Securing access inabyod-world-final-ext
-
Upload
oracleidm -
Category
Technology
-
view
3.838 -
download
0
description
Transcript of Securing access inabyod-world-final-ext
<Insert Picture Here>
Amit JasujaGroup Vice President, Identity Management, Oracle
Securing Access from Mobile Devices
This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.
Agenda
• The Oracle Lens
• Risk, Cost & Scale
• A Platform Approach
Scale 58% Building corporate mobile Application stores
Partnerpedia Survey Aug 2011
Mobile Security is Beyond Device ManagementMobile Security Starts Inside
Cost
50% Of help desks struggle toKeep up with mobile support Source: Mobility Revolution Redux mar 2012
Risk Mobile applications store username as text and 10% password in plain text76%
Source: Information week Aug 2011
Scale : More Types of DevicesEveryone & Everything Connected to the Network
5.9BSource: Mobility Revolution Redux mar 2012
Devices globally today ~30% connect to corporate network
Reduce Risk By Becoming Context AwareTrust but Verify
POINT
• Location aware
• Device aware
• Time aware
• Risk aware
• Historical behavior
Reduce Cost & Increase Security With Trust Mobile Single Sign-on
TrustRisk
REST API OAuth iOS Android
Improve Scale by Simplifying Administration Know Your Users and Privileges
Administrators
Applications
Cart
• Access on demand
• Simplify deployment
• Simplify user experience
• Reduce audit exposure
• Improve visibility
Access
Mobile Security Begins With an Identity PlatformComplete, Innovative and Integrated
Directory
• Location Data • Centralized Auth• Device & User Data
Access• Fraud Detection• Single-Sign On• Restful Interfaces
Identity Governance
• User Lifecycle• Access Provisioning• Delegated Admin
• Risk Analytics• Access Certification• Role Management
Platform Reduces Cost vs. Point Solutions
46%
Cost Savings
Source: Aberdeen “Analyzing point solutions vs. platform” 2011
BenefitsOracle IAM Suite
Advantage
Increased End-User Productivity
• Emergency Access
• End-user Self Service
• 11% faster
• 30% faster
Reduced Risk • Suspend/revoke/de-provision end user access
• 46% faster
Enhanced Agility • Integrate a new app faster with the IAM infrastructure
• Integrate a new end user role faster into the solution
• 64% faster
• 73% faster
Enhanced Security and Compliance
• Reduces unauthorized access
• Reduces audit deficiencies
• 14% fewer
• 35% fewer
Reduced Total Cost • Reduces total cost of IAM initiatives
• 48% lower
48%More Responsive
35% Fewer Audit Deficiencies
Take a Security Inside Out Approach
• Reduce the risk
• Reduce the cost of support
• Secure access to the “crown jewels”
• Simplify administration
We Can Help Develop a Strategy
Setup Free Workshop
Schedule aDemonstration
Develop an ROIAnalysis
Speak with References