in  un  mondo  senza  Fili   La  Sapienza  -­‐  4    Luglio  2014
  • 3. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Safe  Harbor  Statement The  following  is  intended  to  outline  our  general  product  direction.  It  is  intended  for   information  purposes  only,  and  may  not  be  incorporated  into  any  contract.  It  is  not  a   commitment  to  deliver  any  material,  code,  or  functionality,  and  should  not  be  relied  upon   in  making  purchasing  decisions.  The  development,  release,  and  timing  of  any  features  or   functionality  described  for  Oracle’s  products  remains  at  the  sole  discretion  of  Oracle. Oracle  Confidential  –  Internal/Restricted/Highly  Restricted 3
  • 4. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted Program  Agenda 1 2 3 4 5 Challenges   Mobile  Device  Risks   New  Security  Requirements   Demo   Q&A 4
  • 5. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted Bring  Your  Own  Device  (BYOD) A  new  mobile  security  imperative 5
  • 6. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted Challenges By  2015  there  will  be  as   many  as  6.7B  personal   smartphones  used  globally 89% of  employees  are  using   smartphone  devices  for   work,  and  nearly  half  of   them  are  doing  so  without   permission IT IT  Organization  are  un-­‐ prepared  for  the  new   security  requirements  and   regulatory  challenges The  proliferation  is   complicated  by  the  variety   of  platforms  and  operating   system  versions 6
  • 7. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted The  Rules  have  Changed Mobile  devices  have  redefined   perimeter  security The  Network  is  no  longer  the  main   point  of  control The  new  security  perimeter  is  users,   devices,  and  data 7
  • 8. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted Mobile  Device  Risk Vulnerabilities 8
  • 9. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted 76% of  all  enterprise  data  breaches   are  the  result  of  weak  or  stolen   credentials   9
  • 10. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted Mobile  Malware Mobile  Device  Risk • Mobile  malware  has  increased  58%  from  2011  to  2012.   • The  most  common  activity  carried  out  by  malware  today  is  stealing   sensitive  data  on  the  device.   • Half  of  all  attacks  target  organization  of  2500  employees  or  more.   • Mobile  device  are  a  key  target  for  Cybercriminals. 10
  • 11. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted Lost  or  Stolen  Devices Mobile  Device  Risk 11 • In  the  US  alone,  113  cell  phone  are  lost  or  stolen  every  minute.   • Today  84%  of  organisations  have  a  firm  policy  that  departing  employees   must  surrender  their  personal  devices.   • Organizations  should  consider  what  might  the  end  user  delete,  or  retain   before  turning  their  devices  in.   • There  are  no  consistent  and  common  policies  across  mobile  devices,   whether  personal  or  corporate  owned.
  • 12. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted Application  Management Mobile  Device  Risk • Applications  have  quickly  became  the  greatest  enabler  for  business  to   empower  their  employees  with  real  time  data.   • Application  can  be  a  conduit  for  privileged  access  abuse,  misuse  and  data   theft.   • It  is  predicted  that  25%  of  enterprises  will  have  their  own  application  stores   by  2017. 12
  • 13. Balance  between  Securing  Enterprise  Application  data  and  Employee  Privacy New  Security  Requirements
  • 14. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted New  Security  Requirements Identity  Management   Secure  Container   Single  Sign-­‐on   Application  Management   VPN  Independent   Device  Provisioning   Multi-­‐user  Devices   Lost  &  Stolen  Device 14
  • 15. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted Mobile  Security  Strategy 15 CONTAINERS CONTROLS EXPERIENCE Isolate  corporate  data,   support  remote  wipe,   restrict  data  transfer Secure  applications  &   communication,   corporate  application   store Role  based  access,  self   service  request,  sign-­‐on   fraud  detection
  • 16. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted Containerization How  are  Secure  Containers  made? • Application  Wrapping   • Functionality  injected  into  existing  applications   • Enforces  security  at  the  application  level   – Data  encryption  at  rest   – Authentication   – Policy  Enforcement   • No  code  changes  required  by  developer 16
  • 17. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted Key  Management Cryptography • Secure  Container  uses  a  key  hierarchy  to  protect  data.     • All  keys  are  derived  from  user  credentials  that  are  never  stored.   • Key  hierarchy  involves  multiple  keys  to  support  different  sensitivity  of  data   – Unique  key  used  for  the  user’s  authentication  certificate.   – A  different  key  is  used  for  the  browser  cache.   • The  Security  Container  distributes  and  manages  keys  for  all  the  enterprise   apps. 17
  • 18. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted Oracle’s  Mobile  Security  Components 18 Authentication / SSO Data at Rest Encryption Data in Transit Encryption DLP Policy Browser PIM 
 (email, calendar, contacts, tasks, notes) Doc Editor App Catalog File Manager Secure Intranet Secure Mail Secure Files App Distribution Secure Apps Enterprise Apps
  • 19. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted Oracle  Mobile  Security:  
 Demo 19 DEMO
  • 20. Copyright  ©  2014  Oracle  and/or  its  affiliates.  All  rights  reserved.    | Oracle  Confidential  –  Internal/Restricted/Highly  Restricted 20