SlideShare a Scribd company logo
1 of 11
The Identity of Things
Securing The Internet of Everything
Amit Jasuja
Senior Vice President
Identity Management & Security, Oracle
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.2
The following is intended to outline our general product direction.
It is intended for information purposes only, and may not be
incorporated into any contract. It is not a commitment to deliver
any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, and
timing of any features or functionality described for Oracle’s
products remains at the sole discretion of Oracle.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.3
TODAY
A PLATFORM FOR ENTERPRISE, CLOUD & MOBILE
GOVERNANCE
MANAGEMENT
SERVICES
USER
AUTHENTICATION
LOCATION
DATA
EXTREME
SCALE
LOW
TCO
INTEGRATED
INTEROPERABLE
DEVICE
AUTHN
NAMING
SERVICES
HOST
ACCESS
CONTROL
AP
P
THOUSANDS MILLIONS BILLIONS 10s of BILLIONS
VIRTUAL
DIRECTORY
META
DIRECTORY
LDAP
DIRECTORY
IDENTITY
FEDERATION
EXTERNAL
AUTHORIZATION
ENTERPRISE&
WEBSINGLE
SIGN-ON
MOBILE&SOCIAL
SIGN-ON
FRAUD
DETECTION
EMPLOYEES
CONTRACTORS
& PARTNERS
CUSTOMERS
& PROSPECTS
OPERATING
SYSTEMS
DIRECTORY
SERVICES
A
P
P
S
APPLICATIONS
COMMON REPOSITORY
DATABASES SINGLE
USER
VIEW
ACCESS
REQUEST
ENTITLEMENT
CATALOG PRIVILEGED
ACCOUNT
MANAGEMENT
ACCESS
CERTIFICATION
PRIVILIGED
ACCOUNTS
USER
PROVISIONING
CERTIFICATION
REVIEW
ACCESS
REQUEST
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.4
LOOKING AHEAD
MORE DEVICES THAN WE CAN PREDICT
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.5
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.6
DEVICES BY
2020
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.6
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.7
A FEW EXAMPLES
EVERY INDUSTRY AND MARKET
Pacemakers &
Insulin Pumps
Aircraft Engines &
Automobiles
Intelligent
Resource Utilization
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.8
More Social Sign-on
& Style of Interaction
Devices Trust People
People Trust Devices
High Scale
Reliable Interaction
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.8
NEW USE CASES
REDEFINING IDENTITY & TRUST
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.9
NEW SECURITY REQUIREMENTS
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.10 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.10
SINGLE PLATFORM FOR ALL DEVICES
Authorization
Authentication
Dynamic User
Volume
Device
Management
Policy
Controls
Sensors
Meters
Appliances
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.11
WE CAN
• Schedule a workshop
• Connect with industry peers
• Perform an assessment

More Related Content

What's hot

Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Eve Maler
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CloudIDSummit
 
Australian CFOs in Jeopardy: What you don't know about software license compl...
Australian CFOs in Jeopardy: What you don't know about software license compl...Australian CFOs in Jeopardy: What you don't know about software license compl...
Australian CFOs in Jeopardy: What you don't know about software license compl...Flexera
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1OracleIDM
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Ping Identity
 
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsUser-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsForgeRock
 
Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Eyal Estrin
 
Mobile SSO using NAPPS
Mobile SSO using NAPPSMobile SSO using NAPPS
Mobile SSO using NAPPSAshish Jain
 
CIS14: User-Managed Access
CIS14: User-Managed AccessCIS14: User-Managed Access
CIS14: User-Managed AccessCloudIDSummit
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCloudIDSummit
 
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the ClientCIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the ClientCloudIDSummit
 
Celeno - Smart, Managed Wi-Fi
Celeno - Smart, Managed Wi-FiCeleno - Smart, Managed Wi-Fi
Celeno - Smart, Managed Wi-FiCeleno2018
 
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...ForgeRock
 
Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009Dira Sabrina
 
Ambient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiAmbient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiWithTheBest
 
MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013Ashish Jain
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareSecureAuth
 
E20190227[EDLS]インテル®︎FPGAによるエッジAI
E20190227[EDLS]インテル®︎FPGAによるエッジAIE20190227[EDLS]インテル®︎FPGAによるエッジAI
E20190227[EDLS]インテル®︎FPGAによるエッジAILeapMind Inc
 

What's hot (19)

Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
Consumerizing Industrial IoT Access Control: Using UMA to Add Privacy and Usa...
 
CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?CIS14: Are the Enterprises Ready for Identity of Everything?
CIS14: Are the Enterprises Ready for Identity of Everything?
 
Australian CFOs in Jeopardy: What you don't know about software license compl...
Australian CFOs in Jeopardy: What you don't know about software license compl...Australian CFOs in Jeopardy: What you don't know about software license compl...
Australian CFOs in Jeopardy: What you don't know about software license compl...
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract ContextsUser-Managed Access: Why and How? - Access Control in Digital Contract Contexts
User-Managed Access: Why and How? - Access Control in Digital Contract Contexts
 
Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020Cloud Security in SaaS Era 2020
Cloud Security in SaaS Era 2020
 
Mobile SSO using NAPPS
Mobile SSO using NAPPSMobile SSO using NAPPS
Mobile SSO using NAPPS
 
CIS14: User-Managed Access
CIS14: User-Managed AccessCIS14: User-Managed Access
CIS14: User-Managed Access
 
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve WilsonCIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
CIS14: Authentication Family Tree (1.1.1 annotated) - Steve Wilson
 
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the ClientCIS13: Mobile Single Sign-On: Extending SSO Out to the Client
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
 
PT on CF
PT on CFPT on CF
PT on CF
 
Celeno - Smart, Managed Wi-Fi
Celeno - Smart, Managed Wi-FiCeleno - Smart, Managed Wi-Fi
Celeno - Smart, Managed Wi-Fi
 
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
Sydney Identity Summit: Doing Authorisation, Consent and Delegation Right wit...
 
Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009Mii Oracle Biz Map 2009
Mii Oracle Biz Map 2009
 
Ambient Intelligence - Parham Beheshti
Ambient Intelligence - Parham BeheshtiAmbient Intelligence - Parham Beheshti
Ambient Intelligence - Parham Beheshti
 
MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013MDM/MAM/MIM Workshop - CIS 2013
MDM/MAM/MIM Workshop - CIS 2013
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 
E20190227[EDLS]インテル®︎FPGAによるエッジAI
E20190227[EDLS]インテル®︎FPGAによるエッジAIE20190227[EDLS]インテル®︎FPGAによるエッジAI
E20190227[EDLS]インテル®︎FPGAによるエッジAI
 

Viewers also liked

Year 7 websites evaluation
Year 7 websites evaluationYear 7 websites evaluation
Year 7 websites evaluationfrances20
 
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014Awards Ceremony: Top Awards, Romain Rolland FLS, 2014
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014Tanya Madjarova
 
Way storm 行動廣告簡介(games0124)
Way storm 行動廣告簡介(games0124)Way storm 行動廣告簡介(games0124)
Way storm 行動廣告簡介(games0124)MaVis Tseng
 
Wkce prep -graphs and data
Wkce prep -graphs and dataWkce prep -graphs and data
Wkce prep -graphs and dataJoe Schauwitzer
 
Análise do impacto da futura PEC de limitação de gastos da União
Análise do impacto da futura PEC de limitação de gastos da UniãoAnálise do impacto da futura PEC de limitação de gastos da União
Análise do impacto da futura PEC de limitação de gastos da UniãoMiguel Rosario
 
Cameco and indigenous development case study
Cameco and indigenous development   case studyCameco and indigenous development   case study
Cameco and indigenous development case studyWayne Dunn
 
10 fa it_security-1
10 fa it_security-110 fa it_security-1
10 fa it_security-1adiloki
 
HTML an introduction
HTML an introductionHTML an introduction
HTML an introductionNiamh Foley
 
Reunió d'aula 4t B Curs 2014-15 Escola Consol Ferré
Reunió d'aula 4t B Curs 2014-15 Escola Consol FerréReunió d'aula 4t B Curs 2014-15 Escola Consol Ferré
Reunió d'aula 4t B Curs 2014-15 Escola Consol Ferréangiarrufat
 
I made my blog my business
I made my blog my businessI made my blog my business
I made my blog my businessBrian Krogsgard
 
Elements, Compounds & Mixtures Spring -2012
Elements, Compounds & Mixtures Spring -2012Elements, Compounds & Mixtures Spring -2012
Elements, Compounds & Mixtures Spring -2012jmori1
 
Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014
Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014
Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014Tanya Madjarova
 
What's Your Story? Creating Effective Narratives
What's Your Story? Creating Effective NarrativesWhat's Your Story? Creating Effective Narratives
What's Your Story? Creating Effective Narrativesmarinabooh
 
Power Notes Atomic Structure Day 3
Power Notes   Atomic Structure Day 3Power Notes   Atomic Structure Day 3
Power Notes Atomic Structure Day 3jmori1
 
Cultivating Innovation
Cultivating InnovationCultivating Innovation
Cultivating InnovationSarah Prevette
 

Viewers also liked (20)

Year 7 websites evaluation
Year 7 websites evaluationYear 7 websites evaluation
Year 7 websites evaluation
 
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014Awards Ceremony: Top Awards, Romain Rolland FLS, 2014
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014
 
Way storm 行動廣告簡介(games0124)
Way storm 行動廣告簡介(games0124)Way storm 行動廣告簡介(games0124)
Way storm 行動廣告簡介(games0124)
 
Wkce prep -graphs and data
Wkce prep -graphs and dataWkce prep -graphs and data
Wkce prep -graphs and data
 
Análise do impacto da futura PEC de limitação de gastos da União
Análise do impacto da futura PEC de limitação de gastos da UniãoAnálise do impacto da futura PEC de limitação de gastos da União
Análise do impacto da futura PEC de limitação de gastos da União
 
3words pp
3words pp3words pp
3words pp
 
Moodle - Kuisioner
Moodle - KuisionerMoodle - Kuisioner
Moodle - Kuisioner
 
Cameco and indigenous development case study
Cameco and indigenous development   case studyCameco and indigenous development   case study
Cameco and indigenous development case study
 
10 fa it_security-1
10 fa it_security-110 fa it_security-1
10 fa it_security-1
 
How to hire a relief Dr without getting into Jeopardy!
How to hire a relief Dr without getting into Jeopardy!How to hire a relief Dr without getting into Jeopardy!
How to hire a relief Dr without getting into Jeopardy!
 
HTML an introduction
HTML an introductionHTML an introduction
HTML an introduction
 
Reunió d'aula 4t B Curs 2014-15 Escola Consol Ferré
Reunió d'aula 4t B Curs 2014-15 Escola Consol FerréReunió d'aula 4t B Curs 2014-15 Escola Consol Ferré
Reunió d'aula 4t B Curs 2014-15 Escola Consol Ferré
 
I made my blog my business
I made my blog my businessI made my blog my business
I made my blog my business
 
Elements, Compounds & Mixtures Spring -2012
Elements, Compounds & Mixtures Spring -2012Elements, Compounds & Mixtures Spring -2012
Elements, Compounds & Mixtures Spring -2012
 
Empowering Marketing
Empowering MarketingEmpowering Marketing
Empowering Marketing
 
Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014
Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014
Awards Ceremony: K.C.'s Nominations, Romain Rolland FLS, 2014
 
What's Your Story? Creating Effective Narratives
What's Your Story? Creating Effective NarrativesWhat's Your Story? Creating Effective Narratives
What's Your Story? Creating Effective Narratives
 
Power Notes Atomic Structure Day 3
Power Notes   Atomic Structure Day 3Power Notes   Atomic Structure Day 3
Power Notes Atomic Structure Day 3
 
Real ch.2 a (1)
Real ch.2 a (1)Real ch.2 a (1)
Real ch.2 a (1)
 
Cultivating Innovation
Cultivating InnovationCultivating Innovation
Cultivating Innovation
 

Similar to Identityofthings amitjasuj av10

Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Securing Mobile Device Access
Securing Mobile Device AccessSecuring Mobile Device Access
Securing Mobile Device AccessArtur Alves
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Digital enablement and experience
Digital enablement and experienceDigital enablement and experience
Digital enablement and experienceAnders Lundqvist
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Cisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout SessionCisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout SessionBasil Hashem
 
Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cSecurity Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cTroy Kitch
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...Dr. Wilfred Lin (Ph.D.)
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation Delivery Centric
 
CSPA Keynote: BLOCKCHAIN for Enterprise
CSPA Keynote: BLOCKCHAIN for EnterpriseCSPA Keynote: BLOCKCHAIN for Enterprise
CSPA Keynote: BLOCKCHAIN for EnterpriseDavid Haimes
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Intelligent APIs for Big Data & IoT Create customized data views for mobile,...
Intelligent APIs for Big Data & IoT  Create customized data views for mobile,...Intelligent APIs for Big Data & IoT  Create customized data views for mobile,...
Intelligent APIs for Big Data & IoT Create customized data views for mobile,...CA API Management
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraLuca Martelli
 
Intel SaaS Security Playbook
Intel SaaS Security PlaybookIntel SaaS Security Playbook
Intel SaaS Security PlaybookIntel IT Center
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights finalSal Marcus
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Pronq by HP
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesNowSecure
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 

Similar to Identityofthings amitjasuj av10 (20)

Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Securing Mobile Device Access
Securing Mobile Device AccessSecuring Mobile Device Access
Securing Mobile Device Access
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Apouc 2014-business-analytics-and-big-data
Apouc 2014-business-analytics-and-big-dataApouc 2014-business-analytics-and-big-data
Apouc 2014-business-analytics-and-big-data
 
Digital enablement and experience
Digital enablement and experienceDigital enablement and experience
Digital enablement and experience
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Cisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout SessionCisco IoT World Forum 2014: Airwatch Breakout Session
Cisco IoT World Forum 2014: Airwatch Breakout Session
 
Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cSecurity Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12c
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
CSPA Keynote: BLOCKCHAIN for Enterprise
CSPA Keynote: BLOCKCHAIN for EnterpriseCSPA Keynote: BLOCKCHAIN for Enterprise
CSPA Keynote: BLOCKCHAIN for Enterprise
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Intelligent APIs for Big Data & IoT Create customized data views for mobile,...
Intelligent APIs for Big Data & IoT  Create customized data views for mobile,...Intelligent APIs for Big Data & IoT  Create customized data views for mobile,...
Intelligent APIs for Big Data & IoT Create customized data views for mobile,...
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
 
Intel SaaS Security Playbook
Intel SaaS Security PlaybookIntel SaaS Security Playbook
Intel SaaS Security Playbook
 
Tdwi austin simplifying big data delivery to drive new insights final
Tdwi austin   simplifying big data delivery to drive new insights finalTdwi austin   simplifying big data delivery to drive new insights final
Tdwi austin simplifying big data delivery to drive new insights final
 
Mobility Why? What does it means to us?
Mobility Why? What does it means to us?Mobility Why? What does it means to us?
Mobility Why? What does it means to us?
 
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated IndustriesCASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
CASE STUDY - Ironclad Messaging & Secure App Dev for Regulated Industries
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 

More from OracleIDM

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12OracleIDM
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2OracleIDM
 

More from OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Identityofthings amitjasuj av10

  • 1. The Identity of Things Securing The Internet of Everything Amit Jasuja Senior Vice President Identity Management & Security, Oracle
  • 2. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.2 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
  • 3. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.3 TODAY A PLATFORM FOR ENTERPRISE, CLOUD & MOBILE GOVERNANCE MANAGEMENT SERVICES USER AUTHENTICATION LOCATION DATA EXTREME SCALE LOW TCO INTEGRATED INTEROPERABLE DEVICE AUTHN NAMING SERVICES HOST ACCESS CONTROL AP P THOUSANDS MILLIONS BILLIONS 10s of BILLIONS VIRTUAL DIRECTORY META DIRECTORY LDAP DIRECTORY IDENTITY FEDERATION EXTERNAL AUTHORIZATION ENTERPRISE& WEBSINGLE SIGN-ON MOBILE&SOCIAL SIGN-ON FRAUD DETECTION EMPLOYEES CONTRACTORS & PARTNERS CUSTOMERS & PROSPECTS OPERATING SYSTEMS DIRECTORY SERVICES A P P S APPLICATIONS COMMON REPOSITORY DATABASES SINGLE USER VIEW ACCESS REQUEST ENTITLEMENT CATALOG PRIVILEGED ACCOUNT MANAGEMENT ACCESS CERTIFICATION PRIVILIGED ACCOUNTS USER PROVISIONING CERTIFICATION REVIEW ACCESS REQUEST
  • 4. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.4 LOOKING AHEAD MORE DEVICES THAN WE CAN PREDICT
  • 5. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.5
  • 6. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.6 DEVICES BY 2020 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.6
  • 7. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.7 A FEW EXAMPLES EVERY INDUSTRY AND MARKET Pacemakers & Insulin Pumps Aircraft Engines & Automobiles Intelligent Resource Utilization
  • 8. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.8 More Social Sign-on & Style of Interaction Devices Trust People People Trust Devices High Scale Reliable Interaction Copyright © 2013, Oracle and/or its affiliates. All rights reserved.8 NEW USE CASES REDEFINING IDENTITY & TRUST
  • 9. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.9 NEW SECURITY REQUIREMENTS
  • 10. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.10 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.10 SINGLE PLATFORM FOR ALL DEVICES Authorization Authentication Dynamic User Volume Device Management Policy Controls Sensors Meters Appliances
  • 11. Copyright © 2013, Oracle and/or its affiliates. All rights reserved.11 WE CAN • Schedule a workshop • Connect with industry peers • Perform an assessment

Editor's Notes

  1. IT is facing a lot of challenges. It might seem tough to visualize the solution, given all the demands you’re trying to meet.IT Operations is already required to “do more with less.”You may be facing a reduction in budgets and staffing, while also trying to deal withincreasing requirements on the IT infrastructure.Meanwhile, everyone expects you to have the agility necessary to meet dynamic business needs quickly and effectivelyBasically IT must be able to respond to ever evolving business needs
  2. IT is facing a lot of challenges. It might seem tough to visualize the solution, given all the demands you’re trying to meet.IT Operations is already required to “do more with less.”You may be facing a reduction in budgets and staffing, while also trying to deal withincreasing requirements on the IT infrastructure.Meanwhile, everyone expects you to have the agility necessary to meet dynamic business needs quickly and effectivelyBasically IT must be able to respond to ever evolving business needs
  3. The growth of mobile internet traffic is growing rapidly, driven by strong growth in mobile device marketPeople are getting information from new sources, such as social networks, and they are able to access that information anywhere they go on their mobile devices
  4. There are now 1.1B Global 3G Mobile Subscribers, ramping quickly at 37% per year. This compares with the approximately 6.1 billion global mobile phone subscribers, so you can see there is tremendous upside growth potential with smartphones as well.3G includes CDMA 1x EV-DO and Rev. A/B, WCDMA, HSPA; One user may have multiple mobile subscriptions and may be counted as multiple subscriber (per Source: Informa WCIS+.)
  5. There are three components to WebCenterContent gives enterprises a unified and intelligent system for managing their content and integrating with applicationsPortal provides a single point of access to this content with self-service portals and application dashboards and delivers intuitive user experiences for the enterprise that are seamlessly integrated with your enterprise applications And Sites empowers marketers to put that content to work in the form of contextually relevant and interactive digital experiences for customers Each of these tools comes with its own set of features and benefits—but, as I’m sure you can imagine, they are designed to work together
  6. Just to provide a pragmatic picture of the experience and highlight the risk. Here are four experiences you need to think about.EMAIL –- This is a key point for identity theft and phishing attacks Build RSA was an example of this WEBSITE Many customers use the website as their primary source of entry Build Watch for cross site scripting m- Bank of fiduram in italy is a good exampleMOBILE Local passwords and data are stored there BUILD Hackers can crack this in 360 seconds SOCIAL Trust is the big challenge BUILD A recent facebook malware stole credit card data For the phising scam – Oracle OAAM can provide context aware security to detect these types of anomalies.For the cross site scripting – OAAM can monitor the HTTP session to detect fraud For the Mobile challenge – Oracle OAM in IDM R2 does mobile sign on to secure mobile apps so passwords are not stored locallyFor Social trust challenge – Oracle OAM in IDM R2 provides support for OAUTH to trust sign on from facebook – twitter etc.
  7. Slide Transition: By combining many sources of data, you might even turn ordinary intelligence into extraordinary insights. Consider this example:Today, airlines use sensor data generated by jet engines to monitor engine performance and anticipate maintenance needs, reducing costly flight cancellations. [click]Imagine if you could aggregate sensor data from the entire airlines industry, you would have unparalleled insight into engine performance. This provides an opportunity to dramatically increase engine fuel efficiency – and reduce the airline industry’s biggest cost.