This document summarizes a presentation given by Ranjan Jain of Cisco and Michael Neuenschwander of Oracle about best practices for adopting a platform approach to identity and access management (IAM). The speakers discussed Cisco's business drivers for improving IAM, their rationale for choosing a platform over point solutions, and how they implemented Oracle's IAM products. They provided recommendations based on Cisco's experiences and highlighted potential benefits like cost savings and increased responsiveness compared to individual point solutions.
Overview of Identity and Access Management Product LineNovell
Attend the two-hour foundation session on the Identity and Access Management product line from Novell and start your BrainShare right! This session will deliver a high-level overview of the full Identity and Access Management product line. It will highlight how the products work together as an integrated solution, and the session has a modular format so you can attend the product overviews you are most interested in. The session will provide real life examples of integration-focused benefits, followed by a 25 minute overview and update on each of the products: Novell Identity Manager, Novell Access Manager and Novell SecureLogin.
Hitachi ID Suite overview of security features and enhancements in 9.0. Also showcasing new mobile UI for web apps.
See more at: http://hitachi-id.com/docs/pres.html
Developing an IAM Roadmap that Fits Your BusinessForgeRock
Presented by Jim McDonald, Engagement Manager, Identropy at ForgeRock Open Identity Stack Summit, June 2013
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
Overview of Identity and Access Management Product LineNovell
Attend the two-hour foundation session on the Identity and Access Management product line from Novell and start your BrainShare right! This session will deliver a high-level overview of the full Identity and Access Management product line. It will highlight how the products work together as an integrated solution, and the session has a modular format so you can attend the product overviews you are most interested in. The session will provide real life examples of integration-focused benefits, followed by a 25 minute overview and update on each of the products: Novell Identity Manager, Novell Access Manager and Novell SecureLogin.
Hitachi ID Suite overview of security features and enhancements in 9.0. Also showcasing new mobile UI for web apps.
See more at: http://hitachi-id.com/docs/pres.html
Developing an IAM Roadmap that Fits Your BusinessForgeRock
Presented by Jim McDonald, Engagement Manager, Identropy at ForgeRock Open Identity Stack Summit, June 2013
Learn more about ForgeRock Access Management:
https://www.forgerock.com/platform/access-management/
Learn more about ForgeRock Identity Management:
https://www.forgerock.com/platform/identity-management/
This webinar focuses on how to use graph databases for Identity & Access Management. This webinar is designed for people who work with entitlements, access management, and tracking origins and associations of assets.
Managing and monitoring multiple user authorizations and asset provenance across your enterprise organization is a challenging task. We’ll explore how an interconnected view of your data, gives you better real-time insights and controls than ever before. Neo4j connects your data along intuitive relationships so identity and access management happens quickly and effectively.
In this webinar we’ll start with an overview of Neo4j and Graph-thinking, and continue with exploring some of the use cases showing how Neo4j’s versatile property graph model makes it easier for organizations to evolve identity and access management models.
This session introduces the concepts of AWS Identity and Access Management (IAM) and walks through the tools and strategies you can use to control access to your AWS environment. We describe IAM users, groups, and roles and how to use them. We demonstrate how to create IAM users and roles, and grant them various types of permissions to access AWS APIs and resources.
O compositor mulherengo e protetor de Richard Wagner, que entrou para o sacerdócio, foi Abade da igreja católica e bibliotecário do Papa Pio IX, terminou sua vida pobre. Depois de ganhar fortunas, viver na nobreza, tudo que havia acumulado, era uma valise de viagem, com umas roupas brancas, uma batina de reserva, sete lenços e seu breviário. Suas últimas palavras, foram: “Tristão”, como último tributo ao gênio de Wagner, seu protegido
Better slides: http://prezi.com/5ws8tsf7cxfx/mysqlhandlersocketnosql/
More info: http://bit.ly/pluk2012
We've been using HandlerSocket in our infrastructure for 2 years here at Badoo. Badoo has extensive experience running HS in production. More and more teams in our company use HandlerSocket for their projects.
We're currently using HandlerSocket as a Memcached replacement in some cases, as a search engine in some other cases and as a primary key-value storage for mobile & desktop applications. Our HS installation has more than 30 servers serving max. ~ 8000 RPS per server. I have written a custom HS client library for PHP including a couple of tricks and optimizations I'm going to show you.
I'm going to speak on:
Brief HS introduction.
What HS is and what it is not. The benefits it provides.
HS internals.
Common use cases, a detailed description of one or two use cases @ Badoo with figures.
Performance issues, speeding it up:
Sharding
HS with Percona Server
Using HS with persistent connections. Pros and cons, problems, solutions.
Tips & tricks: pipelining, lazy open_index, etc.
Useful links: HS client libraries, articles, Percona Server Handlersocket page.
This will not be an introductory talk but a summary of my practical experience including graphs, numbers and pitfalls.
This session will go into detail about the major features in Novell Identity Manager 4.0. It will give you the opportunity to get involved in a detailed discussion on the major new features in Identity Manager with the product management team. Hear more on the latest enhancements including role mapping administrator, advanced reporting capabilities, details of the embedded/preconfigured identity vault, single sign-on, resource model, REST services for custom user interface development, and much more. You will walk away with a solid understanding of the functionalities and business benefits provided by the new features.
Speaker: Bob Bentley Product Manager
Novell, Inc.
Kamal Narayan Product Manager
Novell, Inc.
Since its formation in 1996, BusinessPort has been transforming the way companies maintain efficient, safe and transparent operating environments. Our Agility Business Management System is the de facto standard within safety critical sectors such as Oil & Gas, Defence and Infrastructure.
To ensure your organisation is performing to its highest ethical standard, there needs to be a robust management system in place to provide guidance to the entire workforce on day-to-day operational decisions. Agility integrates people, processes, documentation, risks and compliance to deliver the right information to the right people at the right time.
Key Policy Considerations When Implementing Next-Generation FirewallsAlgoSec
This presentation examines next-generation firewalls, and provides practical advice on how to effectively and efficiently manage policies in a multi-product and even multi-vendor, defense-in-depth architecture.
By watching this webcast you will learn answers to the following questions:
-What constitutes a next-generation firewall and what problems does it solve?
What are the deployment options for next-generation firewalls?
What do policies in a defense-in-depth architecture look like?
How can you efficiently manage next-generation firewalls AND traditional firewall policies?
And much more
In this session, Chris Haddad will describe where your Cloud application strategy may encounter challenges, when to migrate applications to the Cloud, and how to scale cloud strategy and cloud tactics across the organization.
Similar to Oracle_Cisco identity platform approach_webcast (20)
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
In this webinar, host Scott Bonnell discussed security and compliance issues with Philip Black from SuperValu. Business drivers and a Sun to Oracle technology upgrade project are discussed.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
1. <Insert Picture Here>
Cisco
Best Practices for a Platform Approach
Ranjan Jain, IT Architect (IAM), Cisco Systems, Inc.
Michael Neuenschwander, Senior Director, Oracle
2. This document is for informational purposes. It is not a commitment
to deliver any material, code, or functionality, and should not be relied
upon in making purchasing decisions. The development, release,
and timing of any features or functionality described in this document
remains at the sole discretion of Oracle. This document in any form,
software or printed matter, contains proprietary information that is the
exclusive property of Oracle. This document and information
contained herein may not be disclosed, copied, reproduced or
distributed to anyone outside Oracle without prior written consent of
Oracle. This document is not part of your license agreement nor can
it be incorporated into any contractual agreement with Oracle or its
subsidiaries or affiliates.
3. Speakers
Ranjan Jain Michael Neuenschwander
Security Architect
Senior Director
Product Management
4. Agenda
• Business Drivers
• Building The Roadmap
• Deploying Technology
• Learning Experiences
• Results
5. Business Drivers for Cisco
Foster Growth and Reduce Cost
Streamline M&A Regulatory
Operations Compliance
Operational Personalized
Efficiency End-User
Experience
Risk Mitigation
EIAM Program
6. Rationale for the Platform Approach
• Stakeholders
• Existing Infrastructure
• Streamlined Operations
• Centralized Security
• Full Auditability
7. EIAM Vision
• Declarative Security
Oracle Access • Externalized & Centralized
Access Mgmt
Manager
• Apps, Devices,
Resources
• Virtualization of Identity &
Policy Data
• Centralized Reporting
• User Self Service
8. Implementation Roadmap Strategy
Prioritize Based on Drivers and ROI
HIGH
Cloud
Strong enablement
Today Authentication
Identity
Control
Certification
Tomorrow
Web Access
Management
User
Provisioning Both internal and external
LOW
apps integrated
Directory
Complexity
LOW HIGH
9. Solution Deployment
Oracle Access Oracle Identity Oracle Internet
Manager Manager Directory
• Web SSO (external + • Timely identity • Central identity
internal users) attribute updates policy store
• Global Logout • Reconciliation based • Full Auditability
on SoRs
• Complete Auditability
• Rules-driven auto
prov/deprov
• Compliance Reporting
10. Deployment Synergies
Oracle Identity
Password
Manager Central
Management
Identity
Policy Store
Full
Auditability
Oracle Access Oracle Internet
Manager Directory
Platform Security
11. Enterprise Platform: The Bigger Picture
• ADF UI Customization
• Workflow Configuration
• Weblogic Platform
• Single IT Services Portal
• Simplify Reporting
12. Down The Road: Future Plans & Drivers
• Mobile platform
• Cloud
• PaaS
• NextGen Authentication
13. Results
• Reduced Access integration from 4
hours to 15 minutes – going for near
Zero time integration
• Better Time-to-Market for business
• Pro-active monitoring of systems –
reduced downtime
• Improved User Experience
• Enterprise wide single platform
14. Lessons Learnt: Top Recommendations
• Understand your drivers
• Have a clear mapping of what you
want and what product can deliver
• Perform PoC with the right tools and
skilled resources
• Involve vendor during deployment
• Proactive vs. reactive monitoring
• Keep tuning till product matures in
your environment
15. Platform Reduces Cost vs. Point Solutions
Oracle IAM Suite
Benefits
Advantage
48% Cost Savings
Increased End-
User Productivity
Reduced Risk
• Emergency Access
• End-user Self Service
• 11% faster
• 30% faster
• Suspend/revoke/de-
• 46% faster
46% More
Responsive Enhanced Agility
provision end user access
• Integrate a new app faster
with the IAM infrastructure • 64% faster
• Integrate a new end user • 73% faster
35% Fewer Audit
Deficiencies
Enhanced
role faster into the solution
• Reduces unauthorized
• 14% fewer
Security and access
Compliance • 35% fewer
• Reduces audit deficiencies
Reduced Total • Reduces total cost of IAM
• 48% lower
Cost initiatives
Source: Aberdeen “Analyzing point solutions vs. platform” 2011
16. Building an Identity Roadmap
• Current Infrastructure, Identity Data, Stores
• Low hanging fruit, immediate needs/quick
Assess ROI wins
• Business vs. IT requirements
• Seamless Interoperability
Address • Audit Requirements
• Results from Implementation
• Upcoming business needs – cloud, social,
Audit mobile…to align with the roadmap
18. Aberdeen Group Event Series
Featuring Analyst Derek Brink
Chicago New York
April 10th April 12th
San Francisco
May 22nd
Toronto Boston
April 17th April 19th
19. Live Platform Webcast Series
Customers Discussing Results of Platform Approach
Platform Best Practices Cisco’s Platform Approach
Agilent Technologies Cisco Systems
February 15th 2012 March 14th 2012
(Replay available)
Platform for Compliance Platform Business Enabler
ING Bank Toyota Motors
April 11th 2012 May 30th 2012
Register at: www.oracle.com/identity
20. Identity Management at COLLABORATE 12
Deep Dive, User-Driven Sessions, and More
• April 22 – 26, Las Vegas
• Sunday, Apr 22, 9 am – 3 pm
Security and Compliance for your Oracle Systems
• Multiple Security, Identity Management sessions
(Keyword search: Identity Management)
Register at: http://w3.ioug.org/C12IM