Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Round table guide

1,979 views

Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Round table guide

  1. 1. <Insert Picture Here>External Authorization Round Table DiscussionVijay Chauhan, Head of Access Management ,BarclaysMarc Boroditsky, VP Product Management, OracleRoger Wigenstam, Sr. Director Product Management, Oracle
  2. 2. This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.©2012 Oracle Corporation
  3. 3. Agenda • Opening Remarks • Barclays Capital Case • Round Table Discussion • Road Map©2012 Oracle Corporation
  4. 4. Securing Data & Applications Marc Boroditsky, VPProduct Management©2012 Oracle Corporation
  5. 5. Focus on: Securing Data & Applications Context Aware External Authorization • ~50% of mission critical apps home grown • Increased audit & regulatory pressure • Increased focus on data security • Complex business policy • Brittle security & change control©2012 Oracle Corporation
  6. 6. Business Landscape Applying External Authorization Cross Industry Content Collaboration Privacy Confidentiality Regulations Audit©2012 Oracle Corporation
  7. 7. Entitlements Server Product Overview Roger Wigenstam, Sr. Director Product Management©2012 Oracle Corporation
  8. 8. What is Entitlements Server Dynamic Authorization to Data & Applications • SOA Security • Web Access Control • Application Transactions • Relational Database Information • Portals©2012 Oracle Corporation
  9. 9. Real-Time Authorization Sub-millisecond Authorization Response Time • Massively scalable External Authorization Management • Scales easily to large number of protected resources • Hundreds of millions of users • Hundreds of thousands of roles • From small workgroups to mission-critical deployments • Authorization checks enforced with real-time latency©2012 Oracle Corporation
  10. 10. Entitlements Server: Part of Oracle Identity Platform Complete, Open and Integrated Identity Governance Access Management Directory Services • Password Management • Single Sign-On & Federation • LDAP Storage • Self-Service Request & Approval • Web Services Security • Virtualized Identity Access • Roles based User Provisioning • Authentication & Fraud Prevention • LDAP Synchronization • Analytics, Policy Monitoring • Authorization & Entitlements • Next Generation (Java) Directory • Risk-based Access Certification • Access from Mobile Devices Platform Security Services Identity Services for Developers©2012 Oracle Corporation
  11. 11. Oracle Entitlements Server Summary Strategic Heterogeneous Leading • Oracle’s strategic • Standards based • Most mature solution authorization solution • Multi-language support • Largest install base • Embedded in many of our Applications • Multi-middleware • Embedded in Identity • Multi-database Platform©2012 Oracle Corporation
  12. 12. www.oracle.com/Identity www.facebook.com/OracleIDM www.twitter.com/OracleIDM blogs.oracle.com/OracleIDM©2012 Oracle Corporation

×