Tackling Security and ComplianceBarriers with a Platform Approachto Identity ManagementScott Bonnell, Sr. Director Product...
Welcome!• Type in questions using the Ask A Question button• All audio is streamed over your computer   – Having technical...
Agenda                                   IDM Drivers                                   Barriers to Adoption             ...
What is driving your IDM strategy?                                  Mobile Application Security                           ...
Barriers to adoption                                      • Need to leverage existing                                     ...
Co-existence based upgrade toleverage Sun investment and benefitfrom new Oracle 11gR2 PlatformcapabilitiesPhilip Black, Se...
About Supervalu                                                              Premier Nationwide Grocer:                   ...
Supervalu IAM                                                                Identity Customer Base                       ...
Business Drivers   Operational Costs                                                User Productivity       Compliance Enf...
Process Overview 1. Install Oracle Identity Manager / Oracle Identity Analytics 2. Setup an Identity Bridge from Hub City ...
Architecture Enabler         IdentityBridge          2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   11
Migration Architecture           2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   12
Migration Architecture                                                                            Move                    ...
Migration continued                                                                           OIM as                      ...
Migration Summary •   Allows deployment of new functionality during migration     •   HCM’s Identity Cert and ISAR •   Cus...
Build a platform roadmap                        Business vs.                        Application                           ...
Assess The Business Opportunity       Security                     Efficiency                                            S...
A Complete IDM Platform        Identity                        Lifecycle Management & 360 visibility      Governance      ...
Oracle Identity Management 11gR2  Simplified Experience                              Modernized Platform  Cloud, Mobile an...
Platform Architectural BenefitsShared Connectors                       Less Customization                              Fas...
Platform Approach Reduces Cost                                                                  Benefits               Pla...
2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.   22
www.oracle.com/Identity             www.facebook.com/OracleIDM             www.twitter.com/OracleIDM               blogs.o...
Upcoming SlideShare
Loading in …5
×

ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…

2,780 views

Published on

In this webinar, host Scott Bonnell discussed security and compliance issues with Philip Black from SuperValu. Business drivers and a Sun to Oracle technology upgrade project are discussed.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,780
On SlideShare
0
From Embeds
0
Number of Embeds
110
Actions
Shares
0
Downloads
19
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Most organizations have multiple deployments that were initiated for different reasonsAccess vs. ControlCompliance vs. SecurityCost vs. ValueQuick win vs. comprehensive planMost Identity Management efforts don’t end with one deployment – typically organizations have multiple deployments implementing different components based on business requirements. Every CSO or Director of Identity Management needs to think about a roadmap. If you are stating from scratch building a roadmap can be complicated:Business owners and Application owners have different goals:The business owner typically wants greater transparency while the application owner wants to keep much of the information isolated and the challenge they struggle with is how to expose the right level of information to the business manager to make decisions. It would be a big exposure to give every manager administrative access to applications to verify and view the access rights of employees.Addressing compliance vs. RiskMany CSO’s are frustrated by all of the money being spent on compliance which does not really reduce security risk. Despite all of the effort on audit compliance many IT departments don’t feel any safer. The roadmap has to help balance these Multiple Priorities From a use case and business case perspective there are multiple priorities – the strategy is typically take a cost vs value approach . So we we can rationalize some of the roadmap items based on the cost and the benefits Timeline and DeliverablesWe can’t do everything at once . Adopt the right technology at the right time and focus on deliverables that can show quick ROI.The Take Away Roadmaps are more Art than Science The best guidance is to work with peers who have done it before
  • Focus on the business Opportunity.From Previous business cases, companies have justified the approach in one of 3 ways Security & Compliance – Preventing risk or in reaction to a security breach or audit event Example – Auditor finds an excessive access issue that gets escalated to a CIO and prompts the spend for a project to clean up access- this project is driven by the regulatory pressure and governance pressure internally Efficiency – Looking at help desk cost, the time to value of on-boarding off-boarding and automationExample: Many organizations have created the business case around identity management by looking at the volumes of help desk calls and choosing identity projects to tackle the volume of calls . In an organization of 40K users you can expect about 20K move adds or changes via the help desk. Roughly 50% of your help desk calls are for password management. The cost quickly add up . You can quickly get a 200% ROI in a 2 year period taking this angle alone.Scale – Expanding the business by serving customers better Many organizations – tackle Identity management outside in by focusing on applications that provide service to customers – ie enabling identity management for customer apps.
  • Studies have shown that a Platform approach – where IDM products are fully integrated by the vendor – is more cost effective and more secure than best of breed products from multiple vendors.================================================================================
  • Join The Community
  • ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…

    1. 1. Tackling Security and ComplianceBarriers with a Platform Approachto Identity ManagementScott Bonnell, Sr. Director Product Management, OraclePhilip Black, Security Director, IAM, SUPERVALU, Inc. 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved.
    2. 2. Welcome!• Type in questions using the Ask A Question button• All audio is streamed over your computer – Having technical issues? Click the ? button• Click Attachments button to find a printable copy of this presentation• After the webinar, ISACA members may earn 1 CPE credit – Find a link to the Event Home Page on the Attachments button – Click the CPE Quiz link on the Event Home Page to access the quiz – Once you pass the quiz, you’ll receive a link to a printable CPE Certificate• Question or suggestion? Email them to eLearning@isaca.org 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 2
    3. 3. Agenda  IDM Drivers  Barriers to Adoption  Customer Case Study  Platform Benefits  Q&A  Resources 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 3
    4. 4. What is driving your IDM strategy? Mobile Application Security Regulatory Compliance Self Service Enterprise Social Identity Integration Cloud Applications and Services 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 4
    5. 5. Barriers to adoption • Need to leverage existing IDM investment • Uncertain funding • Lack of in-house resources • Scalability concerns • Architectural complexity • Service outage 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 5
    6. 6. Co-existence based upgrade toleverage Sun investment and benefitfrom new Oracle 11gR2 PlatformcapabilitiesPhilip Black, Security Director, IAM 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 6
    7. 7. About Supervalu Premier Nationwide Grocer: • 2,200 corporate retail stores • 14 banners • 2500 franchise/independent grocers • Distribution and retail services • Dedicated to serving a wide range of customers 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 7
    8. 8. Supervalu IAM Identity Customer Base • 180,000 B2E identities • 60,000 B2B identities • 500,000 B2C identities 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 8
    9. 9. Business Drivers Operational Costs User Productivity Compliance Enforcement Customer Satisfaction (Access Certification) (Access Request) Identity Fast and Simple Open Standards Platform Customer Experience Identity Cert/Identity Bridge 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 9
    10. 10. Process Overview 1. Install Oracle Identity Manager / Oracle Identity Analytics 2. Setup an Identity Bridge from Hub City Media 3. Migrate Self Service workflows to OIM 4. Configure Access Request Interface in OIM 5. Hub City Media Identity Cert Integration with OIA 6. Migrate connectors to OIM one at a time behind the scenes 7. Retire Oracle Waveset 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 10
    11. 11. Architecture Enabler IdentityBridge 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 11
    12. 12. Migration Architecture 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 12
    13. 13. Migration Architecture Move Connectors to OIM while using Identity Bridge 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 13
    14. 14. Migration continued OIM as Primary System for End User 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 14
    15. 15. Migration Summary • Allows deployment of new functionality during migration • HCM’s Identity Cert and ISAR • Customer sets the pace of migration • Identity Bridge Enables new functionality and reduces complexity of a hard cutover from SIM to OIM • Customer must migrate eventually - no hard deadlines • Coexistence migration is a sound option for large deployments • Reduces deployment impact to the organization - Lower Risk 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 15
    16. 16. Build a platform roadmap Business vs. Application Compliance Owners vs. Risk Quick win vs. Timeline and long term Deliverable strategy Balance priorities with opportunities 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 16
    17. 17. Assess The Business Opportunity Security Efficiency Scale 3X  Compliance  User Productivity  New Customers  Internal Governance  Operational Cost  Quality of Service  Security Risk  Opportunity Cost 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 17
    18. 18. A Complete IDM Platform Identity Lifecycle Management & 360 visibility Governance Regular & Privileged identities Complete access control & SSO Fraud Detection Access Converged Policy Administration & Management Control Fraud Detection Directory LDAP, Virtualization & Meta-directory Services Unified Administration & Management 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 18
    19. 19. Oracle Identity Management 11gR2 Simplified Experience Modernized Platform Cloud, Mobile and Social Extreme Scale Faster Lower Clear Upgrade Path Deployment TCO Securing the New Digital Experience 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 19
    20. 20. Platform Architectural BenefitsShared Connectors Less Customization Faster ImplementationCentralized Policies Standardize Access Reduced RiskWorkflow Integration Automated Process Improved ComplianceCommon Data Model Standard Reporting Fewer Data Stores 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 20
    21. 21. Platform Approach Reduces Cost Benefits Platform Advantage Increased End- • Emergency Access • 11% faster User Productivity • End-user Self Service • 30% faster Reduced Risk • Suspend/revoke/de-provision 48% Cost Savings end user access • Bullet • 46% faster Enhanced • Integrate a new app faster Agility with the IAM infrastructure • 64% faster 14% Fewer instances of unauthorized access • Integrate a new end user role faster into the solution • 73% faster Enhanced • Reduces unauthorized • 14% fewer Security and access • 35% fewer 35% Fewer Audit Deficiencies Compliance • Reduces audit deficiencies Reduced Total Cost • Reduces total cost of IAM • 48% lower initiatives Source: Aberdeen “Analyzing Point Solutions vs. Platform” 2011 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 21
    22. 22. 2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 22
    23. 23. www.oracle.com/Identity www.facebook.com/OracleIDM www.twitter.com/OracleIDM blogs.oracle.com/OracleIDM2012 ISACA Webinar Program. © 2012 ISACA. All rights reserved. 23

    ×