The Identity of Things
Securing The Internet of Everything
Amit Jasuja
Senior Vice President
Identity Management & Security, Oracle
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.2
The following is intended to outline our general product direction.
It is intended for information purposes only, and may not be
incorporated into any contract. It is not a commitment to deliver
any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, and
timing of any features or functionality described for Oracle’s
products remains at the sole discretion of Oracle.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.3
TODAY
A PLATFORM FOR ENTERPRISE, CLOUD & MOBILE
GOVERNANCE
MANAGEMENT
SERVICES
USER
AUTHENTICATION
LOCATION
DATA
EXTREME
SCALE
LOW
TCO
INTEGRATED
INTEROPERABLE
DEVICE
AUTHN
NAMING
SERVICES
HOST
ACCESS
CONTROL
AP
P
THOUSANDS MILLIONS BILLIONS 10s of BILLIONS
VIRTUAL
DIRECTORY
META
DIRECTORY
LDAP
DIRECTORY
IDENTITY
FEDERATION
EXTERNAL
AUTHORIZATION
ENTERPRISE&
WEBSINGLE
SIGN-ON
MOBILE&SOCIAL
SIGN-ON
FRAUD
DETECTION
EMPLOYEES
CONTRACTORS
& PARTNERS
CUSTOMERS
& PROSPECTS
OPERATING
SYSTEMS
DIRECTORY
SERVICES
A
P
P
S
APPLICATIONS
COMMON REPOSITORY
DATABASES SINGLE
USER
VIEW
ACCESS
REQUEST
ENTITLEMENT
CATALOG PRIVILEGED
ACCOUNT
MANAGEMENT
ACCESS
CERTIFICATION
PRIVILIGED
ACCOUNTS
USER
PROVISIONING
CERTIFICATION
REVIEW
ACCESS
REQUEST
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.4
LOOKING AHEAD
MORE DEVICES THAN WE CAN PREDICT
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.5
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.6
DEVICES BY
2020
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.6
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.7
A FEW EXAMPLES
EVERY INDUSTRY AND MARKET
Pacemakers &
Insulin Pumps
Aircraft Engines &
Automobiles
Intelligent
Resource Utilization
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.8
More Social Sign-on
& Style of Interaction
Devices Trust People
People Trust Devices
High Scale
Reliable Interaction
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.8
NEW USE CASES
REDEFINING IDENTITY & TRUST
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.9
NEW SECURITY REQUIREMENTS
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.10 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.10
SINGLE PLATFORM FOR ALL DEVICES
Authorization
Authentication
Dynamic User
Volume
Device
Management
Policy
Controls
Sensors
Meters
Appliances
Copyright © 2013, Oracle and/or its affiliates. All rights reserved.11
WE CAN
• Schedule a workshop
• Connect with industry peers
• Perform an assessment

Identityofthings amitjasuj av10

  • 1.
    The Identity ofThings Securing The Internet of Everything Amit Jasuja Senior Vice President Identity Management & Security, Oracle
  • 2.
    Copyright © 2013,Oracle and/or its affiliates. All rights reserved.2 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
  • 3.
    Copyright © 2013,Oracle and/or its affiliates. All rights reserved.3 TODAY A PLATFORM FOR ENTERPRISE, CLOUD & MOBILE GOVERNANCE MANAGEMENT SERVICES USER AUTHENTICATION LOCATION DATA EXTREME SCALE LOW TCO INTEGRATED INTEROPERABLE DEVICE AUTHN NAMING SERVICES HOST ACCESS CONTROL AP P THOUSANDS MILLIONS BILLIONS 10s of BILLIONS VIRTUAL DIRECTORY META DIRECTORY LDAP DIRECTORY IDENTITY FEDERATION EXTERNAL AUTHORIZATION ENTERPRISE& WEBSINGLE SIGN-ON MOBILE&SOCIAL SIGN-ON FRAUD DETECTION EMPLOYEES CONTRACTORS & PARTNERS CUSTOMERS & PROSPECTS OPERATING SYSTEMS DIRECTORY SERVICES A P P S APPLICATIONS COMMON REPOSITORY DATABASES SINGLE USER VIEW ACCESS REQUEST ENTITLEMENT CATALOG PRIVILEGED ACCOUNT MANAGEMENT ACCESS CERTIFICATION PRIVILIGED ACCOUNTS USER PROVISIONING CERTIFICATION REVIEW ACCESS REQUEST
  • 4.
    Copyright © 2013,Oracle and/or its affiliates. All rights reserved.4 LOOKING AHEAD MORE DEVICES THAN WE CAN PREDICT
  • 5.
    Copyright © 2013,Oracle and/or its affiliates. All rights reserved.5
  • 6.
    Copyright © 2013,Oracle and/or its affiliates. All rights reserved.6 DEVICES BY 2020 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.6
  • 7.
    Copyright © 2013,Oracle and/or its affiliates. All rights reserved.7 A FEW EXAMPLES EVERY INDUSTRY AND MARKET Pacemakers & Insulin Pumps Aircraft Engines & Automobiles Intelligent Resource Utilization
  • 8.
    Copyright © 2013,Oracle and/or its affiliates. All rights reserved.8 More Social Sign-on & Style of Interaction Devices Trust People People Trust Devices High Scale Reliable Interaction Copyright © 2013, Oracle and/or its affiliates. All rights reserved.8 NEW USE CASES REDEFINING IDENTITY & TRUST
  • 9.
    Copyright © 2013,Oracle and/or its affiliates. All rights reserved.9 NEW SECURITY REQUIREMENTS
  • 10.
    Copyright © 2013,Oracle and/or its affiliates. All rights reserved.10 Copyright © 2013, Oracle and/or its affiliates. All rights reserved.10 SINGLE PLATFORM FOR ALL DEVICES Authorization Authentication Dynamic User Volume Device Management Policy Controls Sensors Meters Appliances
  • 11.
    Copyright © 2013,Oracle and/or its affiliates. All rights reserved.11 WE CAN • Schedule a workshop • Connect with industry peers • Perform an assessment

Editor's Notes

  • #4 IT is facing a lot of challenges. It might seem tough to visualize the solution, given all the demands you’re trying to meet.IT Operations is already required to “do more with less.”You may be facing a reduction in budgets and staffing, while also trying to deal withincreasing requirements on the IT infrastructure.Meanwhile, everyone expects you to have the agility necessary to meet dynamic business needs quickly and effectivelyBasically IT must be able to respond to ever evolving business needs
  • #5 IT is facing a lot of challenges. It might seem tough to visualize the solution, given all the demands you’re trying to meet.IT Operations is already required to “do more with less.”You may be facing a reduction in budgets and staffing, while also trying to deal withincreasing requirements on the IT infrastructure.Meanwhile, everyone expects you to have the agility necessary to meet dynamic business needs quickly and effectivelyBasically IT must be able to respond to ever evolving business needs
  • #6 The growth of mobile internet traffic is growing rapidly, driven by strong growth in mobile device marketPeople are getting information from new sources, such as social networks, and they are able to access that information anywhere they go on their mobile devices
  • #7 There are now 1.1B Global 3G Mobile Subscribers, ramping quickly at 37% per year. This compares with the approximately 6.1 billion global mobile phone subscribers, so you can see there is tremendous upside growth potential with smartphones as well.3G includes CDMA 1x EV-DO and Rev. A/B, WCDMA, HSPA; One user may have multiple mobile subscriptions and may be counted as multiple subscriber (per Source: Informa WCIS+.)
  • #8 There are three components to WebCenterContent gives enterprises a unified and intelligent system for managing their content and integrating with applicationsPortal provides a single point of access to this content with self-service portals and application dashboards and delivers intuitive user experiences for the enterprise that are seamlessly integrated with your enterprise applications And Sites empowers marketers to put that content to work in the form of contextually relevant and interactive digital experiences for customers Each of these tools comes with its own set of features and benefits—but, as I’m sure you can imagine, they are designed to work together
  • #10 Just to provide a pragmatic picture of the experience and highlight the risk. Here are four experiences you need to think about.EMAIL –- This is a key point for identity theft and phishing attacks Build RSA was an example of this WEBSITE Many customers use the website as their primary source of entry Build Watch for cross site scripting m- Bank of fiduram in italy is a good exampleMOBILE Local passwords and data are stored there BUILD Hackers can crack this in 360 seconds SOCIAL Trust is the big challenge BUILD A recent facebook malware stole credit card data For the phising scam – Oracle OAAM can provide context aware security to detect these types of anomalies.For the cross site scripting – OAAM can monitor the HTTP session to detect fraud For the Mobile challenge – Oracle OAM in IDM R2 does mobile sign on to secure mobile apps so passwords are not stored locallyFor Social trust challenge – Oracle OAM in IDM R2 provides support for OAUTH to trust sign on from facebook – twitter etc.
  • #11 Slide Transition: By combining many sources of data, you might even turn ordinary intelligence into extraordinary insights. Consider this example:Today, airlines use sensor data generated by jet engines to monitor engine performance and anticipate maintenance needs, reducing costly flight cancellations. [click]Imagine if you could aggregate sensor data from the entire airlines industry, you would have unparalleled insight into engine performance. This provides an opportunity to dramatically increase engine fuel efficiency – and reduce the airline industry’s biggest cost.