SlideShare a Scribd company logo
1 of 30
Download to read offline
Bridging the Security Gap Between the
            Enterprise and Cloud
                                                                                                                                              Sponsored by


1   Copyright © 2012, Oracle and/or its affiliates. All rights reserved.   Insert Information Protection Policy Classification from Slide 8
This document is for informational purposes. It is not a commitment
to deliver any material, code, or functionality, and should not be relied
upon in making purchasing decisions. The development, release,
and timing of any features or functionality described in this document
remains at the sole discretion of Oracle. This document in any form,
software or printed matter, contains proprietary information that is the
exclusive property of Oracle. This document and information
contained herein may not be disclosed, copied, reproduced or
distributed to anyone outside Oracle without prior written consent of
Oracle. This document is not part of your license agreement nor can
it be incorporated into any contractual agreement with Oracle or its
subsidiaries or affiliates.
Agenda

•  Barriers to Cloud Adoption

•  Security Gaps Between Enterprise and Cloud

•  Oracle Identity Management

•  Case Studies

•  Summary
Oracle Cloud Offerings – Identity Management
                                                                                                   Private Cloud Products                                                    Private & Public Cloud Services
                                                                                                                           Applications                                    Oracle Cloud Services        Oracle Public Cloud
                                                                                                                                                                              Oracle Applications    Fusion      Fusion     Oracle
                                                                                                                      Oracle Applications                                                           HCM Cloud   CRM Cloud    Social
                                                                                                                                                                                 On Demand           Service     Service    Network



                                                                                                                 Platform as a Service
                                               Cloud Control




                                                                            SOA Suite &                  Data Integration                  Identity &     WebCenter User
                   Oracle Enterprise Manager




                                                                             BPM Suite                    & GoldenGate                    Access Mgmt      Engagement
Cloud Management




                                                                                                                                                                            Middleware On Demand
                                                                                             Cloud Application Foundation: WebLogic Server,                                  Exalogic On Demand
                                                                                                                                                                                                       Oracle Java Cloud Service
                                                                                               Coherence, JRockit, Exalogic Elastic Cloud
                                                                                                               Oracle Database, MySQL,                                       Database On Demand
                                                                                                                                                                                                     Oracle Database Cloud Service
                                                                                                               Exadata Database Machine                                      Exadata On Demand


                                                                                                            Infrastructure as a Service
                                                                                                   Oracle Solaris                                       Oracle Linux
                                               Ops Center




                                                                                 Oracle VM for SPARC (LDom)                                     Oracle VM for x86
                                                                                        Solaris Zones
                                                                                                                 Servers, SuperCluster
                                                                                                                        Storage
                                                                                                                     Network Fabric


                                                               4   Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
Video – “Auction”
Security is the #1 Barrier to Cloud Adoption

                                        87%   Security main barrier to
                                              cloud adoption
                                              Source: IDC Enterprise Panel, 3Q09




                                        52%   Concerned with trusting
                                              an outside 3rd party
                                              Source: IDC Cloud Security Survey 2011`




                                        41%   Fear a security breach
                                              from use of security SaaS
                                               Source: IDC Cloud Security Survey, 2011




Cloud Computing saves costs but
reduces control, visibility and trust
                                        40%   Compliance concerns
                                              prevent use of SaaS
                                              Source: IDC Cloud Security Survey, 2011
The Cloud Security Continuum
HIGH



MED-
HIGH
                                                                         Public Cloud
       RISK


                                                  Private Hosted Cloud
MED-
LOW



                             Private In House Cloud     Cloud computing increases
LOW                                                     risk and decreases control
               Enterprise
                                               CONTROL
                HIGH                                                             LOW
              1990          1995        2000          2005     2008
Security Gap Between the Enterprise and Cloud
       Private In-House Cloud
                                 c




       Private In House Cloud          Private Hosted Cloud                Public Cloud


               Benefits                    Use Cases                        Challenges
    •  Cloud for internal use        •  Leverage reusable identity   •  Insider Threats
    •  Scales to large                  functions for new apps
                                                                     •  Privileged User Access
       departments                   •  Meter departmental app          Control
    •  Security enforced by IT          usage
                                                                     •  Role based Access
                                                                     •  Access Governance

8
Security Gap Between the Enterprise and Cloud
    Private Hosted Cloud




     Private In House Cloud            Private Hosted Cloud                 Public Cloud


            Benefits                       Use Cases                         Challenges
•  Hosted cloud for enterprise use   •  Deploy a massively            •  Integration can be complex
•  Scales to several large              scalable directory service
                                                                      •  Adding capacity can be
   organizations                     •  Deploy layered security for      costly
•  Identity management                  sensitive applications
   outsourced



9
Security Gap Between the Enterprise and Cloud
        Public Cloud




         Private In House Cloud        Private Hosted Cloud            Public Cloud


                Benefits                    Use Cases                      Challenges
     •  Access anytime anywhere       •  Rapid installation         •  Shared environment
     •  Scales to millions of users   •  Access applications from      increases risk
     •  Pay as you grow                  mobile devices             •  Security silos
                                      •  Upgrades with zero         •  Jurisdictional issues
                                         downtime



10
Risk and Fragmentation Increase Latency

                                 •  Security silos result in policy
                                    fragmentation
                                    •  Multiple points of failure

                                 •  Security gaps increase vulnerability
LATENCY




                                    to breaches
                                    •  Poor response to threats

              RISK               •  Latency increases with
                                    fragmentation
                                    •  Inability to develop and deploy
                                       applications and users


             FRAGMENTATION
Identity Management Bridges the Gap

                                                                                                                Adaptive Access
 Public Cloud
                                                                                                                •  Context / Risk Aware
                                                                                    Administration
                                                                                                                •  Anomaly Detection
                                                                                    •  Role Mgmt
                                                                                                                •  Fraud Detection
                                                                                    •  Provisioning
Private Hosted Cloud
                                                      Access                        •  Identity Analytics
                                                      •  Single-sign on             •  Certification
                                                      •  Password policy
                         Scalable Repository
                                                      •  Authorization policy
                         •  Identity Synch
                                                      •  Entitlements                                             Risk Management
                         •  Identity Virtualization
Private In-House Cloud   •  Reporting                                                                   Audit
                                                                                Administration
                                                         AuthN and AuthZ
                                        Identity
   Enterprise
                            Tools                     Point Solutions                       Platform                      Intelligence
Dimensions of Cloud Identity Management


                            Are you building         Do you need IdM but don’t
Are you using cloud                              c      want to maintain it?
       apps?          c       cloud apps?




 Identity as a                Identity as a          Identity Hosted as
Bridge to Cloud           Foundation for Cloud        a Cloud Service
Authentication and SSO

                     •  Access anytime, anywhere from
                        any device
                     •  Mobile authentication, SSO and
                        access control
                     •  Connect Internet and Social
                        identities to enterprise identity
                     •  Seamless integration and control
                        with enterprise
Federated Standards
                                 •  Multiple standard support for
                                    authentication to multiple clouds
                                     •  SAML
Employees/          Social
                   Networks
                                     •  OAuth
Contractors
                                     •  OpenID
                                     •  WS-Fed
                                 •  Accelerated on boarding of
                                    partners and service providers
 Partners/           SaaS
Subsidiaries      Applications
Authorization

                                                 •  Centralized Policy
                        Centralized Policy
                                                    Enforcement
                         Administration
                                                 •  Distributed Real-time Policy
                                                    Execution
                                                 •  Standards-based policies:
                                                    XACML, RBAC, ABAC,
                                                    JAAS


Evaluate Policies and   Policy Enforcement for
  Enforce Access        Apps, Middleware and
                              Databases
Context-Aware Security and Fraud Prevention


              User: Jdoe                                •  Location aware
       Paswd:1happycat$
                                      User: Jdoe        •  Device aware
                                   Paswd:1happycat$
Entitlement
  Policy
                                                        •  Entitlements based
                                         User: Jdoe     •  Enterprise control
                                     Paswd:1happycat$
                                                        •  Full audit
                                                             Filtered
                                                           Private Data
               Trust but Verify:
         Limit Access by Policy
User Provisioning and Role Management
                                            •  User lifecycle
                                               management for on-
                                               premise and SaaS
                                               applications
                                            •  Self-service
                                               provisioning and
                               Roles,
  Users    Apps
                             Entitlements      request mgmt
                                            •  Flexible – Roles, rules
                                               and policies

                  Managers
Audit and Compliance

                          •  Access certification
                          •  Risk scoring
                          •  Privileged access
                             control
                          •  Workflow remediation
                          •  Business views
    Audit Reporting


Actionable Intelligence
Oracle Identity Management Platform
Bridges the Gap
                                                                         Fraud
                                                                      Adaptive Access
                                               Identity Admin and
                                                Administration        •  DetectionRisk
                                                                          Context /
                                               Governance                Reduces risk and
                                                                      Aware
                                                •  Role Mgmt
                         Access                Consolidates user      •  latency bydetection
                                                                          Anomaly
                         Access                 •  Provisioning          preventing fraud in
                         Management            roles and              •  real timecertification
                                                                          Access
   Directory             •  Single-sign on      •  Identity Analytics
                                               entitlements and
 Scalable Repository
   Services              Overcomes security reduces risk
 •  Identity Synch
   Reduces latency       silos by centralizing •  Certification
                         •  Password policy
 • and fragmentation
    Identity             and consolidating
                         •  Authorization                                   Risk Management
 Virtualization
   by consolidating      security policies.
                                                                      Audit
 • identity data
    Reporting
                                                Administration
                               AuthN and AuthZ
              Identity
           Tools              Point Solutions              Platform                Intelligence
Oracle Identity Management Is Cloud-Ready



  Partners




Social Networks

                                                 SaaS Apps



 On Premise Apps                Desktop/Mobile
Case Study: Citizens Bank
      Identity consumed as a service example
COMPANY OVERVIEW                                                          RESULTS
•  A large commercial bank holding company headquartered in NA            •  75% of users were deployed in less than 1
•  Over 20K employees and operates nearly 1500 branches and 4000            week
   ATMs all over North America
                                                                          •  Single solution now delivers anti-phishing,
CHALLENGES/OPPORTUNITIES                                                    anti-malware and fraud detection
•  Needed to secure PeopleSoft application with multi-factor              •  Deployment is cost effective and included
  authentication for a financial services customer
                                                                            layered multifactor authentication
•  Wanted to avoid costly registration schemes and proprietary hardware
•  Wanted to protect customers ‘ identities and preserve brand value by
   preventing phishing attacks

SOLUTION
•  Leveraged Oracle Adaptive Access Manager as a hosted solution from
   Oracle On Demand
Case Study: Sasktel
       Identity as a Service Example

COMPANY OVERVIEW                                                           RESULTS
•  A leading Canadian full service communications provider in the          •  Displaced legacy SiteMinder solution with
   Province of Saskatchewan with nearly 5000 employees                        Oracle Identity and Access Management

•  Offers a wide range of communications products and services including   •  Monetized capital investments by offering
   voice, data, Internet, entertainment, security monitoring, messaging,      Oracle Identity and Access Management Suite
   cellular, wireless data and directory services                             to general public as a cloud services

CHALLENGES/OPPORTUNITIES                                                   •  Reduced internal opex and capex
•  A number of legacy technologies had to be refreshed to cut down
  operational expenses and increase scope of capabilities
•  Nearly a half million customers accessing Sasktel’s services from a
   wide variety of devices demanded self service

SOLUTION
•  Leveraged Oracle Identity and Access Management Suite
Case Study: Oracle Public Cloud
Security and Identity Management Service




                                           Identity Management
                                           in the Cloud
                                           •  Built on Oracle Identity Management
                                           •  Single Sign-On and Federation
                                           •  Multi-factor authentication
                                           •  Fully Delegated Administration
Case Study: Oracle On Demand Cloud Services
   Identity as a Hosted Cloud Service Example


•  Offers Hosted Strong Auth,
   Provisioning, SSO, and Directory
   Integration
                                                                                          12+ years as premier cloud provider
                                                                                            5.5 million satisfied end-users

•  Enterprise-grade performance,                                                    20+ patented and patent pending technologies

   security, and availability                                                               14,000 Oracle Service experts
                                                                               2,000+ Critical Patch Updates proactively applied annually
                                                                                       2x Faster service request resolution time
•  End-to-end cloud service portfolio
                                                                                       64% Reduction in downtime for upgrades
                                                                                Secure and Compliant: ISO 27001, ISO 27002, HIPAA,
                                                                                ISAE 3402 / SSAE 16, NIST, DIACAP, PCI, 21 CFR Part 11



   25   Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
Oracle Identity Management Platform Reduces Cost

                                                                                      Oracle IAM Suite
                                                      Benefits
                                                                                         Advantage

48%   Cost Savings
                      Increased End-
                     User Productivity

                      Reduced Risk
                                           •  Emergency Access
                                           •  End-user Self Service
                                                                                   •  11% faster
                                                                                   •  30% faster
                                           •  Suspend/revoke/de-

46%
                                                                                   •  46% faster
      More                                    provision end user access
      Responsive     Enhanced Agility      •  Integrate a new app faster
                                              with the IAM infrastructure          •  64% faster


35%   Fewer Audit                          •  Integrate a new end user             •  73% faster
                                              role faster into the solution
      Deficiencies
                        Enhanced           •  Reduces unauthorized
                                                                                   •  14% fewer
                       Security and           access
                       Compliance                                                  •  35% fewer
                                           •  Reduces audit deficiencies
                      Reduced Total        •  Reduces total cost of IAM
                                                                                   •  48% lower
                          Cost                initiatives
                             Source: Aberdeen “Analyzing point solutions vs. platform” 2011
Oracle Identity Management
  Summary


•  Complete, Open and Integrated
•  Innovative, Scalable and Modernized     SaaS
                                           PaaS
                                           IaaS
•  Identity Management for Enterprise.
   Cloud, Mobile and Social environments
•  Simplified, Actionable Compliance
Learn More
                                   Join the Oracle IDM
             Contact                   Community

•  Normand Sauvé              •  www.oracle.com/identity
•  Normand.sauve@oracle.com
                              •  twitter.com/OracleIDM
•  Call 1-800-672-2537
                              •  facebook.com/OracleIDM

                              •  Blogs.oracle.com/OracleIDM
Q&A
Oracle Security: Bridging the gap between enterprise and cloud

More Related Content

What's hot

Talk IT_ Oracle_이범_110727
Talk IT_ Oracle_이범_110727Talk IT_ Oracle_이범_110727
Talk IT_ Oracle_이범_110727Cana Ko
 
Oracle Middleware and Hardware Complete Solution
Oracle Middleware and Hardware Complete SolutionOracle Middleware and Hardware Complete Solution
Oracle Middleware and Hardware Complete SolutionFumiko Yamashita
 
Playing in the Same Sandbox: MySQL and Oracle
Playing in the Same Sandbox:  MySQL and OraclePlaying in the Same Sandbox:  MySQL and Oracle
Playing in the Same Sandbox: MySQL and Oraclelynnferrante
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureBob Rhubart
 
Engineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureEngineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureBob Rhubart
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOABob Rhubart
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise ManagerBob Rhubart
 
Introduction to Java Cloud Service
Introduction to Java Cloud ServiceIntroduction to Java Cloud Service
Introduction to Java Cloud ServicePerficient, Inc.
 
Extending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
Extending The Value Of Oracle Crm On Demand Through Cloud Based ExtensibilityExtending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
Extending The Value Of Oracle Crm On Demand Through Cloud Based ExtensibilityJerome Leonard
 
Building applications using sql azure
Building applications using sql azureBuilding applications using sql azure
Building applications using sql azurepedrojcj
 
PDoolan Oracle Overview
PDoolan Oracle OverviewPDoolan Oracle Overview
PDoolan Oracle OverviewPeter Doolan
 
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012Arun Gupta
 
21st Century Service Oriented Architecture
21st Century Service Oriented Architecture21st Century Service Oriented Architecture
21st Century Service Oriented ArchitectureBob Rhubart
 
Presentation oracle exalogic elastic cloud
Presentation   oracle exalogic elastic cloudPresentation   oracle exalogic elastic cloud
Presentation oracle exalogic elastic cloudsolarisyougood
 
MySQL HA Solutions
MySQL HA SolutionsMySQL HA Solutions
MySQL HA SolutionsMat Keep
 
Sql azure database under the hood
Sql azure database under the hoodSql azure database under the hood
Sql azure database under the hoodguest2dd056
 
Java ee 7 platform developing for the cloud kshitiz saxena
Java ee 7 platform developing for the cloud   kshitiz saxenaJava ee 7 platform developing for the cloud   kshitiz saxena
Java ee 7 platform developing for the cloud kshitiz saxenaIndicThreads
 
Interfacing Banner BEIS With Identity Management - Summit 2012
Interfacing Banner BEIS With Identity Management - Summit 2012Interfacing Banner BEIS With Identity Management - Summit 2012
Interfacing Banner BEIS With Identity Management - Summit 2012joelavery
 
Summer training oracle
Summer training   oracle Summer training   oracle
Summer training oracle Arshit Rai
 
Oracle 10g Application Server
Oracle 10g Application ServerOracle 10g Application Server
Oracle 10g Application ServerMark J. Feldman
 

What's hot (20)

Talk IT_ Oracle_이범_110727
Talk IT_ Oracle_이범_110727Talk IT_ Oracle_이범_110727
Talk IT_ Oracle_이범_110727
 
Oracle Middleware and Hardware Complete Solution
Oracle Middleware and Hardware Complete SolutionOracle Middleware and Hardware Complete Solution
Oracle Middleware and Hardware Complete Solution
 
Playing in the Same Sandbox: MySQL and Oracle
Playing in the Same Sandbox:  MySQL and OraclePlaying in the Same Sandbox:  MySQL and Oracle
Playing in the Same Sandbox: MySQL and Oracle
 
Oracle Cloud Reference Architecture
Oracle Cloud Reference ArchitectureOracle Cloud Reference Architecture
Oracle Cloud Reference Architecture
 
Engineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the FutureEngineered Systems: Oracle's Vision for the Future
Engineered Systems: Oracle's Vision for the Future
 
21st Century SOA
21st Century SOA21st Century SOA
21st Century SOA
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise Manager
 
Introduction to Java Cloud Service
Introduction to Java Cloud ServiceIntroduction to Java Cloud Service
Introduction to Java Cloud Service
 
Extending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
Extending The Value Of Oracle Crm On Demand Through Cloud Based ExtensibilityExtending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
Extending The Value Of Oracle Crm On Demand Through Cloud Based Extensibility
 
Building applications using sql azure
Building applications using sql azureBuilding applications using sql azure
Building applications using sql azure
 
PDoolan Oracle Overview
PDoolan Oracle OverviewPDoolan Oracle Overview
PDoolan Oracle Overview
 
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
 
21st Century Service Oriented Architecture
21st Century Service Oriented Architecture21st Century Service Oriented Architecture
21st Century Service Oriented Architecture
 
Presentation oracle exalogic elastic cloud
Presentation   oracle exalogic elastic cloudPresentation   oracle exalogic elastic cloud
Presentation oracle exalogic elastic cloud
 
MySQL HA Solutions
MySQL HA SolutionsMySQL HA Solutions
MySQL HA Solutions
 
Sql azure database under the hood
Sql azure database under the hoodSql azure database under the hood
Sql azure database under the hood
 
Java ee 7 platform developing for the cloud kshitiz saxena
Java ee 7 platform developing for the cloud   kshitiz saxenaJava ee 7 platform developing for the cloud   kshitiz saxena
Java ee 7 platform developing for the cloud kshitiz saxena
 
Interfacing Banner BEIS With Identity Management - Summit 2012
Interfacing Banner BEIS With Identity Management - Summit 2012Interfacing Banner BEIS With Identity Management - Summit 2012
Interfacing Banner BEIS With Identity Management - Summit 2012
 
Summer training oracle
Summer training   oracle Summer training   oracle
Summer training oracle
 
Oracle 10g Application Server
Oracle 10g Application ServerOracle 10g Application Server
Oracle 10g Application Server
 

Viewers also liked

Closing the Cloud Skills Gap
Closing the Cloud Skills GapClosing the Cloud Skills Gap
Closing the Cloud Skills GapScott Lowe
 
The Cloud Skills Gap Opportunity for Training and Consulting Companies
The Cloud Skills Gap Opportunity for Training and Consulting CompaniesThe Cloud Skills Gap Opportunity for Training and Consulting Companies
The Cloud Skills Gap Opportunity for Training and Consulting CompaniesITpreneurs
 
Technology executive summary
Technology executive summaryTechnology executive summary
Technology executive summaryNaman Kumar
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationDelivery Centric
 
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Hoang Tri Vo
 
Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Atul Goyal
 

Viewers also liked (6)

Closing the Cloud Skills Gap
Closing the Cloud Skills GapClosing the Cloud Skills Gap
Closing the Cloud Skills Gap
 
The Cloud Skills Gap Opportunity for Training and Consulting Companies
The Cloud Skills Gap Opportunity for Training and Consulting CompaniesThe Cloud Skills Gap Opportunity for Training and Consulting Companies
The Cloud Skills Gap Opportunity for Training and Consulting Companies
 
Technology executive summary
Technology executive summaryTechnology executive summary
Technology executive summary
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...Identity as a Service: a missing gap for moving enterprise applications in In...
Identity as a Service: a missing gap for moving enterprise applications in In...
 
Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3
 

Similar to Oracle Security: Bridging the gap between enterprise and cloud

Sesion Marzo Zaragoza
Sesion Marzo ZaragozaSesion Marzo Zaragoza
Sesion Marzo ZaragozaFran Navarro
 
Fusion app integration_con8685_pdf_8685_0001
Fusion app integration_con8685_pdf_8685_0001Fusion app integration_con8685_pdf_8685_0001
Fusion app integration_con8685_pdf_8685_0001jucaab
 
Arrow hw barcelona_2012-18-12_v2
Arrow hw barcelona_2012-18-12_v2Arrow hw barcelona_2012-18-12_v2
Arrow hw barcelona_2012-18-12_v2Fran Navarro
 
Application-Driven Virtualization: Architectural Considerations
Application-Driven Virtualization: Architectural ConsiderationsApplication-Driven Virtualization: Architectural Considerations
Application-Driven Virtualization: Architectural ConsiderationsBob Rhubart
 
Vincent Desveronnieres, Oracle
Vincent Desveronnieres,  OracleVincent Desveronnieres,  Oracle
Vincent Desveronnieres, OracleEwa Stepien
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy ArchitectureBob Rhubart
 
Next Generation of Middleware Solutions
Next Generation of Middleware SolutionsNext Generation of Middleware Solutions
Next Generation of Middleware SolutionsBruno Borges
 
Cloud Computing - Making IT Simple
Cloud Computing - Making IT SimpleCloud Computing - Making IT Simple
Cloud Computing - Making IT SimpleBob Rhubart
 
Cloud Computing: Making IT Simple
Cloud Computing: Making IT SimpleCloud Computing: Making IT Simple
Cloud Computing: Making IT SimpleBob Rhubart
 
Cloud Computing - Making IT Simple
 Cloud Computing - Making IT Simple Cloud Computing - Making IT Simple
Cloud Computing - Making IT SimpleBob Rhubart
 
Global Netflix - HPTS Workshop - Scaling Cassandra benchmark to over 1M write...
Global Netflix - HPTS Workshop - Scaling Cassandra benchmark to over 1M write...Global Netflix - HPTS Workshop - Scaling Cassandra benchmark to over 1M write...
Global Netflix - HPTS Workshop - Scaling Cassandra benchmark to over 1M write...Adrian Cockcroft
 
Migrating Netflix from Datacenter Oracle to Global Cassandra
Migrating Netflix from Datacenter Oracle to Global CassandraMigrating Netflix from Datacenter Oracle to Global Cassandra
Migrating Netflix from Datacenter Oracle to Global CassandraAdrian Cockcroft
 
Alain ozan keynote zagreb.ppt [compatibility m
Alain ozan keynote zagreb.ppt [compatibility mAlain ozan keynote zagreb.ppt [compatibility m
Alain ozan keynote zagreb.ppt [compatibility mOracle Hrvatska
 
AppDynamics- A sneak peak into the product that is disrupting the Application...
AppDynamics- A sneak peak into the product that is disrupting the Application...AppDynamics- A sneak peak into the product that is disrupting the Application...
AppDynamics- A sneak peak into the product that is disrupting the Application...Codemotion
 
The Cloud Concierge
The Cloud ConciergeThe Cloud Concierge
The Cloud ConciergeBob Rhubart
 
Oracle Cloud Computing Strategy (EMO)
Oracle Cloud Computing Strategy (EMO)Oracle Cloud Computing Strategy (EMO)
Oracle Cloud Computing Strategy (EMO)rachgregs
 
Michał Wawrzyński @ "Oracle Systems jako infrastruktura dla chmur prywatnych"...
Michał Wawrzyński @ "Oracle Systems jako infrastruktura dla chmur prywatnych"...Michał Wawrzyński @ "Oracle Systems jako infrastruktura dla chmur prywatnych"...
Michał Wawrzyński @ "Oracle Systems jako infrastruktura dla chmur prywatnych"...Ewa Stepien
 

Similar to Oracle Security: Bridging the gap between enterprise and cloud (20)

Sesion Marzo Zaragoza
Sesion Marzo ZaragozaSesion Marzo Zaragoza
Sesion Marzo Zaragoza
 
Fusion app integration_con8685_pdf_8685_0001
Fusion app integration_con8685_pdf_8685_0001Fusion app integration_con8685_pdf_8685_0001
Fusion app integration_con8685_pdf_8685_0001
 
Arrow hw barcelona_2012-18-12_v2
Arrow hw barcelona_2012-18-12_v2Arrow hw barcelona_2012-18-12_v2
Arrow hw barcelona_2012-18-12_v2
 
Application-Driven Virtualization: Architectural Considerations
Application-Driven Virtualization: Architectural ConsiderationsApplication-Driven Virtualization: Architectural Considerations
Application-Driven Virtualization: Architectural Considerations
 
Exalogic Bcn
Exalogic BcnExalogic Bcn
Exalogic Bcn
 
Vincent Desveronnieres, Oracle
Vincent Desveronnieres,  OracleVincent Desveronnieres,  Oracle
Vincent Desveronnieres, Oracle
 
Security in a Cloudy Architecture
Security in a Cloudy ArchitectureSecurity in a Cloudy Architecture
Security in a Cloudy Architecture
 
Next Generation of Middleware Solutions
Next Generation of Middleware SolutionsNext Generation of Middleware Solutions
Next Generation of Middleware Solutions
 
Cloud Computing - Making IT Simple
Cloud Computing - Making IT SimpleCloud Computing - Making IT Simple
Cloud Computing - Making IT Simple
 
Top 10 reasons to adopt cloud
Top 10 reasons to adopt cloudTop 10 reasons to adopt cloud
Top 10 reasons to adopt cloud
 
Cloud Computing: Making IT Simple
Cloud Computing: Making IT SimpleCloud Computing: Making IT Simple
Cloud Computing: Making IT Simple
 
Cloud Computing - Making IT Simple
 Cloud Computing - Making IT Simple Cloud Computing - Making IT Simple
Cloud Computing - Making IT Simple
 
102 1630 1700
102 1630 1700102 1630 1700
102 1630 1700
 
Global Netflix - HPTS Workshop - Scaling Cassandra benchmark to over 1M write...
Global Netflix - HPTS Workshop - Scaling Cassandra benchmark to over 1M write...Global Netflix - HPTS Workshop - Scaling Cassandra benchmark to over 1M write...
Global Netflix - HPTS Workshop - Scaling Cassandra benchmark to over 1M write...
 
Migrating Netflix from Datacenter Oracle to Global Cassandra
Migrating Netflix from Datacenter Oracle to Global CassandraMigrating Netflix from Datacenter Oracle to Global Cassandra
Migrating Netflix from Datacenter Oracle to Global Cassandra
 
Alain ozan keynote zagreb.ppt [compatibility m
Alain ozan keynote zagreb.ppt [compatibility mAlain ozan keynote zagreb.ppt [compatibility m
Alain ozan keynote zagreb.ppt [compatibility m
 
AppDynamics- A sneak peak into the product that is disrupting the Application...
AppDynamics- A sneak peak into the product that is disrupting the Application...AppDynamics- A sneak peak into the product that is disrupting the Application...
AppDynamics- A sneak peak into the product that is disrupting the Application...
 
The Cloud Concierge
The Cloud ConciergeThe Cloud Concierge
The Cloud Concierge
 
Oracle Cloud Computing Strategy (EMO)
Oracle Cloud Computing Strategy (EMO)Oracle Cloud Computing Strategy (EMO)
Oracle Cloud Computing Strategy (EMO)
 
Michał Wawrzyński @ "Oracle Systems jako infrastruktura dla chmur prywatnych"...
Michał Wawrzyński @ "Oracle Systems jako infrastruktura dla chmur prywatnych"...Michał Wawrzyński @ "Oracle Systems jako infrastruktura dla chmur prywatnych"...
Michał Wawrzyński @ "Oracle Systems jako infrastruktura dla chmur prywatnych"...
 

Recently uploaded

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Oracle Security: Bridging the gap between enterprise and cloud

  • 1. Bridging the Security Gap Between the Enterprise and Cloud Sponsored by 1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 8
  • 2. This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.
  • 3. Agenda •  Barriers to Cloud Adoption •  Security Gaps Between Enterprise and Cloud •  Oracle Identity Management •  Case Studies •  Summary
  • 4. Oracle Cloud Offerings – Identity Management Private Cloud Products Private & Public Cloud Services Applications Oracle Cloud Services Oracle Public Cloud Oracle Applications Fusion Fusion Oracle Oracle Applications HCM Cloud CRM Cloud Social On Demand Service Service Network Platform as a Service Cloud Control SOA Suite & Data Integration Identity & WebCenter User Oracle Enterprise Manager BPM Suite & GoldenGate Access Mgmt Engagement Cloud Management Middleware On Demand Cloud Application Foundation: WebLogic Server, Exalogic On Demand Oracle Java Cloud Service Coherence, JRockit, Exalogic Elastic Cloud Oracle Database, MySQL, Database On Demand Oracle Database Cloud Service Exadata Database Machine Exadata On Demand Infrastructure as a Service Oracle Solaris Oracle Linux Ops Center Oracle VM for SPARC (LDom) Oracle VM for x86 Solaris Zones Servers, SuperCluster Storage Network Fabric 4 Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
  • 6. Security is the #1 Barrier to Cloud Adoption 87% Security main barrier to cloud adoption Source: IDC Enterprise Panel, 3Q09 52% Concerned with trusting an outside 3rd party Source: IDC Cloud Security Survey 2011` 41% Fear a security breach from use of security SaaS Source: IDC Cloud Security Survey, 2011 Cloud Computing saves costs but reduces control, visibility and trust 40% Compliance concerns prevent use of SaaS Source: IDC Cloud Security Survey, 2011
  • 7. The Cloud Security Continuum HIGH MED- HIGH Public Cloud RISK Private Hosted Cloud MED- LOW Private In House Cloud Cloud computing increases LOW risk and decreases control Enterprise CONTROL HIGH LOW 1990 1995 2000 2005 2008
  • 8. Security Gap Between the Enterprise and Cloud Private In-House Cloud c Private In House Cloud Private Hosted Cloud Public Cloud Benefits Use Cases Challenges •  Cloud for internal use •  Leverage reusable identity •  Insider Threats •  Scales to large functions for new apps •  Privileged User Access departments •  Meter departmental app Control •  Security enforced by IT usage •  Role based Access •  Access Governance 8
  • 9. Security Gap Between the Enterprise and Cloud Private Hosted Cloud Private In House Cloud Private Hosted Cloud Public Cloud Benefits Use Cases Challenges •  Hosted cloud for enterprise use •  Deploy a massively •  Integration can be complex •  Scales to several large scalable directory service •  Adding capacity can be organizations •  Deploy layered security for costly •  Identity management sensitive applications outsourced 9
  • 10. Security Gap Between the Enterprise and Cloud Public Cloud Private In House Cloud Private Hosted Cloud Public Cloud Benefits Use Cases Challenges •  Access anytime anywhere •  Rapid installation •  Shared environment •  Scales to millions of users •  Access applications from increases risk •  Pay as you grow mobile devices •  Security silos •  Upgrades with zero •  Jurisdictional issues downtime 10
  • 11. Risk and Fragmentation Increase Latency •  Security silos result in policy fragmentation •  Multiple points of failure •  Security gaps increase vulnerability LATENCY to breaches •  Poor response to threats RISK •  Latency increases with fragmentation •  Inability to develop and deploy applications and users FRAGMENTATION
  • 12. Identity Management Bridges the Gap Adaptive Access Public Cloud •  Context / Risk Aware Administration •  Anomaly Detection •  Role Mgmt •  Fraud Detection •  Provisioning Private Hosted Cloud Access •  Identity Analytics •  Single-sign on •  Certification •  Password policy Scalable Repository •  Authorization policy •  Identity Synch •  Entitlements Risk Management •  Identity Virtualization Private In-House Cloud •  Reporting Audit Administration AuthN and AuthZ Identity Enterprise Tools Point Solutions Platform Intelligence
  • 13. Dimensions of Cloud Identity Management Are you building Do you need IdM but don’t Are you using cloud c want to maintain it? apps? c cloud apps? Identity as a Identity as a Identity Hosted as Bridge to Cloud Foundation for Cloud a Cloud Service
  • 14. Authentication and SSO •  Access anytime, anywhere from any device •  Mobile authentication, SSO and access control •  Connect Internet and Social identities to enterprise identity •  Seamless integration and control with enterprise
  • 15. Federated Standards •  Multiple standard support for authentication to multiple clouds •  SAML Employees/ Social Networks •  OAuth Contractors •  OpenID •  WS-Fed •  Accelerated on boarding of partners and service providers Partners/ SaaS Subsidiaries Applications
  • 16. Authorization •  Centralized Policy Centralized Policy Enforcement Administration •  Distributed Real-time Policy Execution •  Standards-based policies: XACML, RBAC, ABAC, JAAS Evaluate Policies and Policy Enforcement for Enforce Access Apps, Middleware and Databases
  • 17. Context-Aware Security and Fraud Prevention User: Jdoe •  Location aware Paswd:1happycat$ User: Jdoe •  Device aware Paswd:1happycat$ Entitlement Policy •  Entitlements based User: Jdoe •  Enterprise control Paswd:1happycat$ •  Full audit Filtered Private Data Trust but Verify: Limit Access by Policy
  • 18. User Provisioning and Role Management •  User lifecycle management for on- premise and SaaS applications •  Self-service provisioning and Roles, Users Apps Entitlements request mgmt •  Flexible – Roles, rules and policies Managers
  • 19. Audit and Compliance •  Access certification •  Risk scoring •  Privileged access control •  Workflow remediation •  Business views Audit Reporting Actionable Intelligence
  • 20. Oracle Identity Management Platform Bridges the Gap Fraud Adaptive Access Identity Admin and Administration •  DetectionRisk Context / Governance Reduces risk and Aware •  Role Mgmt Access Consolidates user •  latency bydetection Anomaly Access •  Provisioning preventing fraud in Management roles and •  real timecertification Access Directory •  Single-sign on •  Identity Analytics entitlements and Scalable Repository Services Overcomes security reduces risk •  Identity Synch Reduces latency silos by centralizing •  Certification •  Password policy • and fragmentation Identity and consolidating •  Authorization Risk Management Virtualization by consolidating security policies. Audit • identity data Reporting Administration AuthN and AuthZ Identity Tools Point Solutions Platform Intelligence
  • 21. Oracle Identity Management Is Cloud-Ready Partners Social Networks SaaS Apps On Premise Apps Desktop/Mobile
  • 22. Case Study: Citizens Bank Identity consumed as a service example COMPANY OVERVIEW RESULTS •  A large commercial bank holding company headquartered in NA •  75% of users were deployed in less than 1 •  Over 20K employees and operates nearly 1500 branches and 4000 week ATMs all over North America •  Single solution now delivers anti-phishing, CHALLENGES/OPPORTUNITIES anti-malware and fraud detection •  Needed to secure PeopleSoft application with multi-factor •  Deployment is cost effective and included authentication for a financial services customer layered multifactor authentication •  Wanted to avoid costly registration schemes and proprietary hardware •  Wanted to protect customers ‘ identities and preserve brand value by preventing phishing attacks SOLUTION •  Leveraged Oracle Adaptive Access Manager as a hosted solution from Oracle On Demand
  • 23. Case Study: Sasktel Identity as a Service Example COMPANY OVERVIEW RESULTS •  A leading Canadian full service communications provider in the •  Displaced legacy SiteMinder solution with Province of Saskatchewan with nearly 5000 employees Oracle Identity and Access Management •  Offers a wide range of communications products and services including •  Monetized capital investments by offering voice, data, Internet, entertainment, security monitoring, messaging, Oracle Identity and Access Management Suite cellular, wireless data and directory services to general public as a cloud services CHALLENGES/OPPORTUNITIES •  Reduced internal opex and capex •  A number of legacy technologies had to be refreshed to cut down operational expenses and increase scope of capabilities •  Nearly a half million customers accessing Sasktel’s services from a wide variety of devices demanded self service SOLUTION •  Leveraged Oracle Identity and Access Management Suite
  • 24. Case Study: Oracle Public Cloud Security and Identity Management Service Identity Management in the Cloud •  Built on Oracle Identity Management •  Single Sign-On and Federation •  Multi-factor authentication •  Fully Delegated Administration
  • 25. Case Study: Oracle On Demand Cloud Services Identity as a Hosted Cloud Service Example •  Offers Hosted Strong Auth, Provisioning, SSO, and Directory Integration 12+ years as premier cloud provider 5.5 million satisfied end-users •  Enterprise-grade performance, 20+ patented and patent pending technologies security, and availability 14,000 Oracle Service experts 2,000+ Critical Patch Updates proactively applied annually 2x Faster service request resolution time •  End-to-end cloud service portfolio 64% Reduction in downtime for upgrades Secure and Compliant: ISO 27001, ISO 27002, HIPAA, ISAE 3402 / SSAE 16, NIST, DIACAP, PCI, 21 CFR Part 11 25 Copyright © 2011, Oracle and/or its affiliates. All rights reserved.
  • 26. Oracle Identity Management Platform Reduces Cost Oracle IAM Suite Benefits Advantage 48% Cost Savings Increased End- User Productivity Reduced Risk •  Emergency Access •  End-user Self Service •  11% faster •  30% faster •  Suspend/revoke/de- 46% •  46% faster More provision end user access Responsive Enhanced Agility •  Integrate a new app faster with the IAM infrastructure •  64% faster 35% Fewer Audit •  Integrate a new end user •  73% faster role faster into the solution Deficiencies Enhanced •  Reduces unauthorized •  14% fewer Security and access Compliance •  35% fewer •  Reduces audit deficiencies Reduced Total •  Reduces total cost of IAM •  48% lower Cost initiatives Source: Aberdeen “Analyzing point solutions vs. platform” 2011
  • 27. Oracle Identity Management Summary •  Complete, Open and Integrated •  Innovative, Scalable and Modernized SaaS PaaS IaaS •  Identity Management for Enterprise. Cloud, Mobile and Social environments •  Simplified, Actionable Compliance
  • 28. Learn More Join the Oracle IDM Contact Community •  Normand Sauvé •  www.oracle.com/identity •  Normand.sauve@oracle.com •  twitter.com/OracleIDM •  Call 1-800-672-2537 •  facebook.com/OracleIDM •  Blogs.oracle.com/OracleIDM
  • 29. Q&A