21

Keynote oracle entitlement-driven idm

Embed Size (px)

DESCRIPTION

 

Citation preview

  • 1. 1 Copyright 2011, Oracle. Proprietary and Confidential

2. The Imperative for Entitlement-Driven IdentityManagementNormand SauvSecurity Sales ManagerCarl PotvinPrincipal Sales Consultant 3. The following is intended to outline our generalproduct direction. It is intended for informationpurposes only, and may not be incorporated into anycontract. It is not a commitment to deliver anymaterial, code, or functionality, and should not berelied upon in making purchasing decisions.The development, release, and timing of anyfeatures or functionality described for Oraclesproducts remains at the sole discretion of Oracle.3 Copyright 2011, Oracle. Proprietary and Confidential 4. The Situation Security breaches are proliferating Compliance costs are increasing 40% of IT budget spent on compliance Tougher regulatory environment4 Copyright 2011, Oracle. Proprietary and Confidential 5. The Trend is Set to ContinueThe Root Cause Of All Breaches Is Poor Access Control Total # of records compromised361 M by breaches4M Social Engineering Attacks Hacking for Fame (11% of all breaches) < 1M Hacking (up 10% from 2010) Privilege Abuse Hacking for FunSource: Verizon Data Breach Report 2011 (17% of all breaches)2004 20092011 1990199520002005 20085 Copyright 2011, Oracle. Proprietary and Confidential 6. Current Approach is Fragmented Hurts Transparency & Business Agility Disconnected Security Policy Poor Correlation for Forensics Fragmented View of User Costly IntegrationFragmentation causes Latency Removing separated users Detecting user job role change Restricting data access quicklySource: The Value of Corporate Secrets by Forrester Consulting (March 2010)6Copyright 2011, Oracle. Proprietary and Confidential 7. Today We Are ReactiveHarden PerimeterSocial Engineering AttacksSecure End-PointAttacks on Servers Invest in Monitoring Privileged Account Abuse We react...But criminals get wiser Most traditional security solutions get breached eventually7 Copyright 2011, Oracle. Proprietary and Confidential 8. We Need to Change Our Thinking Security should be proactive just like the bodys immune system prevents diseases8 Copyright 2011, Oracle. Proprietary and Confidential 9. Identity Management Has to Evolve Less Fragmentation Analytics Better Visibility Increased ROI Context Control Risk Management AuditAdministrationAuthentication Identity Tools Point SolutionsPlatformIntelligence9Copyright 2011, Oracle. Proprietary and Confidential 10. Analytics Actionable IntelligenceReport CertifyAcquire Correlate RemediateConvert Preventive Detective Automated certification review Analysis of who did what Intelligent risk scoring Correlation of activities Workflow based remediation Anomaly detection10 Copyright 2011, Oracle. Proprietary and Confidential 11. Context Trust but VerifyStep up Step upAuthorization AuthorizationAlertRulesPatternsBehavior Access: AuthenticationTransactional: Authorization Location and device aware Based on historical behavior Pattern detection Policy based Predictive analysis Knowledge based step up Authorized11Copyright 2011, Oracle. Proprietary and Confidential 12. Control Continuous and EfficientOnboard Mine &Define Declarative Security Change Offboard Change Test & Access DeployExternalized Policy User LifecycleRole Lifecycle Scalable enforcement AdministrationEntitlements Role based on boarding/change Separation of duties Central view of user access Central policy enforcement Immediate de-provisioning Dynamic RBAC12Copyright 2011, Oracle. Proprietary and Confidential 13. An Entitlement-Driven Approach to IdentityAdministerSynchronizeAccessIdentities AdministrationAccess Design BuildControlsControlsEntitlementDrivenMonitorAnalytics ControlsIntelligenceAuthority Automate Certify ReportingControls13 Copyright 2011, Oracle. Proprietary and Confidential 14. An Entitlement-Driven Platform Changes EverythingBeforeAfter An Entitlement-Driven Platform facilitates identity management based on intelligence and context14 Copyright 2011, Oracle. Proprietary and Confidential 15. The Platform Achieves Harmony Security Simplified support Governor Consistent and synchronized Single source of security policyAccessEnterpriseManager Integrated with Fusion MiddlewareSSO Integrated with Fusion AppsAdaptive DirectoryAccess ServicesManagerEntitlementsEnterpriseServerGatewayIdentityIdentityManager Analytics15 Copyright 2011, Oracle. Proprietary and Confidential 16. The Platform Makes All the Difference BenefitsOracle IAM Suite Advantage Increased End-User Productivity Emergency Access 11% faster End-user Self Service 30% faster Reduced Risk Suspend/revoke/de-provision enduser access 46% faster Bullet Enhanced Agility Integrate a new app faster withthe IAM infrastructure 64% faster Integrate a new end user role 73% fasterfaster into the solution Enhanced Security Reduces unauthorized access 14% fewerand Compliance Reduces audit deficiencies 35% fewer Reduced Total Cost Reduces total cost of IAM 48% lowerinitiatives Source: Aberdeen Group, June 201116Copyright 2011, Oracle. Proprietary and Confidential 17. Case Study Schneider National BUSINESS CHALLENGEORACLE SOLUTION 20,000 users scaling up to 65,000 on three Replace Tivoli Identity Manager with OIM for continents in a high availability configuration. password reset Systems include OTM (Oracle Transportation OAM for centralized Authn, Authz and SSO for Manager), many eBS modules, Siebel, AD,100s of apps Exchange, and several OIDs managing different ORM for corporate RBAC project user stores Real time integration of Siebel and eBS identities Decided to overhaul entire IT infrastructure,with OIM move away from legacy home grown and Provided virtualized single user store from packaged applications to support their businessdisparate populations with OVD Provide customers self-service access to their own accounts Enforce least- privilege access throughautomated provisioning for add, changes, and Ongoing M&A and divesture activitiesdisables (ORM / OIM) RESULTS Reduce the number of calls to the helpdesk for password reset Reduce the number of days to on-board users from 5 days to less than 24 hours Standardize the family of companies on an Identity Management platform reducing costs across theenterprise Reduce the complexity of the RBAC used to provide access to users17Copyright 2011, Oracle. Proprietary and Confidential17 18. One Company, One Solution, One Stack Proven vendor Acquire and retain best of breed technology and talent Battle-tested for large, mission-critical applications Referenceable, award-winning customer deployments Most complete and integrated best-of- breed portfolio Service-Oriented Security Interoperable components Future proof investment Standards-based and hot pluggable for easy integration Established deployment best practices Large implementation ecosystem18 Copyright 2011, Oracle. Proprietary and Confidential 19. Q&A19 | 2011 Oracle Corporation Proprietary and Confidential 20. 20 | 2011 Oracle Corporation Proprietary and Confidential 21. 21 | 2011 Oracle Corporation Proprietary and Confidential