Oracle Mobile Security Suite

337 views

Published on

Oracle Mobile Security Suite

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
337
On SlideShare
0
From Embeds
0
Number of Embeds
31
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Oracle Mobile Security Suite

  1. 1. Oracle Mobile Security Suite René Klomp 6 mei 2014
  2. 2. 2 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
  3. 3. 3 Agenda  Mobile Security Market  Oracle Mobile Security Vision  Identity Management and Mobile Security  Product Overview and Roadmap  Q&A
  4. 4. 4 Agenda  Mobile Security Market  Oracle Mobile Security Vision  Identity Management and Mobile Security  Product Overview and Roadmap  Q&A
  5. 5. 5 Organizations Struggle to Secure Mobile Devices BYOD Is The Norm And Security Measures Are Inadequate 85% of organizations allow employees to bring their own devices to work. - IDG Research Services 85% More than 50% of organizations rely on their users to protect personally owned devices. - SANS Institute Research Survey >50% Over 70% of mobile professionals will conduct their work on personal smart devices by 2018. - Forrester >70%
  6. 6. 6 How To Secure Corporate Data In A BYOD World?
  7. 7. 7 How To Secure Corporate Data In A BYOD World? Mobile Device Management: Lock down the phone and treat it as a corporate asset – no personal data
  8. 8. 8 Mobile Application Management: Create a secure container that separates corporate data and apps from personal How To Secure Corporate Data In A BYOD World?
  9. 9. 9 Agenda  Mobile Security Market  Oracle Mobile Security Vision  Identity Management and Mobile Security  Product Overview and Roadmap  Q&A
  10. 10. 10 Oracle Mobile Solutions CRM MOBILE APPS MOBILE PLATFORM MOBILE SECURITY ERP B2B
  11. 11. 11 Maximize existing IT investments  Develop cross platform & multi channel applications  Integrate data and services across the Enterprise and Mobile devices  Secure information uniformly across all layers of enterprise and mobile apps  Deploy & Manage cloud and on- premises for multi-channel delivery One Platform, Any App, Any Data, Any Device – Secure Oracle Mobile Suite ON-PREMISE PACKAGED APPLICATIONS CUSTOM APPLICATIONS CLOUD Multi-Channel NATIVE, WEB, HYBRID SECURE DEVELOP INTEGRATE MANAGE DEPLOY ORACLE MOBILE PLATFORM
  12. 12. 12 Agenda  Mobile Security Market  Oracle Mobile Security Vision  Identity Management and Mobile Security  Product Overview and Roadmap  Q&A
  13. 13. 13 THE EXTENDED ENTERPRISE A PLATFORM FOR ENTERPRISE, CLOUD & MOBILE One Identity Platform
  14. 14. 14 THE NEW IDENTITY MANAGEMENT DIRECTORY SERVICES IDENTITY GOVERNANCE ACCESS MANAGEMENT To Handle 100s of Millions of Users Supporting Mobile, Social and Cloud With BYOD Support OPEN, INTEGRATED, BEST OF BREED
  15. 15. 15 46% Cost Savings Source: Aberdeen “Analyzing point solutions vs. platform” 2011 48% More Responsive 35% Fewer Audit Deficiencies TAKING A REDUCES INCREASES IMPROVES
  16. 16. 16 Agenda  Mobile Security Market  Oracle Mobile Security Vision  Identity Management and Mobile Security  Product Overview and Roadmap  Q&A
  17. 17. 17 What Customers Have Told Us • Mobile is a new threat vector • BYOD poses security risks • IT wants security while employees want user- experience • Consumerization of IT is pushing the limits of enterprise productivity • Infrastructure siloes are increasing IT complexity Secure Mobile Access to Enterprise Apps & Content
  18. 18. 18 Oracle’s STRATEGY CONTAINER EXPERIENCECONTROL Isolate corporate data, support remote wipe, restrict data transfer Secure applications & communication, corporate application store Role based access, self service request, sign-on, fraud detection MOBILE SECURITY SUITE
  19. 19. 19 Oracle’s Mobile Security Plan Extending IDM services • Common users, roles, policies, access request, cert etc. • SSO and authorization for native and browser apps • Risk/policy based step up and strong authentication • RESTful Identity Services
  20. 20. 20 Oracle’s Mobile Security Plan Secure Container for App Security and Control • Separate, protect and wipe corporate applications and data • Strict policies to restrict users from viewing/moving data out of container • Consistent support across multiple mobile platforms
  21. 21. 21 Oracle’s Mobile Security Plan Secure Access, Device and App Management • Secure communication with enterprise application servers • No VPN and no CPU and network overhead (like IPSEC) • Support for 3rd party and social identities • Provide context-driven, risk-aware access to enterprise apps • Enterprise app store/catalog • Device enrollment and provisioning • Prevent rogue apps, access to internal network only for white-listed apps
  22. 22. 22 Oracle Mobile Solution Secure Mobile Workspace - Separate personal and corporate data Authentication / SSO Data at Rest Encryption Data in Transit Encryption DLP Policy Browser PIM (email, calendar, contacts, tasks, notes) Doc Editor App Catalog File Manager Secure Intranet Secure Mail Secure Files App Distribution Secure Apps Enterprise Apps
  23. 23. 23 Secure access with App Tunnel • Identity and remote access coupled • Prevent rogue apps • Access to internal network only for white-listed apps • Unlike IPSEC, no CPU and network overhead No VPN Required
  24. 24. 24 Native App Protection • App Containerization adds security layer for bespoke and COTs apps after development • Decouple security deployment & app development • Injection-based approach. No SDK. • SSO, secure access and DLP enforcement Delegated security model with app containerization
  25. 25. Demo
  26. 26. 26 Oracle Mobile Security Suite Steady State Architecture Corporate DMZ Corporate Network Oracle Access Manager With Mobile & SocialOAM Protected Resources HTTP/REST/SOAP/OAUTH SOAP/REST and Legacy Web Services Oracle Mobile Access Server Oracle Identity Governance with Mobile Application Mgmt Apple/Google Push Notification Device & Policy Registry (OID/OUD) Oracle API Gateway App Tunnel REST/Mobile Security
  27. 27. 27 Oracle Identity Management Extending the Platform with a Discreet Mobile Security Solution Identity Governance Access Request Approval Workflows Automated Provisioning HR Reconciliation Access Certification and SOD Role Lifecycle Management Privileged Account Management User Management & Self Service Entitlement Catalogue/App Store Access Management Web Single Sign-on Federation Social Identity Access Externalized Authorizations SOA and API Security Integrated ESSO Token Services Mobile App Access Management Secure Mobile Gateway Access Management LDAP Storage/ Virtual/ Meta Directory Device Store Directory Services System Management and Monitoring Management Device and Container Management Secure Container MobileSecurity
  28. 28. 29 Agenda  Mobile Security Market  Oracle Mobile Security Vision  Identity Management and Mobile Security  Product Overview and Roadmap  Q&A
  29. 29. 30 Questions
  30. 30. 31 Join the Community Twitter twitter.com/OracleIDM Facebook facebook.com/OracleSecurity Oracle Blogs Blogs.oracle.com/OracleIDM Oracle IdM Website oracle.com/Identity
  31. 31. 32
  32. 32. 33

×