SlideShare una empresa de Scribd logo
1 de 30
1

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
CON 8810 Who Should Have
Access to What – Better Risk
Management with Identity
Governance
Neil Gandhi
Product Manager
Oracle Identity Governance

2

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Safe Harbor Statement
The following is intended to outline our general product direction. It is
intended for information purposes only, and may not be incorporated
into any contract. It is not a commitment to deliver any material, code,
or functionality, and should not be relied upon in making purchasing
decision. The development, release, and timing of any features or

functionality described for Oracle’s products remains at the sole
discretion of Oracle.

3

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Session Goals
 Understand the current market trends regarding Access Compliance

and Risk Management
 Realize the benefits of an Identity Governance platform and how it can
help meet your everyday Compliance and Risk Management
challenges
 Hear from and engage with customers regarding their experiences with
managing Risk by implementing an Identity Governance solution

4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Program Agenda
 Market Trends
 Risk Management & Compliance with Oracle Identity

Governance
 Panel Discussion
 Q&A

5

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Market Trends

6

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Explosion of Scale

• Few Administrators
• Handful of Audit Staff
• Too many privileged accounts
7

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Getting the right access is hard

8

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Market Trends
Compliance Requires Business User Participation
 Increasing volume and frequency of

employee access certifications
 Business Users do not understand what

they are attesting to
 IT and Compliance teams struggle with

“Who should have access to what”

9

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Enterprise Certification Requirements
Who’s who & what can they do?
Extract
Entitlement
s
Ad Hoc

10

Review
Entitlement
s
Complex

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Correlate
Results

Remediate
Access

Un-auditable

Non-verifiable
Market Trends
Scale requirements are increasing

Corp PCs
400M
Enterprise

Facebook
800M
Social

China
1.3B
Citizen

Cell Phones
5B +
Mobile

Moving from employee to massive scale for even small companies.

11

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Risk Management &
Compliance with Oracle
Identity Governance

12

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Oracle Identity Governance
Governance Platform

Connectors

Provision

De-Provision

Grant User Access

Monitor User Access

Privileged
Account
Request

Access
Request

Role
Lifecycle
Management

Roles

Check-in/
Checkout

Identity
Certifications

Access Catalog

IT Audit
Monitoring

Rogue
Detection &
Reconciliation

Ownership, Risk & Audit Objectives

Entitlements
Accounts
Glossaries

13

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Reporting &
Privileged
Access
Monitoring

Catalog Management
Oracle Identity Governance
Access Catalog

Harvesting

Catalog
Definition

Catalog
Enrichment

14

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Oracle Identity Manager
Provisioning with Preventative SOD Controls

15

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
A Smarter Approach to Identity Compliance
Reduce
Cost, Time & Risk

$
Identity
Warehouse

Aggregating
Information &
Building a
Catalog

16

Prioritizing &
Automating
Certification

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Closed-Loop
Feedback &
Remediation

Simplified User
Experience &
Reporting
Automate Identity Based Controls
1

Set Up
Periodic
Review

2

Reviewer Is Notified
Goes to Self Service

3

Automated Action

is taken based on
Periodic Review

4

Report Built
And Results

Stored in DB

Reviewer Selections
What Is
Reviewed?

Certify

Reject

Who Reviews
It?

Decline

Email Result
to User

Automatically
Terminate User via
Closed Loop
Remediation

Notify the
Process Owner

Archive
Delegate

Start When?
How Often?

17

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Notify Delegated
Reviewer

Attested Data
Attestation Actions
Delegation Paths

Comments
Oracle Identity Manager 11g R2
Provisioning Context with Identity Auditor

18

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Focusing on What (Who) Matters Most

High Risk
 Leverage data collected to streamline access certification
 Prioritize certifications based on user risk profiles
 Aggregate risk profile over the ENTIRE lifecycle

19

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Risk Based Certification
Identity Warehouse

Applications

Risk Factors
Identity Data
Sources
DB
Roles

Certification
History

Entitlements

Mainframe

Provisioning
Events

Resources

Risk Aggregation

Low Risk User
Bulk Certify

High Risk User
Cert360

Approve
Reject
Focused
Sign-off

20

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Policy
Violations
Automate The Remediation
Entitlement
Report

Entitlement
Review
AutoRemediate

21

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

• Focus Loop Remediation
Close on Large Scale
• Quick Extract Desk Volume
Reduce Help Transform Load
• Rolling Certifications
Complete Audit Trail
• Rolling Data Import
Increase Throughput
• Large Volume Remediation
Customer Panel Discussion

22

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Customer Panel

Patrick Landry

23

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

David Mathias

Robert House
Demo Pods
Moscone South

Oracle Identity
Governance Suite:
Managing
Privileged Accounts
from Your Identity
Platform

24

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Moscone South

Oracle Identity
Governance Suite:
Complete Identity
Lifecycle
Management

Moscone South

Identity
Management
Monitoring with
Oracle Enterprise
Manager
Sessions Not to Miss
Tuesday
10:30 am – 11:30am

• CON8811: Converged Identity
Governance for Speeding up Business
and Reducing Cost

Moscone West, Room 2018

• Justifying and Planning a Successful
Identity Management Upgrade

Moscone West, Room 2018

Wednesday
1.15 pm – 2.15 pm

25

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Join the Oracle Community
Twitter
twitter.com/OracleIDM
Facebook
facebook.com/OracleIDM
Oracle Blogs
Blogs.oracle.com/OracleIDM

Oracle.com/Identity

26

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Innovation Awards
18 Winners Across Eight Categories

Lam Research Theater (Next to Moscone North)
Session ID: CON8082
Session Title: Oracle Fusion Middleware: Meet This
Year’s Most Impressive Innovators
Venue / Room: YBCA - Lam Research Theater
Date and Time: Monday Sep 23, 4:45 - 5:45 p.m.

27

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Oracle Fusion Middleware
Business Innovation Platform for the Enterprise and Cloud
 Complete and Integrated
Web

Social

Mobile

 Best-in-class

User Engagement
Business
Process
Management

 Open standards
Content
Management

Service Integration

Business
Intelligence

Data Integration

Identity Management
Development
Tools

28

Cloud Application
Foundation

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Enterprise
Management

 On-premise and Cloud
 Foundation for Oracle Fusion
Applications and Oracle Cloud
29

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
30

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Más contenido relacionado

La actualidad más candente

Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management IntroductionAidy Tificate
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference ArchitectureHannu Kasanen
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTForgeRock
 
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...Profesia Srl, Lynx Group
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summaryBrandon Dunlap
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsBertrand Carlier
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionCA API Management
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Jack Forbes
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will failIBM Security
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a serviceDell World
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementEMC
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum
 

La actualidad más candente (20)

Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
CA Technologies and Deloitte: Unleash and Protect your Business with Identity...
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
IdM Reference Architecture
IdM Reference ArchitectureIdM Reference Architecture
IdM Reference Architecture
 
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENTFUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
FUTURE-PROOFING CONSUMER IDENTITY AND ACCESS MANAGEMENT
 
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
#3 Wso2 masterclassitalia - wso2 Identity Server: must-have per gestire le id...
 
Cloud computing identity management summary
Cloud computing identity management summaryCloud computing identity management summary
Cloud computing identity management summary
 
Identiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundationsIdentiverse 2021 enterprise identity: What foundations
Identiverse 2021 enterprise identity: What foundations
 
Identity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT MissionIdentity Management for the 21st Century IT Mission
Identity Management for the 21st Century IT Mission
 
IDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENTIDENTITY ACCESS MANAGEMENT
IDENTITY ACCESS MANAGEMENT
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
5 reasons your iam solution will fail
5 reasons your iam solution will fail5 reasons your iam solution will fail
5 reasons your iam solution will fail
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
Tuebora Self Driven IAM
Tuebora Self Driven IAMTuebora Self Driven IAM
Tuebora Self Driven IAM
 
Mt26 identity management as a service
Mt26 identity management as a serviceMt26 identity management as a service
Mt26 identity management as a service
 
Intelligence Driven Identity and Access Management
Intelligence Driven Identity and Access ManagementIntelligence Driven Identity and Access Management
Intelligence Driven Identity and Access Management
 
Evolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access managementEvolveum: All you need to know about identity & access management
Evolveum: All you need to know about identity & access management
 

Destacado

Indias gift to_the_world_2_epdf
Indias gift to_the_world_2_epdfIndias gift to_the_world_2_epdf
Indias gift to_the_world_2_epdfMb Narayanan
 
Leikko: Sussa on seksii - tietoa ja näyttöön perustuvia menetelmiä
Leikko: Sussa on seksii - tietoa ja näyttöön perustuvia menetelmiäLeikko: Sussa on seksii - tietoa ja näyttöön perustuvia menetelmiä
Leikko: Sussa on seksii - tietoa ja näyttöön perustuvia menetelmiäKouluterveyskysely
 
Our GBU bioepistemological educational project (BEEMP)
Our GBU bioepistemological educational project (BEEMP)Our GBU bioepistemological educational project (BEEMP)
Our GBU bioepistemological educational project (BEEMP)gbgupresentations
 
Imperia esfera gurgaon 37 c Imperia 7428424386
Imperia esfera  gurgaon 37 c Imperia 7428424386Imperia esfera  gurgaon 37 c Imperia 7428424386
Imperia esfera gurgaon 37 c Imperia 7428424386Adore Global Pvt. Ltd
 
Early national literature
Early national literatureEarly national literature
Early national literaturems_faris
 
Post new korean cinema
Post new korean cinemaPost new korean cinema
Post new korean cinema문정 최
 
Middle Ages/Canterbury Tales
Middle Ages/Canterbury TalesMiddle Ages/Canterbury Tales
Middle Ages/Canterbury Talesms_faris
 
Mff715 w1 2_generating_researchideas_fall11
Mff715 w1 2_generating_researchideas_fall11Mff715 w1 2_generating_researchideas_fall11
Mff715 w1 2_generating_researchideas_fall11Rachel Chung
 
философия возраста
философия возрастафилософия возраста
философия возрастаsoratniki
 
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014Awards Ceremony: Top Awards, Romain Rolland FLS, 2014
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014Tanya Madjarova
 

Destacado (20)

The Implementation of CSR in European Football by Geoff Walters
The Implementation of CSR in European Football by Geoff WaltersThe Implementation of CSR in European Football by Geoff Walters
The Implementation of CSR in European Football by Geoff Walters
 
Indias gift to_the_world_2_epdf
Indias gift to_the_world_2_epdfIndias gift to_the_world_2_epdf
Indias gift to_the_world_2_epdf
 
Leikko: Sussa on seksii - tietoa ja näyttöön perustuvia menetelmiä
Leikko: Sussa on seksii - tietoa ja näyttöön perustuvia menetelmiäLeikko: Sussa on seksii - tietoa ja näyttöön perustuvia menetelmiä
Leikko: Sussa on seksii - tietoa ja näyttöön perustuvia menetelmiä
 
Guión ingles
Guión inglesGuión ingles
Guión ingles
 
World Renaissance Nov 2011
World Renaissance Nov 2011World Renaissance Nov 2011
World Renaissance Nov 2011
 
Our GBU bioepistemological educational project (BEEMP)
Our GBU bioepistemological educational project (BEEMP)Our GBU bioepistemological educational project (BEEMP)
Our GBU bioepistemological educational project (BEEMP)
 
Nltrv55
Nltrv55Nltrv55
Nltrv55
 
Imperia esfera gurgaon 37 c Imperia 7428424386
Imperia esfera  gurgaon 37 c Imperia 7428424386Imperia esfera  gurgaon 37 c Imperia 7428424386
Imperia esfera gurgaon 37 c Imperia 7428424386
 
affTA03 - BAB III
affTA03 - BAB IIIaffTA03 - BAB III
affTA03 - BAB III
 
affTA00 - Cover dan Daftar
affTA00 - Cover dan DaftaraffTA00 - Cover dan Daftar
affTA00 - Cover dan Daftar
 
C 3
C 3C 3
C 3
 
Early national literature
Early national literatureEarly national literature
Early national literature
 
Trololo
TrololoTrololo
Trololo
 
SEO再入門
SEO再入門SEO再入門
SEO再入門
 
Post new korean cinema
Post new korean cinemaPost new korean cinema
Post new korean cinema
 
Middle Ages/Canterbury Tales
Middle Ages/Canterbury TalesMiddle Ages/Canterbury Tales
Middle Ages/Canterbury Tales
 
Mff715 w1 2_generating_researchideas_fall11
Mff715 w1 2_generating_researchideas_fall11Mff715 w1 2_generating_researchideas_fall11
Mff715 w1 2_generating_researchideas_fall11
 
философия возраста
философия возрастафилософия возраста
философия возраста
 
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014Awards Ceremony: Top Awards, Romain Rolland FLS, 2014
Awards Ceremony: Top Awards, Romain Rolland FLS, 2014
 
Celiac disease from gut to brain
Celiac disease from gut to brainCeliac disease from gut to brain
Celiac disease from gut to brain
 

Similar a Oracle Identity Governance Risk Management Access

Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Oracle big data and rtd v5
Oracle big data and rtd v5Oracle big data and rtd v5
Oracle big data and rtd v5techsuda
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...GregOracle
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 
GRC Advanced Controls OOW2014 Stop Financial Leakage - Cisco, Noble Energy, ...
GRC Advanced Controls  OOW2014 Stop Financial Leakage - Cisco, Noble Energy, ...GRC Advanced Controls  OOW2014 Stop Financial Leakage - Cisco, Noble Energy, ...
GRC Advanced Controls OOW2014 Stop Financial Leakage - Cisco, Noble Energy, ...Oracle
 
Optimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOptimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOracle
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Oracle
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & ImplementationsThousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & ImplementationsOracle
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Oracle
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationDelivery Centric
 
Lean Development Practices for Enterprise Agile
Lean Development Practices for Enterprise AgileLean Development Practices for Enterprise Agile
Lean Development Practices for Enterprise AgileTechWell
 
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...Oracle
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Integrating Enterprise Controls with the Cloud
Integrating Enterprise Controls with the CloudIntegrating Enterprise Controls with the Cloud
Integrating Enterprise Controls with the CloudAtul Goyal
 
Daniel Burian, Oracle @ TMT.CustomerExperience'13
 Daniel Burian, Oracle @ TMT.CustomerExperience'13 Daniel Burian, Oracle @ TMT.CustomerExperience'13
Daniel Burian, Oracle @ TMT.CustomerExperience'13Ewa Stepien
 

Similar a Oracle Identity Governance Risk Management Access (20)

Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Oracle 360
Oracle 360Oracle 360
Oracle 360
 
Oracle big data and rtd v5
Oracle big data and rtd v5Oracle big data and rtd v5
Oracle big data and rtd v5
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
GRC Advanced Controls OOW2014 Stop Financial Leakage - Cisco, Noble Energy, ...
GRC Advanced Controls  OOW2014 Stop Financial Leakage - Cisco, Noble Energy, ...GRC Advanced Controls  OOW2014 Stop Financial Leakage - Cisco, Noble Energy, ...
GRC Advanced Controls OOW2014 Stop Financial Leakage - Cisco, Noble Energy, ...
 
Optimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced ControlsOptimizing order to-cash (e-business suite) with GRC Advanced Controls
Optimizing order to-cash (e-business suite) with GRC Advanced Controls
 
Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824Advanced Controls access and user security for superusers con8824
Advanced Controls access and user security for superusers con8824
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & ImplementationsThousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
Lean Development Practices for Enterprise Agile
Lean Development Practices for Enterprise AgileLean Development Practices for Enterprise Agile
Lean Development Practices for Enterprise Agile
 
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
Symantec, Facebook and Navillus - a comprehensive approach to securing & moni...
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Integrating Enterprise Controls with the Cloud
Integrating Enterprise Controls with the CloudIntegrating Enterprise Controls with the Cloud
Integrating Enterprise Controls with the Cloud
 
Daniel Burian, Oracle @ TMT.CustomerExperience'13
 Daniel Burian, Oracle @ TMT.CustomerExperience'13 Daniel Burian, Oracle @ TMT.CustomerExperience'13
Daniel Burian, Oracle @ TMT.CustomerExperience'13
 

Más de OracleIDM

Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1OracleIDM
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12OracleIDM
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2OracleIDM
 

Más de OracleIDM (20)

Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2
 

Último

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Último (20)

Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Oracle Identity Governance Risk Management Access

  • 1. 1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 2. CON 8810 Who Should Have Access to What – Better Risk Management with Identity Governance Neil Gandhi Product Manager Oracle Identity Governance 2 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 3. Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decision. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 4. Session Goals  Understand the current market trends regarding Access Compliance and Risk Management  Realize the benefits of an Identity Governance platform and how it can help meet your everyday Compliance and Risk Management challenges  Hear from and engage with customers regarding their experiences with managing Risk by implementing an Identity Governance solution 4 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 5. Program Agenda  Market Trends  Risk Management & Compliance with Oracle Identity Governance  Panel Discussion  Q&A 5 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 6. Market Trends 6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 7. Explosion of Scale • Few Administrators • Handful of Audit Staff • Too many privileged accounts 7 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 8. Getting the right access is hard 8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 9. Market Trends Compliance Requires Business User Participation  Increasing volume and frequency of employee access certifications  Business Users do not understand what they are attesting to  IT and Compliance teams struggle with “Who should have access to what” 9 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 10. Enterprise Certification Requirements Who’s who & what can they do? Extract Entitlement s Ad Hoc 10 Review Entitlement s Complex Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Correlate Results Remediate Access Un-auditable Non-verifiable
  • 11. Market Trends Scale requirements are increasing Corp PCs 400M Enterprise Facebook 800M Social China 1.3B Citizen Cell Phones 5B + Mobile Moving from employee to massive scale for even small companies. 11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 12. Risk Management & Compliance with Oracle Identity Governance 12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 13. Oracle Identity Governance Governance Platform Connectors Provision De-Provision Grant User Access Monitor User Access Privileged Account Request Access Request Role Lifecycle Management Roles Check-in/ Checkout Identity Certifications Access Catalog IT Audit Monitoring Rogue Detection & Reconciliation Ownership, Risk & Audit Objectives Entitlements Accounts Glossaries 13 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Reporting & Privileged Access Monitoring Catalog Management
  • 14. Oracle Identity Governance Access Catalog Harvesting Catalog Definition Catalog Enrichment 14 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 15. Oracle Identity Manager Provisioning with Preventative SOD Controls 15 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 16. A Smarter Approach to Identity Compliance Reduce Cost, Time & Risk $ Identity Warehouse Aggregating Information & Building a Catalog 16 Prioritizing & Automating Certification Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Closed-Loop Feedback & Remediation Simplified User Experience & Reporting
  • 17. Automate Identity Based Controls 1 Set Up Periodic Review 2 Reviewer Is Notified Goes to Self Service 3 Automated Action is taken based on Periodic Review 4 Report Built And Results Stored in DB Reviewer Selections What Is Reviewed? Certify Reject Who Reviews It? Decline Email Result to User Automatically Terminate User via Closed Loop Remediation Notify the Process Owner Archive Delegate Start When? How Often? 17 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Notify Delegated Reviewer Attested Data Attestation Actions Delegation Paths Comments
  • 18. Oracle Identity Manager 11g R2 Provisioning Context with Identity Auditor 18 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 19. Focusing on What (Who) Matters Most High Risk  Leverage data collected to streamline access certification  Prioritize certifications based on user risk profiles  Aggregate risk profile over the ENTIRE lifecycle 19 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 20. Risk Based Certification Identity Warehouse Applications Risk Factors Identity Data Sources DB Roles Certification History Entitlements Mainframe Provisioning Events Resources Risk Aggregation Low Risk User Bulk Certify High Risk User Cert360 Approve Reject Focused Sign-off 20 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Policy Violations
  • 21. Automate The Remediation Entitlement Report Entitlement Review AutoRemediate 21 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. • Focus Loop Remediation Close on Large Scale • Quick Extract Desk Volume Reduce Help Transform Load • Rolling Certifications Complete Audit Trail • Rolling Data Import Increase Throughput • Large Volume Remediation
  • 22. Customer Panel Discussion 22 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 23. Customer Panel Patrick Landry 23 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. David Mathias Robert House
  • 24. Demo Pods Moscone South Oracle Identity Governance Suite: Managing Privileged Accounts from Your Identity Platform 24 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Moscone South Oracle Identity Governance Suite: Complete Identity Lifecycle Management Moscone South Identity Management Monitoring with Oracle Enterprise Manager
  • 25. Sessions Not to Miss Tuesday 10:30 am – 11:30am • CON8811: Converged Identity Governance for Speeding up Business and Reducing Cost Moscone West, Room 2018 • Justifying and Planning a Successful Identity Management Upgrade Moscone West, Room 2018 Wednesday 1.15 pm – 2.15 pm 25 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 26. Join the Oracle Community Twitter twitter.com/OracleIDM Facebook facebook.com/OracleIDM Oracle Blogs Blogs.oracle.com/OracleIDM Oracle.com/Identity 26 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 27. Innovation Awards 18 Winners Across Eight Categories Lam Research Theater (Next to Moscone North) Session ID: CON8082 Session Title: Oracle Fusion Middleware: Meet This Year’s Most Impressive Innovators Venue / Room: YBCA - Lam Research Theater Date and Time: Monday Sep 23, 4:45 - 5:45 p.m. 27 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 28. Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud  Complete and Integrated Web Social Mobile  Best-in-class User Engagement Business Process Management  Open standards Content Management Service Integration Business Intelligence Data Integration Identity Management Development Tools 28 Cloud Application Foundation Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Enterprise Management  On-premise and Cloud  Foundation for Oracle Fusion Applications and Oracle Cloud
  • 29. 29 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 30. 30 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Notas del editor

  1. Notes:Extract Entitlements
  2. With Fusion Middleware, you can extend and maximize your existing technology investment with the same technologies used in Fusion Applications, including embedded analytics and social collaboration, and mobile and cloud computing. Oracle’s complete SOA platform lets your IT organization rapidly design, assemble, deploy, and manage adaptable business applications and—with Oracle’s business process management tools—even bring the task of modeling business processes directly to the business analysts. Oracle Business Intelligence foundation brings together all your enterprise data sources in a single, easy-to-use solution, delivering consistent insights whether it’s through ad hoc queries and analysis, interactive dashboards, scorecards, OLAP, or reporting. And, your existing enterprise applications can leverage the rich social networking capabilities and content sharing that users have come to expect in consumer software. Oracle Fusion Middleware is based on 100 percent open standards, so you aren’t locked into one deployment model when your business requirements change.