Published on February 26, 2014
Innovating for a Secure Mobile Extended Enterprise Andy Smith Sr Director Product Management Feb 2014
Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Oracle Confidential – Do Not Distribute 2
THE NEW PERIMETER THE NETWORK IS NO LONGER THE POINT OF CONTROL DATA PEOPLE Unstructured & Structured Employees, Contractors Costumers & Partners DEVICES Phones, Servers, Laptops, Tablets Oracle Confidential – Do Not Distribute 3
Mobile Usage in the Enterprise Driven by IT Consumerization % 89 % 67 Mobile devices already connect to corporate networks Use tablets to work remotely 65% use to check email % 80 By 2015, mobile app development projects will outnumber native PC projects by 4-to-1 Source: Forbes: Mobile Business Statistics For 2012 Oracle Confidential – Do Not Distribute 4
Mobility Is A Significant Challenge for I.T. Bring Your Own Device (BYOD) Practices in 2011 74% Allow some sort of BYOD usage. 74% 10% Less than 10% “FULLY AWARE” of the devices accessing their network Forbes: Mobile Business Statistics For 2012 Top Mobility Challenges for CIOs Securing corporate information 41% Integrating with other systems 31% Supporting multiple devices 28% CIO Insight: Top Challenges of Enterprise Mobility, 2012 Oracle Confidential – Do Not Distribute Mobility is Expensive 41% CIOs cited Mobility is expensive & a critical challenge Up to$250 per device/ annually Includes cost of connectivity, infrastructure and support McKinsey, 2012: Mobility Disruption: A CIO Perspective 5
Security leads enterprise buying demand Oracle Confidential – Do Not Distribute 6
10% Store Passwords in Plain Text % 58 % 35 % 76 Building mobile application stores Reported lost or stolen devices Store credentials on the device Source: Partnerpedia Survey Aug 2011 Source: Norton Cybercrime 2012 Oracle Confidential – Do Not Distribute Source: Information week Aug 2011 7
DEFINING Mobile Security Mobile Application Management Mobile Device Management Mobile Security Mobile Enterprise Application Platform Secure Application Access Oracle Confidential – Do Not Distribute 8
How To Secure Corporate Data In A BYOD World? Mobile Application Management: Create a secure container that separates corporate data and apps from personal Oracle Confidential – Do Not Distribute 9
Oracle’s STRATEGY APPLICATIONS CRM MOBILE PLATFORM MOBILE SECURITY ERP MOBILE SUITE 10 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Confidential – Do Not Distribute 10
Today’s Identity Management – 11gR2 PS2 Secure REST API’s SSO, OAuth, Federation Device Security, Strong Auth Access Management Secure Mobile APIs, SSO and Web Services For the API Economy Extend existing IDM infrastructure • NEW: 2 Factor Auth, Mobile SSO, Oauth Develop secure consumer facing bespoke applications • Web, Native and Hybrid applications API Management Transformation API Monitoring iOS and Android SDKs Oracle Confidential – Do Not Distribute 11
Oracle’s STRATEGY CONTAINER Isolate corporate data, support remote wipe, restrict data transfer CONTROL EXPERIENCE Role based access, self Secure applications & communication, corporate service request, sign-on, fraud detection application store MOBILE SECURITY SUITE 12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Confidential – Do Not Distribute 12
THE NEW IDENTITY MANAGEMENT OPEN, INTEGRATED, BEST OF BREED DIRECTORY SERVICES ACCESS MANAGEMENT IDENTITY GOVERNANCE To Handle 100s of Millions of Users Supporting Mobile, Social and Cloud With BYOD Support Oracle Confidential – Do Not Distribute 13
Oracle Mobile Security Addressing Customer Requirements for Mobile Security • Mobile Security Suite that can extend the Oracle IDM platform • Separate personal and corporate apps and data • Application centric solution – avoid device lockdown • Extend Identity Management platform to manage the lifecycle of applications and containers • Extend Access Management platform to mobile devices and applications • Oracle/ADF Mobile Apps secure-by-default by consuming these security services Oracle Confidential – Do Not Distribute 14
Oracle Mobile Solution Secure Mobile Workspace - Separate personal and corporate data Secure Intranet Authentication / SSO Secure Mail Data at Rest Encryption Data in Transit Encryption Browser PIM (email, calendar, contacts, tasks, notes) Secure Files Doc Editor File Manager Secure Apps Enterprise Apps DLP Policy App Distribution Oracle Confidential – Do Not Distribute App Catalog 15
Native App Protection Delegated security model with app containerization • App Containerization adds security layer for bespoke and COTs apps after development • Decouple security deployment & app development • Injection-based approach. No SDK. • SSO, secure access and DLP enforcement Oracle Confidential – Do Not Distribute 16
Secure access with App Tunnel No VPN Required • • • • Identity and remote access coupled Prevent rogue apps Access to internal network only for white-listed apps Unlike IPSEC, no CPU and network overhead Oracle Confidential – Do Not Distribute 17
Oracle Identity Management Extending the Platform with a Discreet Mobile Security Solution Identity Governance Access Management Web Single Sign-on Approval Workflows Federation Automated Provisioning Social Identity Access HR Reconciliation Externalized Authorizations Access Certification and SOD SOA and API Security Role Lifecycle Management Integrated ESSO Privileged Account Management Token Services User Management & Self Service Mobile App Access Management Entitlement Catalogue/App Store Secure Mobile Gateway Device and Container Management Secure Container Oracle Confidential – Do Not Distribute System Management and Monitoring Directory Services LDAP Storage/ Virtual/ Meta Directory Device Store Mobile Security Access Request Management 18
Oracle Mobile Security Suite Steady State Architecture Corporate Network HTTP/REST/SOAP/OAUTH Corporate DMZ Oracle API Gateway REST/Mobile Security OAM Protected Resources Oracle Access Manager With Mobile & Social Oracle Identity Governance with Mobile Application Mgmt Device & Policy Registry (OID/OUD) Oracle Mobile Access Server App Tunnel Apple/Google Push Notification SOAP/REST and Legacy Web Services Oracle Confidential – Do Not Distribute 19
IDENTITY FOR THE EXTENDED ENTERPRISE A PLATFORM FOR ENTERPRISE, CLOUD & MOBILE One Identity Platform Oracle Oracle Confidential Confidential – Do Not Distribute 20
New: Oracle Identity Management Mobile Application Security Enabling Cloud API Economy Cloud Identity Services • Separating and managing corporate apps/data on Mobile devices • Secure API management • Seamless SSO for mobile bespoke applications • OAuth 2.0 Server support • Cloud Access Portal • Core Identity Services Rapidly Available as a Managed Service • Unstructured Data Protection with OES • Web services-based Cloud connectors Oracle Confidential – Do Not Distribute Enterprise Identity Services • Modernized access request and certification • Session recording for shared accounts • Consistent governance for cloud, mobile and enterprise applications 21
Questions Oracle Confidential – Do Not Distribute 22
Oracle Confidential – Do Not Distribute 23
Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...
In this presentation we will describe our experience developing with a highly dyna...
Presentation to the LITA Forum 7th November 2014 Albuquerque, NM
Un recorrido por los cambios que nos generará el wearabletech en el futuro
Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...
Overview; Oracle Identity and ... Oracle Identity and Access Management. ... Oracle Mobile Security. Oracle API Gateway. Oracle Enterprise Single Sign-On ...
Home > Products > Identity Manager > Overview. ... New security holes are ... A Promising Trend - 21st CENTURY IT - CSC zu Cloud, Cybersecurity, Mobile ...
IDM UltraEdit Mobile 15.2: Overview, Price - Catalog Of Products: ... Internet Security 2014 and Total Security 2014 plus Free PC Booster 7 for 3 PC. ...
Security and Antivirus Center; ... "IDM is Best Download Manager By Tonic" ... Mobile User Agreement; Download.com. Powered by CNET.
Overview About Product Security, IDM and SSO by woodt in Types > Presentations
Mobile Sicherheit. Oracle bietet ein allumfassendes Angebot zum Eindämmen der Risiken, die mit mobilen Geräten der aktuellen Generation einhergehen.
... wird der Begriff IdM als Verwaltung von Attributen einer Einheit verstanden ... Mobile Business & Multilateral Security, Goethe-Universität Frankfurt a.M.
Make Compliance a Seamless Part of Your Security Workflow; ... SAP NetWeaver Mobile ... SAP Identity Management as of IdM release 8.0 can now manage user ...
SAP Community Network homepage for SAP Identity Management (SAP IdM). Learn about SAP's approach for helping companies centrally manage their user accounts ...