1 / 40

CON 8874 :Securing Oracle Applications and the Extended Enterprise with Oracle IDM

CON 8874 :Securing Oracle Applications and the Extended Enterprise with Oracle IDM. Extending and Enhancing the Integrated Identity Management Solution. Matthew Berzinski Principle Product Manager Identity Management October 1, 2014. Agenda. Digital Disruption and the Need for Change. 1.

Download Presentation

CON 8874 :Securing Oracle Applications and the Extended Enterprise with Oracle IDM

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CON 8874:Securing Oracle Applications and the Extended Enterprise with Oracle IDM Extending and Enhancing the Integrated Identity Management Solution Matthew Berzinski Principle Product Manager Identity Management October 1, 2014

  2. Agenda Digital Disruption and the Need for Change 1 • Oracle Identity Management 2 • AppAdvantage™: Enterprise Identity Management 3 • Sony PlayStation Customer Success Story 4 4

  3. CAMPAIGNS CUSTOMER DATA MOBILE WORKFORCES SALES CITIZEN SERVICES MINING & EXPLORATION xaaS MOBILE AND SOCIAL SHIPPING LIFE INDUSTRIES BYOD MOBILE BANKING FOOD SERVICES Business Transformation HELP DESK BUSINESS PROCESS SERVICES CUSTOMER SATISFACTION ORDERS SOCIAL RETAIL CUSTOMER SATISFACTION CLOUD SERVICES PHARMACEUTICAL RESEARCH ONLINE HEALTHCARE HOSPITALITY & RESTURANTS MANUFACTURING 5

  4. Security Necessary to Transform • Banking & Finance • State & Federal Govt • Healthcare & Insurance • Transportation & Automotive • Education & Research “All Industries in all geographies are undergoing radical digital disruption.Meanwhile, the core of enterprise IT — infrastructure, applications such as ERP, information and sourcing — was built for the IT past and needs to be renovated for the digital future.” Gartner: February 2014 Taming the Digital Dragon: The 2014 CIO Agenda

  5. State of Application Security Today Monolithic & Fragmented Proprietary & Inconsistent Un-auditable & Un-reportable Costly & Complex

  6. THE GREAT RE-ARCHITECTURETRANSFORM OR BE DISPLACED

  7. Identity Fragmentation Disconnected Identity Solutions Create Risks and Costs SSO SSO User Mgt User Mgt Federated Cloud Apps AppEmbedded Identities • BREACH OF CUSTOMER DATA • INCONSISTENT ACCESS POLICIES • COSTLY COMPLIANCE ENFORCEMENT MobileApps Access Certification Basic SSO & Provisioning SSO User Mgt Access Cert Federation Custom Integrations LDAP LDAP LDAP

  8. Next State of Application Security How New Requirements are Driving Technology STRATEGIC SECURITY PROCESS & DATA STANDARDIZATION SCALABLE DEMAND SOCIAL ENABLEMENT NEW APPLICATION REQUIREMENTS INCREASED EFFICIENCIES SERVICE & SKILLS REUSABILITY FLEXIBLE MAINTENENCE COST REDUCTION SHARED SERVICES

  9. Five Transformational Principals Authorization & Governance Secure Mobile & Cloud Simplified Architecture Social Sign-on Single Sign-on

  10. Agenda Digital Disruption and the Need for Change 1 • Oracle Identity Management 2 • AppAdvantage™: Enterprise Identity Management 3 • Sony PlayStation Customer Success Story 4 12

  11. Cloud Enterprise Mobile ACCESS: Seamless and Secure Access to Any App from Any Device GOVERNANCE: Identify and Automate Who Has Access to What IDENTITYMANAGEMENT DIRECTORY: Secure and Scalable Identity Repository

  12. Oracle Identity Management Unifying Enterprise Identity Management • Modular and Unified • Best of Breed • Internet/Mobile Scale • Open Standards • Context Aware Risk Management

  13. Oracle Identity Management Governance Mobile Security • Mobile App Management • Mobile Access Management • API Security • Mobile Authenticator • Access Request • Access Governance • Automated Provisioning • Privileged Account Management Directory Access Management • Enterprise Directory • Cloud/Mobile App Directory • Virtual Directory • Authentication • Authorization • Audit • Federation

  14. Agenda Digital Disruption and the Need for Change 1 • Oracle Identity Management 2 • AppAdvantage™: Enterprise Identity Management: 3 • Sony PlayStation Customer Success Story 4 16

  15. SaaS SaaS Oracle’s Layered Framework: AppAdvantage Standardize and Consolidate Enterprise Applications while creating a common Integration and Security Layer Differentiate Differentiate Innovate Integration & Security Integration & Security Deliver business agility and enable secure end-to-end business transactions across applications in the cloud and on-premise Enable a secured, unified digital experience with anyone, from anywhere, at anytime, from any device Standardize Standardize Layer Layer Simplify Consolidate Consolidate Simplify Improve performance and uptime while reducing operational complexity and costs.

  16. SaaS SaaS Enterprise Identity Management: AppAdvantage Differentiate Differentiate Innovate Integration & Security Integration & Security Enable a secured, unified digital experience with anyone, from anywhere, at anytime, from any device Standardize Standardize Layer Layer Simplify Consolidate Consolidate Simplify

  17. Secure Unified Digital Experience Identity Provided Social Sign-on Federated OpenID OAuth SAML

  18. Reduced Operational Complexity COST 48%COST SAVINGS CENTRALIZED REPOSITORY CONSOLE CENTRALIZED EVENT REPOSITORY UNIFIED CONSOLE FOR ALL APPLICATIONS UNIFIEDPLATFORM FOR APPLYING THE SAME IDENTITY ACROSS ALL APPLICATIONS PATCHING PROVISION ONE SECURITY FRAMEWORK FOR PATCHING DEPLOY PLUG IN NEW APPLICATIONS AND APPLY POLICY Source: Aberdeen “Analyzing Point Solutions vs. Platform” 2011

  19. IDM for the Enterprise Enable a secured, unified and informed digital experience with anyone, from anywhere, at anytime, from any device • Enable multi channel access • Provide a unified Portal for customers, partners and employees • Integrate applications using the common Integration and Security platform • Manage cross enterprise business processes • Provide consistent role management, SSO and governance • Interoperate with multiple applications Customers Partners Employees Enterprise Mobility WebCenter Suite Business Process Management Identity and Access Management Data Integration Service Integration Legacy, ISV

  20. Business Benefits • IDM for the Enterprise • Automated customer, partner and employee interactions spanning multiple applications • Reduced costs through reduction/elimination in manual handling and IVR • Enhanced customer experience from open access to unified information and immediate responsiveness MultiChannel Access from Anywhere at Anytime from Any Device • Leverage existing skills & infrastructure by adopting a single mobile platform across multiple enterprise apps and extend to any device. • Unified user experience across multiple types of devices Enterprise-wide Identity and Access Management • Streamlined user experience with SSO through Cross Enterprise Authentication and Authorization • Single view of the customer across all channels Subsequent Marketing Value of Customer Experience • Directly influence future behavior through a 360° view of the customer. • Unified market view for trend analysis, buying patterns, etc.

  21. Agenda Digital Disruption and the Need for Change 1 • Multi Tiered Applications 2 • Oracle’s Layered Framework: AppAdvantage™ 3 • Sony Playstation Customer Success Story 4 23

  22. IDENTITY: SECURE, INTELLIGENT, MANAGED Securing Oracle Applications and the Extended Enterprise with Identity Management [CON8874]

  23. Company Overview • Sony Computer Entertainment America: • Division of Sony Corporation established in 1994. • Responsible for PlayStation brand in United States, Canada, and Latin America for PS2, PS3, PSVita, and PS4. • 20% of US Population own PlayStation products PS4 PS3 PS2 PSN PS Vita

  24. Sony Protecting Sony At start of IdM adoption, focus for SCEA was to mature from a product-oriented organization to a consumer-oriented organization. • Historical State • Manual user on-boarding process via emails; • Inefficient user ID generation process; • Cumbersome manual process for user termination and user updates; • Manual user off-boarding had inconsistent communications from HR to the helpdesk; • No centralized SSO authentication; • Manual quarterly SoD check process to produce Audit Reports; • Lack of preventative controls; • Process of account generation was carried in silos by the application

  25. Sony Protecting Sony • Business Benefits realized with IdMPlatform • Regular scans to detect SoD violations; Real-time SOD checks when responsibilities are provisioned to EBS; • Enabled automated zero-day provisioning to onboarding and business applications; one-stop management of applications, SOA components and databases with advanced dash-boarding; • Quick turn around time from helpdesk support – from a few days to a few minutes; Reduction in number of help desk support calls from 300 to about 30 per month; Ease of administrating access across multiple applications

  26. SCEA END-TO-END IDENTITY & ACCESS MANAGEMENT Darren Calman Access Management Identity Administration Access Governance Outcomes Preventative Web SSO Real-Time SoD Checks Order Mgmt Role & Rule Based Authentication Store HR Source Price Mgmt Financials Authorization New Hires, Transfers &Terminations iProjects Detective Identity Federation SoD Detection Return Mgmt Replenishment Optimization Advance Inventory Planning Compensation Mobile Security SoD Remediation Sourcing Value Chain Allocation Social Identity Connected Target Systems

  27. Next Steps • Rollout of Identity Management Analytics • Mobile Solution identity management • Leverage the framework to authenticate/authorize other native applications

  28. How did we go about it? • Executive Sponsorship • Change Management • Training • IT Governance • Chose Right Product & Implementation partner – Oracle/Simeio Solutions

  29. About Simeio Solutions • Leading Provider of IAM and IT Security Solutions • Identity & Access Management / Governance • IT Governance, Risk and Compliance • Global Reach • Over 10 Million Identities Managed

  30. Experience is Key to Success A typical enterprise undertakes one IdM project every decade • ….and will see project team turnover several times from the initial engagement A leading services organization will have engaged on 100s of IdM projects • We’ve seen it all. We can help you get the business value out of your IdM investment OR

  31. Closing Thoughts More organizations are viewing IAM as a business enabler • Improve the end-user experience or they will seek alternatives. The “value” of IAM increases as more Apps are managed • A more holistic view of your security posture comes into play as you bring more applications under management. Hybrid: Cloud and On-Premise Applications • While applications continue to move to the cloud, there will always be apps that reside on-prem. An IAM solution will need to integrate with both. Let business priorities drive your roadmap • A sound IAM foundation should be flexible enough to keep pace with customer and market demands. Technology is only one piece of the puzzle • People, processes, and experience are key elements of any successful IdM solution.

  32. Our Global Service Team For more information contact: Naynesh Patel, Sr. Partner | njpatel@simeiosolutions.com | +1-404-492-9731

  33. Q&A Session

  34. Identity Management Sessions Of Interest

  35. 2014 ORACLE FUSION MIDDLEWARE:CELEBRATE THIS YEAR'S MOST INNOVATIVE CUSTOMER SOLUTIONS ORACLE FUSION MIDDLEWARE INNOVATION Innovation Awards Ceremony set for: Tuesday, September 30, 2014 5:00-5:45pm in the LAM Research Theater (Session ID: CON7029)

  36. Complimentary eBook Register Now www.mhprofessional.com/mobsec Oracle Confidential – Internal/Restricted/Highly Restricted

  37. Join the Community Twittertwitter.com/OracleIDM Facebookfacebook.com/OracleIDM Oracle BlogsBlogs.oracle.com/OracleIDM Oracle IdM Websiteoracle.com/Identity Oracle Confidential – Internal/Restricted/Highly Restricted

More Related