SlideShare a Scribd company logo
1 of 34
Download to read offline
Oracle Identity Management:
Improving Security and Compliance

Duško Vukmanović
Senior Sales Consultant
The following is intended to outline our general
product direction. It is intended for information
purposes only, and may not be incorporated into any
contract. It is not a commitment to deliver any
material, code, or functionality, and should not be
relied upon in making purchasing decisions.
The development, release, and timing of any
features or functionality described for Oracle’s
products remains at the sole discretion of Oracle.
More breaches than ever…


          Data Breach                  Once exposed, the data is out there – the bell can’t be un-rung
                                                            PUBLICLY REPORTED DATA BREACHES
                                      400



                                      300
                                                                630%
                                                              Increase
                                      200



                                      100
               Total Personally
        Identifying Information
             Records Exposed             0
                       (Millions)
                                                     2005             2006       2007         2008


                               Average cost of a data breach $202 per record
                           Average total cost exceeds $6.6 million per breach

Source: DataLossDB, Ponemon Institute, 2009 - http://datalossdb.org
http://www.privacyrights.org/ar/ChronDataBreaches.htm
More threats than ever…




          70% attacks originate inside the firewall
90% attacks perpetrated by employees with privileged access
More regulations than ever…




                                                             • Federal, state, local,
                                                             industry…adding more
                                                              mandates every year!
                                                        • Need to meet AND demonstrate
                                                                   compliance
                                                             • Compliance costs are
                                                                 unsustainable
     ?                Report and audit

                                     90% Companies behind in compliance


Source: IT Policy Compliance Group, 2007.
Higher Costs Than Ever…




• User Management Costs
• User Productivity Costs
    • Compliance &
   Remediation Costs
   • Security Breach
   Remediation Costs        $   It Adds Up
IdM Delivers Sustainable Compliance


• Enforces Segregation of Duties

• Restricts Access

• Automates access management

• Automates compliance reports

• Automates attestation
IdM Centralizes & Strengthens Security

• Centralized security and policy management
  – Consistent policies enforced across enterprise
  – Accelerated compliance with evolving mandates

• Automated provisioning / de-provisioning
  – Role based user provisioning and de-provisioning
  – Automated updates triggered by user status change

• Single Sign-On, Delegated Administration, Risk-
  based Access
  – Reduce password compromises
  – Delegate policy administration to business owners
  – Proactively defend against sophisticated security
    threats
IdM Streamlines IT Efficiency

   • Lower Administrative costs
         – Cost savings via reduced help desk calls
         – Automated and aggregated audit reporting


   • Enhanced User Productivity
         – Reduce time to access systems from days to minutes
         – Automated provisioning – 212% ROI within 6 months1

   • Enhanced IT Productivity
         – Developers re-use centralized security functions
         – Accelerated application deployments



1 – Forrester Research Report – TEI Study of Oracle Identity Manager 2008
Oracle Security Inside Out

                                                                            Database Security
                                                                        •   Encryption and Masking
                                                                        •   Privileged User Controls
                                                                        •   Multi-Factor Authorization
                                                                        •   Activity Monitoring and Audit
                                                                        •   Secure Configuration


                                                                       Identity Management
                                                                        •   User Provisioning
                                                                        •   Role Management
Information
                                                                        •   Entitlements Management
                                                                        •   Risk-Based Access Control
              Infrastructure                                            •   Virtual Directories

                               Databases
                                                                    Information Rights Management
                                           Applications

                                                          Content
                                                                        • Document-level access control
                                                                        • All copies, regardless of location
                                                                          (even beyond the firewall)
                                                                        • Auditing and revocation
Oracle’s Identity Management
   Comprehensive Suite of Best-Of-Breed Products


  Identity Admin.       Access Management          Directory Services

                          Access Manager
  Identity Manager                                  Internet Directory
                     Adaptive Access Manager
                     Enterprise Single Sign-On
    Role Manager                                    Virtual Directory
                         Identity Federation
                        Entitlements Server




      Audit & Compliance                       Manageability
Identity & Access Management Suite       Enterprise Manager IdM Pack
Oracle Identity Administration
  Sustainable Compliance With High ROI


                                                             E-Mail




Directory Server
                                                           Databases
                                                          & OS/Legacy
                   Identity & Role Reconciliation




HR Applications
                                                          Applications




                                        Identity Data
Other Sources
                                                        Physical Security
Role Based User Provisioning
                                  Oracle Identity Manager

                                                   GRANT
                                                    REVOKE


                                                   GRANT
                                                    REVOKE

                                                   GRANT
                                                    REVOKE




      Employee        HR System       Approval               Applications
    Joins / Departs                  Workflows


•   Automate Roles Based Provisioning / Deprovisioning
•   Identify orphaned accounts
•   Report on “Who has access to what”
•   Self-service requests
Automated De-Provisioning



                                                Manual Task        Revoked
                                                                  Cell Phone
                    Identity Lifecycle Management



                                     Identity
                                      Store
Terminated   HRMS   Reconciliation              Provisioning    Connector
Employee               Engine                     Workflow




                                                                Revoked
                                                               Applications
Self Service and Delegated Admin

     Delegated Admin                  Self-Service




  Manager assigning proxy user   User doing password reset


• Self Service Account Requests
• Delegated Administration
• Password Reset and Profile Management
Role Management
                                                  E-mail App

                              Business Role
                                                  General Ledger App



                             Assigned Project     CRM App




                                Location          UK Benefits App




•   Centralized role management
•   Role and rule-based provisioning
•   Map business roles to IT roles & privileges
•   Multi-dimensional role hierarchies
Oracle Access Management Suite
   Centralized Security and Improved Business Agility




 Kerberos &
 Basic Auth.         Single Sign On Across Enterprise     Portals



                    Risk-based Strong Authentication
Secure Mutual
Authentication
                       Entitlements Management
                                                        Packaged Apps

                      Standards-based Federation
  Biometric




                                                        Custom Apps
 Smart Card
Entitlements Management

                 Before                           After




                                                                App
                                       App
        Application



                                              Oracle Access




                                                                      App
                                 App
                                             Management Suite




                                                  App
• Hard-coded security policies      • Externalized entitlements
 • Brittle policy management         • Agile business policies
   • Application policy silos    • Centralized policy management
Challenges With Entitlements

• Are subject to massive proliferation & “creep”
• Need to rely upon lots of context before making a decision
• Must work hand-in-hand with your existing Identity Management and
  Provisioning solutions
• Should be consistent across implementations
• Policies can and do evolve independently from your application’s
  requirements
• Entitlements implemented inside your application code are hard to
  change

                              Bottom Line:
        Changing your policies means changing your applications
Risk-Based Access Control


                           Oracle Access Management Suite
                  Secure Mutual                        Risk-Based
                  Authentication       Risk Scoring   Authorization

                                         Device
                                       Geography
                                          Time
                                         Activity




• Real time fraud prevention
• “Auto Learning” behavior profiling
• Pattern and anomaly detection
Oracle Directory Services
Rapid Application Deployment Accelerates IT Agility



                                                              Any Application




                                     Standard LDAP & Java APIs

                                   Dynamically binds at Runtime                 Oracle Virtual
                                                                                Directory

                                   Virtualizes Access to Id-Stores
                                                         Id-
  Directory Services Mgr.




        Multiple DBMS       Multiple Directories   HR Applications       Mainframe/Legacy
Audit And Compliance Features (1/2)


• Integrated architecture and data store
  –   High performance
  –   Integrate once for compliance and provisioning
  –   Aggregated audit and compliance data
  –   OOTB process automation integration
• Audit data capture
  –   User profile and group history
  –   User membership history
  –   User entitlement history
  –   Attestation review and action history
  –   Form versioning
  –   Workflow task status history
Audit And Compliance Features (2/2)


• Reporting framework
  – Pluggable and customizable architecture for standard reports
  – 3rd party reporting tools support
  – Out-of-the-box reporting DB with 37 reports
• Attestation
  –   Entitlement review
  –   User centric and/or application centric reviews
  –   Out-of-the-box delegate and decline processes
  –   Fully integrated to workflow engine
• Denial access policy
  – Prevention of non-compliant accounts and privileges
Web-Based Attestation

1      Set Up    2                          3   Automated Action           4      Report Built
                     Reviewer Is Notified
      Periodic
                                                is taken based on                And Results
                     Goes to Self Service
      Review
                                                Periodic Review                  Stored in DB

                     Reviewer Selections
                                                          Email
  What Is                   Certify                       Result
 Reviewed                                                to User
     ?
                                                         Automatically
                            Reject                      Terminate User



   Who                     Decline                         Notify the
Reviews It?                                             Process Owner

                                                                                  Archive
                                                        Notify Delegated
                          Delegate
                                                           Reviewer
                                                                                Attested Data
                                                                                  Attestation
                                                                                   Actions
Start When?
How Often?               Comments                                              Delegation Paths
Attestation


Certification Data          Scheduling           360 Degree View

User Attributes         Periodic Scheduling     Business Glossary
Role Memberships        Event Based             Audit Exceptions
Role Based              Attestation for On-     Historical Data
Entitlement Grants      Boarding, Transfers &
                        Termination             Approval Data
Exception Entitlement                           Attestation
Grants                  Reminders &
                        Escalations             Dashboards for
Role Definition                                 Compliance Officers
                        Spreadsheet Exports
Role Entitlement                                Closed Loop
Mapping                                         Remediation with OIM
                                                Integration
Oracle Security Inside Out

                                                                         Database Security


                                                                       Identity Management


                                                                    Information Rights Management

                                                                        • Document-level access control
                                                                        • All copies, regardless of location
                                                                          (even beyond the firewall)
Information                                                             • Auditing and revocation

              Infrastructure

                               Databases

                                           Applications

                                                          Content
Information Rights Management
       Securing Data Beyond the Application

                                      Applications



                                                               Seal         Distribute




                                                                                                   Users

Oracle IRM Management Console                                          Oracle IRM Desktop
                                    Oracle IRM Server
                                    Oracle RM Server


                                                         Automatic
                                                           sync of
                                                        rights/audit

 Business Managers                                                                Secure offline
                     Audit                                                           cache
   or IT Admins




                                Oracle Identity Management
Information Centric Security Solutions

                                     Content


INFORMATION
RIGHTS        Centralized Document    Revocation (Digital Document Activity
              Access Control          Shredding)          Monitoring and Audit
MANAGEMENT

                               Applications



IDENTITY
              Identity                Directory              Access
AND ACCESS
              Administration          Services               Management
MANAGEMENT



DATABASE      Activity               Access Control and     Encryption and
SECURITY      Monitoring             Authorization          Data Masking


                                Databases
Investing in Security Pays Off in Sustainable
Compliance

                                            Enforce Controls
ENFORCE                            • Segregation of duties
                        MONITOR
                       CONTROLS    • Access control
CONTROLS

                                                Monitor Controls
                                   • Who accessed what?

            Oracle                 • Who changed what?

       Security Solutions               Streamline Processes
                                   • Attestation / Recertification


                                           Automate Reporting
AUTOMATE              STREAMLINE   • Out-of-the-box
REPORTING             PROCESSES      compliance reports
                                   • Customized reports
Identity Management Market Leader
      “Oracle is currently the IdM vendor to beat”                                   “Oracle has established itself as Leader.”
  - Burton VantagePoint 2008: Identity and Privacy Trends                   - The Forrester Wave: Identity And Access Management, Q1 2008




             User Provisioning, H2 2008                                             Web Access Management, H2 2008




                                                “Oracle assumes the
                                                    No. 1 position”
                                                  - Earl Perkins, Perry
                                                  Carpenter, Aug. 15 2008
                                                  (Research G00159740)
Questions
For More Information




                                                         Quote Attribution
                                                            Title, Company

Get Started                                    Resources
• Visit the Oracle Fusion Middleware 11g web   • Visit the Oracle IdM Website at:
 site at                                        http://oracle.com/identity
 http://www.oracle.com/fusionmiddleware11g     • Technical information available at:
• Oracle Fusion Middleware on oracle.com        http://otn.oracle.com/
 www.oracle.com/middleware                     • Talk to an Oracle IdM Specialist:
• Oracle Fusion Middleware on OTN               1-800-633-0738
 http://otn.oracle.com/middleware              • View demos, videos, iseminars
                                                whitepapers: http://oracle.com/identity
Oracle Identity Management: Improving Security and Compliance

More Related Content

What's hot

P hallam baker_keynote
P hallam baker_keynoteP hallam baker_keynote
P hallam baker_keynoteshindeshekhar
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0debbanerjee
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simplyLilian Schaffer
 
Hitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Systems, Inc.
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Systems, Inc.
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityJon Bultmeyer
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementNoam Bunder
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft Private Cloud
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Systems, Inc.
 
Secure Enterprise Cloud
Secure Enterprise CloudSecure Enterprise Cloud
Secure Enterprise CloudIndu Kodukula
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Systems, Inc.
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Systems, Inc.
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCDATAVERSITY
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introductionerry wardhana
 

What's hot (19)

P hallam baker_keynote
P hallam baker_keynoteP hallam baker_keynote
P hallam baker_keynote
 
Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0Df2012 securing information_assets_in_saa_s_clouds_3_0
Df2012 securing information_assets_in_saa_s_clouds_3_0
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
 
Hitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB ComplianceHitachi ID Solutions Support GLB Compliance
Hitachi ID Solutions Support GLB Compliance
 
Security Intelligence
Security IntelligenceSecurity Intelligence
Security Intelligence
 
Identity Access Management (IAM)
Identity Access Management (IAM)Identity Access Management (IAM)
Identity Access Management (IAM)
 
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
 
Identity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile IdentityIdentity Insights: Social, Local and Mobile Identity
Identity Insights: Social, Local and Mobile Identity
 
Defining Enterprise Identity Management
Defining Enterprise Identity ManagementDefining Enterprise Identity Management
Defining Enterprise Identity Management
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
 
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
 
Secure Enterprise Cloud
Secure Enterprise CloudSecure Enterprise Cloud
Secure Enterprise Cloud
 
Hitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioningHitachi ID Identity Manager: Self-service and automated user provisioning
Hitachi ID Identity Manager: Self-service and automated user provisioning
 
Credexo IDM
Credexo IDMCredexo IDM
Credexo IDM
 
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
 
Integrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLCIntegrating Information Protection Into Data Architecture & SDLC
Integrating Information Protection Into Data Architecture & SDLC
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Document%20 Safer%20 Introduction
Document%20 Safer%20 IntroductionDocument%20 Safer%20 Introduction
Document%20 Safer%20 Introduction
 

Viewers also liked

Mobile Tools for Immigration Journalists
Mobile Tools for Immigration JournalistsMobile Tools for Immigration Journalists
Mobile Tools for Immigration JournalistsMandy Jenkins
 
Kingdom living-part-1-embracing-the-virtues-of-the-king
Kingdom living-part-1-embracing-the-virtues-of-the-kingKingdom living-part-1-embracing-the-virtues-of-the-king
Kingdom living-part-1-embracing-the-virtues-of-the-kingSSMC
 
НП "СРО "ОРПД" Презентация саморегулирование проектирование
НП "СРО "ОРПД" Презентация саморегулирование проектированиеНП "СРО "ОРПД" Презентация саморегулирование проектирование
НП "СРО "ОРПД" Презентация саморегулирование проектированиеKarim
 
Láminas Tema 1 Fronteras
Láminas Tema 1 Fronteras Láminas Tema 1 Fronteras
Láminas Tema 1 Fronteras gobernar
 
Láminas tema 6 ADP
Láminas tema 6 ADPLáminas tema 6 ADP
Láminas tema 6 ADPgobernar
 
Buy this news, please?
Buy this news, please?Buy this news, please?
Buy this news, please?Mandy Jenkins
 
"Jehovah Tsikenu" 8 Apr 2012
"Jehovah Tsikenu"  8 Apr 2012"Jehovah Tsikenu"  8 Apr 2012
"Jehovah Tsikenu" 8 Apr 2012SSMC
 
Ssmc dg-3-life impactinglives
Ssmc dg-3-life impactinglivesSsmc dg-3-life impactinglives
Ssmc dg-3-life impactinglivesSSMC
 
Paying the Price for Revival, July 1 by mark goodwin
Paying the Price for Revival,  July 1 by mark goodwinPaying the Price for Revival,  July 1 by mark goodwin
Paying the Price for Revival, July 1 by mark goodwinSSMC
 
False Teachings
False Teachings False Teachings
False Teachings SSMC
 
Live Reporting, Live Blogging and Live Chats
Live Reporting, Live Blogging and Live ChatsLive Reporting, Live Blogging and Live Chats
Live Reporting, Live Blogging and Live ChatsMandy Jenkins
 
Anchors in-the-storm
Anchors in-the-stormAnchors in-the-storm
Anchors in-the-stormSSMC
 
Translation: Vietnam taps reserves but dong still likely to slide
Translation: Vietnam taps reserves but dong still likely to slideTranslation: Vietnam taps reserves but dong still likely to slide
Translation: Vietnam taps reserves but dong still likely to slideAn Nguyen
 
Tutkimustiivistelmä – Omat sisällöt markkinoinnin ytimenä 2014
Tutkimustiivistelmä – Omat sisällöt markkinoinnin ytimenä 2014Tutkimustiivistelmä – Omat sisällöt markkinoinnin ytimenä 2014
Tutkimustiivistelmä – Omat sisällöt markkinoinnin ytimenä 2014Worldcom Public Relations Group
 
الانتهازية السياسية ولعبة الديمقراطية بقلم عزالدين مبارك
الانتهازية السياسية ولعبة الديمقراطية بقلم عزالدين مباركالانتهازية السياسية ولعبة الديمقراطية بقلم عزالدين مبارك
الانتهازية السياسية ولعبة الديمقراطية بقلم عزالدين مباركezzeddine
 
Social media searching
Social media searchingSocial media searching
Social media searchingMandy Jenkins
 
Notarphpj 120828194837-phpapp02
Notarphpj 120828194837-phpapp02Notarphpj 120828194837-phpapp02
Notarphpj 120828194837-phpapp02dan1172
 
Social Media Search and Verification
Social Media Search and VerificationSocial Media Search and Verification
Social Media Search and VerificationMandy Jenkins
 
#Smc070 #smm5 state_of_social_media_for_web_201112
#Smc070 #smm5 state_of_social_media_for_web_201112#Smc070 #smm5 state_of_social_media_for_web_201112
#Smc070 #smm5 state_of_social_media_for_web_201112SMC070
 

Viewers also liked (20)

Mobile Tools for Immigration Journalists
Mobile Tools for Immigration JournalistsMobile Tools for Immigration Journalists
Mobile Tools for Immigration Journalists
 
Kingdom living-part-1-embracing-the-virtues-of-the-king
Kingdom living-part-1-embracing-the-virtues-of-the-kingKingdom living-part-1-embracing-the-virtues-of-the-king
Kingdom living-part-1-embracing-the-virtues-of-the-king
 
НП "СРО "ОРПД" Презентация саморегулирование проектирование
НП "СРО "ОРПД" Презентация саморегулирование проектированиеНП "СРО "ОРПД" Презентация саморегулирование проектирование
НП "СРО "ОРПД" Презентация саморегулирование проектирование
 
Láminas Tema 1 Fronteras
Láminas Tema 1 Fronteras Láminas Tema 1 Fronteras
Láminas Tema 1 Fronteras
 
Láminas tema 6 ADP
Láminas tema 6 ADPLáminas tema 6 ADP
Láminas tema 6 ADP
 
Buy this news, please?
Buy this news, please?Buy this news, please?
Buy this news, please?
 
"Jehovah Tsikenu" 8 Apr 2012
"Jehovah Tsikenu"  8 Apr 2012"Jehovah Tsikenu"  8 Apr 2012
"Jehovah Tsikenu" 8 Apr 2012
 
Ssmc dg-3-life impactinglives
Ssmc dg-3-life impactinglivesSsmc dg-3-life impactinglives
Ssmc dg-3-life impactinglives
 
Paying the Price for Revival, July 1 by mark goodwin
Paying the Price for Revival,  July 1 by mark goodwinPaying the Price for Revival,  July 1 by mark goodwin
Paying the Price for Revival, July 1 by mark goodwin
 
False Teachings
False Teachings False Teachings
False Teachings
 
Live Reporting, Live Blogging and Live Chats
Live Reporting, Live Blogging and Live ChatsLive Reporting, Live Blogging and Live Chats
Live Reporting, Live Blogging and Live Chats
 
Anchors in-the-storm
Anchors in-the-stormAnchors in-the-storm
Anchors in-the-storm
 
Translation: Vietnam taps reserves but dong still likely to slide
Translation: Vietnam taps reserves but dong still likely to slideTranslation: Vietnam taps reserves but dong still likely to slide
Translation: Vietnam taps reserves but dong still likely to slide
 
Tutkimustiivistelmä – Omat sisällöt markkinoinnin ytimenä 2014
Tutkimustiivistelmä – Omat sisällöt markkinoinnin ytimenä 2014Tutkimustiivistelmä – Omat sisällöt markkinoinnin ytimenä 2014
Tutkimustiivistelmä – Omat sisällöt markkinoinnin ytimenä 2014
 
الانتهازية السياسية ولعبة الديمقراطية بقلم عزالدين مبارك
الانتهازية السياسية ولعبة الديمقراطية بقلم عزالدين مباركالانتهازية السياسية ولعبة الديمقراطية بقلم عزالدين مبارك
الانتهازية السياسية ولعبة الديمقراطية بقلم عزالدين مبارك
 
Social media searching
Social media searchingSocial media searching
Social media searching
 
Notarphpj 120828194837-phpapp02
Notarphpj 120828194837-phpapp02Notarphpj 120828194837-phpapp02
Notarphpj 120828194837-phpapp02
 
Social Media Search and Verification
Social Media Search and VerificationSocial Media Search and Verification
Social Media Search and Verification
 
#Smc070 #smm5 state_of_social_media_for_web_201112
#Smc070 #smm5 state_of_social_media_for_web_201112#Smc070 #smm5 state_of_social_media_for_web_201112
#Smc070 #smm5 state_of_social_media_for_web_201112
 
Mc Farland Studer
Mc Farland StuderMc Farland Studer
Mc Farland Studer
 

Similar to Oracle Identity Management: Improving Security and Compliance

Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalGartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalOracleIDM
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditBob Rhubart
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 
Hybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsHybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsSoftware Park Thailand
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simplyLilian Schaffer
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerOracleIDM
 
Round table guide
Round table guideRound table guide
Round table guideOracleIDM
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityInnoTech
 
Knowledge Stream Corporate Presentation New
Knowledge Stream Corporate Presentation NewKnowledge Stream Corporate Presentation New
Knowledge Stream Corporate Presentation NewKrishnanmenon
 

Similar to Oracle Identity Management: Improving Security and Compliance (20)

Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Gartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-finalGartner iam 2011-analytics-aj-orig-recordednp-final
Gartner iam 2011-analytics-aj-orig-recordednp-final
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
Identity access management
Identity access management Identity access management
Identity access management
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Enterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to auditEnterprise Security Architecture: From access to audit
Enterprise Security Architecture: From access to audit
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Hybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 TrendsHybrid Cloud, BigData and Consumerization The 2012 Trends
Hybrid Cloud, BigData and Consumerization The 2012 Trends
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Who will guard the guards
Who will guard the guardsWho will guard the guards
Who will guard the guards
 
Day 2 p1 - operate simply
Day 2   p1 - operate simplyDay 2   p1 - operate simply
Day 2 p1 - operate simply
 
Intro to Identity Management
Intro to Identity ManagementIntro to Identity Management
Intro to Identity Management
 
SANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements ServerSANS Institute Product Review: Oracle Entitlements Server
SANS Institute Product Review: Oracle Entitlements Server
 
Round table guide
Round table guideRound table guide
Round table guide
 
Life & Work Online Protecting Your Identity
Life & Work Online Protecting Your IdentityLife & Work Online Protecting Your Identity
Life & Work Online Protecting Your Identity
 
Knowledge Stream Corporate Presentation New
Knowledge Stream Corporate Presentation NewKnowledge Stream Corporate Presentation New
Knowledge Stream Corporate Presentation New
 

More from Oracle BH

2 d4.poslovna analitika_160410
2 d4.poslovna analitika_1604102 d4.poslovna analitika_160410
2 d4.poslovna analitika_160410Oracle BH
 
2 d3.javne nabavke_neum160410
2 d3.javne nabavke_neum1604102 d3.javne nabavke_neum160410
2 d3.javne nabavke_neum160410Oracle BH
 
2 d2.casemgmt
2 d2.casemgmt2 d2.casemgmt
2 d2.casemgmtOracle BH
 
2 d1.hcm neum_160410
2 d1.hcm neum_1604102 d1.hcm neum_160410
2 d1.hcm neum_160410Oracle BH
 
1 d3.cob neum150410
1 d3.cob neum1504101 d3.cob neum150410
1 d3.cob neum150410Oracle BH
 
1 d2.an neum_bh_treasury_systems_development_perspectives_v1.0
1 d2.an neum_bh_treasury_systems_development_perspectives_v1.01 d2.an neum_bh_treasury_systems_development_perspectives_v1.0
1 d2.an neum_bh_treasury_systems_development_perspectives_v1.0Oracle BH
 
1 d1.reforma it_u_javnoj_upravi
1 d1.reforma it_u_javnoj_upravi1 d1.reforma it_u_javnoj_upravi
1 d1.reforma it_u_javnoj_upraviOracle BH
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Oracle BH
 
Sun welcome middleware_overview 0324101_bosnia
Sun welcome middleware_overview 0324101_bosniaSun welcome middleware_overview 0324101_bosnia
Sun welcome middleware_overview 0324101_bosniaOracle BH
 
Sun welcome middleware_overview 0324101_bosnia(2)
Sun welcome middleware_overview 0324101_bosnia(2)Sun welcome middleware_overview 0324101_bosnia(2)
Sun welcome middleware_overview 0324101_bosnia(2)Oracle BH
 
Exadata 11-2-overview-v2 11
Exadata 11-2-overview-v2 11Exadata 11-2-overview-v2 11
Exadata 11-2-overview-v2 11Oracle BH
 
Oracle tech fmw-04-sun-virtualization.and.solaris-neum-16.04.2010
Oracle tech fmw-04-sun-virtualization.and.solaris-neum-16.04.2010Oracle tech fmw-04-sun-virtualization.and.solaris-neum-16.04.2010
Oracle tech fmw-04-sun-virtualization.and.solaris-neum-16.04.2010Oracle BH
 
Oracle tech fmw-03-cloud-computing-neum-15.04.2010
Oracle tech fmw-03-cloud-computing-neum-15.04.2010Oracle tech fmw-03-cloud-computing-neum-15.04.2010
Oracle tech fmw-03-cloud-computing-neum-15.04.2010Oracle BH
 
Oracle tech fmw-02-soa-suite-11g-neum-15.04.2010
Oracle tech fmw-02-soa-suite-11g-neum-15.04.2010Oracle tech fmw-02-soa-suite-11g-neum-15.04.2010
Oracle tech fmw-02-soa-suite-11g-neum-15.04.2010Oracle BH
 
Oracle tech db-05-sun-servers.and.storage-16.04.2010
Oracle tech db-05-sun-servers.and.storage-16.04.2010Oracle tech db-05-sun-servers.and.storage-16.04.2010
Oracle tech db-05-sun-servers.and.storage-16.04.2010Oracle BH
 
Oracle tech db-04-cost-effective-neum-16.04.2010
Oracle tech db-04-cost-effective-neum-16.04.2010Oracle tech db-04-cost-effective-neum-16.04.2010
Oracle tech db-04-cost-effective-neum-16.04.2010Oracle BH
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle BH
 

More from Oracle BH (17)

2 d4.poslovna analitika_160410
2 d4.poslovna analitika_1604102 d4.poslovna analitika_160410
2 d4.poslovna analitika_160410
 
2 d3.javne nabavke_neum160410
2 d3.javne nabavke_neum1604102 d3.javne nabavke_neum160410
2 d3.javne nabavke_neum160410
 
2 d2.casemgmt
2 d2.casemgmt2 d2.casemgmt
2 d2.casemgmt
 
2 d1.hcm neum_160410
2 d1.hcm neum_1604102 d1.hcm neum_160410
2 d1.hcm neum_160410
 
1 d3.cob neum150410
1 d3.cob neum1504101 d3.cob neum150410
1 d3.cob neum150410
 
1 d2.an neum_bh_treasury_systems_development_perspectives_v1.0
1 d2.an neum_bh_treasury_systems_development_perspectives_v1.01 d2.an neum_bh_treasury_systems_development_perspectives_v1.0
1 d2.an neum_bh_treasury_systems_development_perspectives_v1.0
 
1 d1.reforma it_u_javnoj_upravi
1 d1.reforma it_u_javnoj_upravi1 d1.reforma it_u_javnoj_upravi
1 d1.reforma it_u_javnoj_upravi
 
Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2Ppt security-database-overview-11g r2
Ppt security-database-overview-11g r2
 
Sun welcome middleware_overview 0324101_bosnia
Sun welcome middleware_overview 0324101_bosniaSun welcome middleware_overview 0324101_bosnia
Sun welcome middleware_overview 0324101_bosnia
 
Sun welcome middleware_overview 0324101_bosnia(2)
Sun welcome middleware_overview 0324101_bosnia(2)Sun welcome middleware_overview 0324101_bosnia(2)
Sun welcome middleware_overview 0324101_bosnia(2)
 
Exadata 11-2-overview-v2 11
Exadata 11-2-overview-v2 11Exadata 11-2-overview-v2 11
Exadata 11-2-overview-v2 11
 
Oracle tech fmw-04-sun-virtualization.and.solaris-neum-16.04.2010
Oracle tech fmw-04-sun-virtualization.and.solaris-neum-16.04.2010Oracle tech fmw-04-sun-virtualization.and.solaris-neum-16.04.2010
Oracle tech fmw-04-sun-virtualization.and.solaris-neum-16.04.2010
 
Oracle tech fmw-03-cloud-computing-neum-15.04.2010
Oracle tech fmw-03-cloud-computing-neum-15.04.2010Oracle tech fmw-03-cloud-computing-neum-15.04.2010
Oracle tech fmw-03-cloud-computing-neum-15.04.2010
 
Oracle tech fmw-02-soa-suite-11g-neum-15.04.2010
Oracle tech fmw-02-soa-suite-11g-neum-15.04.2010Oracle tech fmw-02-soa-suite-11g-neum-15.04.2010
Oracle tech fmw-02-soa-suite-11g-neum-15.04.2010
 
Oracle tech db-05-sun-servers.and.storage-16.04.2010
Oracle tech db-05-sun-servers.and.storage-16.04.2010Oracle tech db-05-sun-servers.and.storage-16.04.2010
Oracle tech db-05-sun-servers.and.storage-16.04.2010
 
Oracle tech db-04-cost-effective-neum-16.04.2010
Oracle tech db-04-cost-effective-neum-16.04.2010Oracle tech db-04-cost-effective-neum-16.04.2010
Oracle tech db-04-cost-effective-neum-16.04.2010
 
Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010Oracle tech db-02-hacking-neum-15.04.2010
Oracle tech db-02-hacking-neum-15.04.2010
 

Oracle Identity Management: Improving Security and Compliance

  • 1.
  • 2. Oracle Identity Management: Improving Security and Compliance Duško Vukmanović Senior Sales Consultant
  • 3. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
  • 4. More breaches than ever… Data Breach Once exposed, the data is out there – the bell can’t be un-rung PUBLICLY REPORTED DATA BREACHES 400 300 630% Increase 200 100 Total Personally Identifying Information Records Exposed 0 (Millions) 2005 2006 2007 2008 Average cost of a data breach $202 per record Average total cost exceeds $6.6 million per breach Source: DataLossDB, Ponemon Institute, 2009 - http://datalossdb.org http://www.privacyrights.org/ar/ChronDataBreaches.htm
  • 5. More threats than ever… 70% attacks originate inside the firewall 90% attacks perpetrated by employees with privileged access
  • 6. More regulations than ever… • Federal, state, local, industry…adding more mandates every year! • Need to meet AND demonstrate compliance • Compliance costs are unsustainable ? Report and audit 90% Companies behind in compliance Source: IT Policy Compliance Group, 2007.
  • 7. Higher Costs Than Ever… • User Management Costs • User Productivity Costs • Compliance & Remediation Costs • Security Breach Remediation Costs $ It Adds Up
  • 8. IdM Delivers Sustainable Compliance • Enforces Segregation of Duties • Restricts Access • Automates access management • Automates compliance reports • Automates attestation
  • 9. IdM Centralizes & Strengthens Security • Centralized security and policy management – Consistent policies enforced across enterprise – Accelerated compliance with evolving mandates • Automated provisioning / de-provisioning – Role based user provisioning and de-provisioning – Automated updates triggered by user status change • Single Sign-On, Delegated Administration, Risk- based Access – Reduce password compromises – Delegate policy administration to business owners – Proactively defend against sophisticated security threats
  • 10. IdM Streamlines IT Efficiency • Lower Administrative costs – Cost savings via reduced help desk calls – Automated and aggregated audit reporting • Enhanced User Productivity – Reduce time to access systems from days to minutes – Automated provisioning – 212% ROI within 6 months1 • Enhanced IT Productivity – Developers re-use centralized security functions – Accelerated application deployments 1 – Forrester Research Report – TEI Study of Oracle Identity Manager 2008
  • 11. Oracle Security Inside Out Database Security • Encryption and Masking • Privileged User Controls • Multi-Factor Authorization • Activity Monitoring and Audit • Secure Configuration Identity Management • User Provisioning • Role Management Information • Entitlements Management • Risk-Based Access Control Infrastructure • Virtual Directories Databases Information Rights Management Applications Content • Document-level access control • All copies, regardless of location (even beyond the firewall) • Auditing and revocation
  • 12. Oracle’s Identity Management Comprehensive Suite of Best-Of-Breed Products Identity Admin. Access Management Directory Services Access Manager Identity Manager Internet Directory Adaptive Access Manager Enterprise Single Sign-On Role Manager Virtual Directory Identity Federation Entitlements Server Audit & Compliance Manageability Identity & Access Management Suite Enterprise Manager IdM Pack
  • 13. Oracle Identity Administration Sustainable Compliance With High ROI E-Mail Directory Server Databases & OS/Legacy Identity & Role Reconciliation HR Applications Applications Identity Data Other Sources Physical Security
  • 14. Role Based User Provisioning Oracle Identity Manager GRANT REVOKE GRANT REVOKE GRANT REVOKE Employee HR System Approval Applications Joins / Departs Workflows • Automate Roles Based Provisioning / Deprovisioning • Identify orphaned accounts • Report on “Who has access to what” • Self-service requests
  • 15. Automated De-Provisioning Manual Task Revoked Cell Phone Identity Lifecycle Management Identity Store Terminated HRMS Reconciliation Provisioning Connector Employee Engine Workflow Revoked Applications
  • 16. Self Service and Delegated Admin Delegated Admin Self-Service Manager assigning proxy user User doing password reset • Self Service Account Requests • Delegated Administration • Password Reset and Profile Management
  • 17. Role Management E-mail App Business Role General Ledger App Assigned Project CRM App Location UK Benefits App • Centralized role management • Role and rule-based provisioning • Map business roles to IT roles & privileges • Multi-dimensional role hierarchies
  • 18. Oracle Access Management Suite Centralized Security and Improved Business Agility Kerberos & Basic Auth. Single Sign On Across Enterprise Portals Risk-based Strong Authentication Secure Mutual Authentication Entitlements Management Packaged Apps Standards-based Federation Biometric Custom Apps Smart Card
  • 19. Entitlements Management Before After App App Application Oracle Access App App Management Suite App • Hard-coded security policies • Externalized entitlements • Brittle policy management • Agile business policies • Application policy silos • Centralized policy management
  • 20. Challenges With Entitlements • Are subject to massive proliferation & “creep” • Need to rely upon lots of context before making a decision • Must work hand-in-hand with your existing Identity Management and Provisioning solutions • Should be consistent across implementations • Policies can and do evolve independently from your application’s requirements • Entitlements implemented inside your application code are hard to change Bottom Line: Changing your policies means changing your applications
  • 21. Risk-Based Access Control Oracle Access Management Suite Secure Mutual Risk-Based Authentication Risk Scoring Authorization Device Geography Time Activity • Real time fraud prevention • “Auto Learning” behavior profiling • Pattern and anomaly detection
  • 22. Oracle Directory Services Rapid Application Deployment Accelerates IT Agility Any Application Standard LDAP & Java APIs Dynamically binds at Runtime Oracle Virtual Directory Virtualizes Access to Id-Stores Id- Directory Services Mgr. Multiple DBMS Multiple Directories HR Applications Mainframe/Legacy
  • 23. Audit And Compliance Features (1/2) • Integrated architecture and data store – High performance – Integrate once for compliance and provisioning – Aggregated audit and compliance data – OOTB process automation integration • Audit data capture – User profile and group history – User membership history – User entitlement history – Attestation review and action history – Form versioning – Workflow task status history
  • 24. Audit And Compliance Features (2/2) • Reporting framework – Pluggable and customizable architecture for standard reports – 3rd party reporting tools support – Out-of-the-box reporting DB with 37 reports • Attestation – Entitlement review – User centric and/or application centric reviews – Out-of-the-box delegate and decline processes – Fully integrated to workflow engine • Denial access policy – Prevention of non-compliant accounts and privileges
  • 25. Web-Based Attestation 1 Set Up 2 3 Automated Action 4 Report Built Reviewer Is Notified Periodic is taken based on And Results Goes to Self Service Review Periodic Review Stored in DB Reviewer Selections Email What Is Certify Result Reviewed to User ? Automatically Reject Terminate User Who Decline Notify the Reviews It? Process Owner Archive Notify Delegated Delegate Reviewer Attested Data Attestation Actions Start When? How Often? Comments Delegation Paths
  • 26. Attestation Certification Data Scheduling 360 Degree View User Attributes Periodic Scheduling Business Glossary Role Memberships Event Based Audit Exceptions Role Based Attestation for On- Historical Data Entitlement Grants Boarding, Transfers & Termination Approval Data Exception Entitlement Attestation Grants Reminders & Escalations Dashboards for Role Definition Compliance Officers Spreadsheet Exports Role Entitlement Closed Loop Mapping Remediation with OIM Integration
  • 27. Oracle Security Inside Out Database Security Identity Management Information Rights Management • Document-level access control • All copies, regardless of location (even beyond the firewall) Information • Auditing and revocation Infrastructure Databases Applications Content
  • 28. Information Rights Management Securing Data Beyond the Application Applications Seal Distribute Users Oracle IRM Management Console Oracle IRM Desktop Oracle IRM Server Oracle RM Server Automatic sync of rights/audit Business Managers Secure offline Audit cache or IT Admins Oracle Identity Management
  • 29. Information Centric Security Solutions Content INFORMATION RIGHTS Centralized Document Revocation (Digital Document Activity Access Control Shredding) Monitoring and Audit MANAGEMENT Applications IDENTITY Identity Directory Access AND ACCESS Administration Services Management MANAGEMENT DATABASE Activity Access Control and Encryption and SECURITY Monitoring Authorization Data Masking Databases
  • 30. Investing in Security Pays Off in Sustainable Compliance Enforce Controls ENFORCE • Segregation of duties MONITOR CONTROLS • Access control CONTROLS Monitor Controls • Who accessed what? Oracle • Who changed what? Security Solutions Streamline Processes • Attestation / Recertification Automate Reporting AUTOMATE STREAMLINE • Out-of-the-box REPORTING PROCESSES compliance reports • Customized reports
  • 31. Identity Management Market Leader “Oracle is currently the IdM vendor to beat” “Oracle has established itself as Leader.” - Burton VantagePoint 2008: Identity and Privacy Trends - The Forrester Wave: Identity And Access Management, Q1 2008 User Provisioning, H2 2008 Web Access Management, H2 2008 “Oracle assumes the No. 1 position” - Earl Perkins, Perry Carpenter, Aug. 15 2008 (Research G00159740)
  • 33. For More Information Quote Attribution Title, Company Get Started Resources • Visit the Oracle Fusion Middleware 11g web • Visit the Oracle IdM Website at: site at http://oracle.com/identity http://www.oracle.com/fusionmiddleware11g • Technical information available at: • Oracle Fusion Middleware on oracle.com http://otn.oracle.com/ www.oracle.com/middleware • Talk to an Oracle IdM Specialist: • Oracle Fusion Middleware on OTN 1-800-633-0738 http://otn.oracle.com/middleware • View demos, videos, iseminars whitepapers: http://oracle.com/identity