SlideShare a Scribd company logo
1 of 29
1

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Securely Enabling Mobile
Access for Business
Transformation
Lee Howarth
Oracle Product Management
Safe Harbor Statement
The following is intended to outline our general product
direction. It is intended for information purposes only, and
may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality,
and should not be relied upon in making purchasing
decisions. The development, release, and timing of any
features or functionality described for Oracle’s products
remains at the sole discretion of Oracle.

3

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Program Agenda
 Introduction to Mobile Security
 Oracle’s Mobile Security Technology

 Planning for Secure Mobile Access
– Customer Case Studies

4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Mobile Market Trends - Security is essential
Companies exposing more APIs and services on
the Internet to support mobile applications

%
90
companies
with mobile
apps in
2014

5

76% of Mobile Apps store passwords on the
device – 10% in plain text
2/3 companies expect to deploy corporate app
stores to control delivery of mobile applications

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Mobile Security - Challenges on IT
 IT has to manage the typical

Control

Access

struggle between access and
control

 IT is asking itself:
– How do I enable the business to

take advantage of mobile access,
while maintaining required levels of
control
– How do we maximize the user

experience while minimizing risk
– How do we support the

organizations BYOD policy

6

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Why is mobile causing IT more headaches?
 Mobile access complicates information and application

architecture discussions

•

How secure is the
network?
Do we need offline
support?
What happens to
corporate data when the
device is lost or stolen?
What policies control
access to application and
data?
How will the device
connect (WiFi/cell)?
Where will it connect
from (GEO)?

•
•
•
•

•

7

Ownership

Device/App Type

Security
•
•
•
•

•

Which devices should we
support (iOS, Android..)?
What’s the best type of
application (Web, Hybrid,
Native)?
How to quickly develop
secure apps?
How do we run corporate
apps in a secured
encrypted environment
without inhibiting mobile
productivity?
Where to securely host to
request and provision
apps?

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

•

•
•

We can control corporate
owned devices, but what
about personal owned
devices?
What’s our BYOD policy?
Do we need a separate
infrastructure and team to
maintain mobile security?

All of this before I
even figure out
authentication and
authorization
requirements !!!!
Web, Hybrid and Native apps – What does it all
mean?
full
capability
 Web
– Limited device interaction – app

typically written to render HTML to
device form factor
 Hybrid Applications
– Embed HTML5 apps inside a thin

native container – simplifies
development and delivery across
multiple platforms

Native

Hybrid

single
platform

multiple
platforms
Web

 Native Applications
– Specific to a given platform, fully

capable (specialized development
environments such as Xcode)
8

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

partial
capability
Mobile Security Terms – Variety of technology
Many of the security terms you have heard focus
on device security (MDM)
MDM
MAM
Container
Registration

9

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Shift towards more focused device security to
enable BYOD – Mobile Application Management

Traditional Access Management challenges also
need to be addressed – Authentication, SSO…
What’s need in a Mobile Access Management
solution
API Security

 Bridges the gap between mobile

devices and IAM control
 Provides context-driven, risk-aware

access management

Device &
Location
Context

Device
Registration

 Simplifies developer access to IAM
 Supports BYOD

 Quickly and securely exposes

sensitive corporate resources
 Provides visibility and control

10

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Secure
Transactions

MANAGEMENT

Single
Sign-on
Oracle Access Management
Mobile & Social

Mobile
Security

11

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Social
Sign-On

Standard
Interfaces
Configurable Access Management Service
 Mobile Security Platform
– Authentication and SSO
– Strong Authentication, Device

Fingerprinting and Risk-based
access
– Mobile SDK
 Internet / Social Integration
 REST / Cloud Interfaces

12

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Mobile Security Architecture
Mobile Device

DMZ

Mobile Interfaces

IDM Infrastructure

Access Management

Oracle
SDK

Authorization

Native App

API

Device Fingerprinting & Tracking
Device Registration

OAM Service
OES Service

Features

OAAM Service

Lost & Stolen Devices
GPS/WIFI Location Awareness

Platform Security Services (OPSS)

Risk-based KBA & OTP

Web App
OPSS Service
Authentication API

Transactional risk analysis
White & Black Lists

Directory Services
Security App

13

User Self Registration/Self Service

REST

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

User Profile

API

User Profile Services

White Pages applications
Complete Mobile Security
 Requires interface and data flow control policies
– RESTful interfaces are the standard method to access/update data

from native applications
 Securing these interface points is critical
– Data-flow policies should be context-driven
 Device location, device integrity, identity verification process

14

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Secure
REST API’s

Threat
Protection

Client
Throttling

API Control &
Governance

Transformation

API Management
& Monitoring

{ “JSON” }
< XML >

OAUTH 2.0
Client & Server

15

API Key
Management

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Native JSON & XML
Processing

Access Management

API Security – Secure Mobile Access to
Corporate Information
Extend
Access Management to
REST API’s
•
•
•
•
•
•
•

Context Aware
Authentication
Authorization
Fraud Detection
Security Tokens
Data Redaction
Audit
Comprehensive Mobile Security
Corporate DMZ

Corporate Network

Web Traffic

Webgate /
OHS

OAM Protected Resource

Mobile and Social

REST Traffic

Oracle API Gateway
API / Web Services

16

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Oracle Access Manager

Oracle Entitlements
Server
Planning for Secure Mobile Applications
 Understand the requirement – its more than just technology
– Involve all relevant stakeholders – App owners, Security/Risk, Telecoms,

IAM, Development teams….
 Identify need for written and technology polices
 Identify development standards
– Hybrid, Native, Web

 Understand access points
– Client, Server, Perimeter

17

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Customer Case Studies

18

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Turkey Ministry of Education
Abdullah Togay
Deputy General Manager- CTO, Ministry of National Education
 Overview of systems
 How you see Mobile technologies transforming your systems
 How are you approaching projects involving these technologies –

Analysis, Stakeholders, Planning, Deployment etc.
 How do see Oracle’s technology helping you with this
 How do you think these technologies will evolve in the coming years.

19

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Verizon Wireless
Mobile & Social SSO
Anup Thomas
Associate Director - eCommerce, Self Serve, and Products IT
September, 2013
PID#

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
Verizon Wireless - Overview of Business

Customer Experience – World-Class Network, Stores, Customer Service

Omni Channel View
– Web, Mobile, IVR, Retail
– eChannels & eSupport
– SSO
– Global Navigation
– Omni Services

Mobile & Tablet

Web,
Retail Self Serve

IVR

eChannels&
eSupport

Social

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

21
Shift in Channel Affinity Towards Mobile

Account Management

eCommerce

Usage
Controls

Forums

Backup
Assistant
Plus

Account
Analysis

Trend Insights
–

Sales & Service

–

Overall transactions
–

–

YoY Increase for Mobile

Complex transactions

–

YoY Increase for Mobile

–

Optimization

–

Time to Market

–

SaaS

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

22
Mobile & Social – Planning Approach
STEPS

GOALS

MEASURE – Web & Mobile Analytics

•Clear Metrics on current app-app / app-web handoffs
•Example: Out of “x” logins per month on the mobile app, “y”
represents the number of customers who click through to another
“app or web site and “z” represent the abandons

DEFINE - ROI

•Define Annual Savings (Care Call Deflections, etc.)
•Define Incremental Revenue (Sales)
•Define Impact to Customer Satisfaction (NPS, etc.)

GET- AN EXECUTIVE CHAMPION

•Think OOTB for Mobile/Social SSO
•Marketing, Sales, Care Sponsors!

START WITH A POC / LIMITED TRIAL

•Leverage existing SSO infrastructure
•Leverage REST services for efficient integration
•Stick to your most visible use case (popular app / site SSO)

MEASURE POST IMPLEMENTATION METRICS

•Measure incremental sales, reduced costs, Customer Satisfaction
•Plan Future Phases

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

23
Potential Integrated Architecture
Mobile Device

Web

Native App
Oracle
SDK

Social Log In

App

REST Calls

Personal
Phrase

Oracle
M&S

Oracle
OpenSSO

Directory

OAAM

Real Time
Risk Analysis

Security
Image

Core Identity, Access, & Risk Management

– Mobile SSO : App to App, App to Web
– Authorization

– Risk Management
– Social Login / Sign On
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

24
Potential Future States

Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.

25
Don’t miss these IDM Sessions
CON8817

Tuesday 09/24,
5:15PM

Moscone West,
Room 2018

API Management: Enable Your Infrastructure for
Secure Mobile and Cloud Use

Ganesh Kirti, Oracle

CON8823

Wednesday 09/25,
5:00PM

Moscone West,
Room 2018

Access Management for the Internet of Things

Kanishk Mahajan, Oracle

CON8902

Thursday, 09/26
2:00PM

Marriot Marquis – Developing Secure Mobile Applications
Golden Gate C3

CON8837

Wednesday 09/25,
11:45AM

Moscone West,
Room 2018

Leverage Authorization to Monetize Content and
Media Subscriptions

Roger Wigenstam, Oracle

CON9024

Thursday 09/26,
2:00PM

Moscone West,
Room 2018

Next Generation Optimized Directory - Oracle
Unified Directory

Etienne Remillon, Oracle

26

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Mark Wilcox, Oracle
Oracle Fusion Middleware
Business Innovation Platform for the Enterprise and Cloud
 Complete and Integrated
Web

Social

Mobile

 Best-in-class

User Engagement
Business
Process
Management

 Open standards
Content
Management

Service Integration

Business
Intelligence

Data Integration

Identity Management
Development
Tools

27

Cloud Application
Foundation

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Enterprise
Management

 On-premise and Cloud
 Foundation for Oracle Fusion
Applications and Oracle Cloud
28

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
29

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

More Related Content

What's hot

Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Ping Identity
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15Mike Lemons
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldPing Identity
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Ping Identity
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA Ping Identity
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without BoundariesPing Identity
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)GregOracle
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCloudIDSummit
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCloudIDSummit
 
CIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCraig Wu
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application SecuritySecureAuth
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present DangerPing Identity
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementOkta-Inc
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014Andrew Ames
 

What's hot (20)

Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
 
SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15SWM_WP_MaturityModel_July15
SWM_WP_MaturityModel_July15
 
Connecting The Real World With The Virtual World
Connecting The Real World With The Virtual WorldConnecting The Real World With The Virtual World
Connecting The Real World With The Virtual World
 
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
 
9.35am robert humphrey
9.35am robert humphrey9.35am robert humphrey
9.35am robert humphrey
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Managing Identity without Boundaries
Managing Identity without BoundariesManaging Identity without Boundaries
Managing Identity without Boundaries
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)
 
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud AppsCIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
CIS13: Beyond the Building: Secure Identity Services for Mobile and Cloud Apps
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity Service
 
CIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity ChalktalkCIS 2013 Ping Identity Chalktalk
CIS 2013 Ping Identity Chalktalk
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
Clear and Present Danger
Clear and Present DangerClear and Present Danger
Clear and Present Danger
 
Extending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT ManagementExtending Active Directory to Box for Seamless IT Management
Extending Active Directory to Box for Seamless IT Management
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 
Product Assessment and Consulting Offerings
Product Assessment and Consulting OfferingsProduct Assessment and Consulting Offerings
Product Assessment and Consulting Offerings
 

Viewers also liked

Elements, Compounds & Mixtures-- Spring 2012
Elements, Compounds & Mixtures-- Spring 2012Elements, Compounds & Mixtures-- Spring 2012
Elements, Compounds & Mixtures-- Spring 2012jmori1
 
Acids & Bases Day 2
Acids & Bases   Day 2Acids & Bases   Day 2
Acids & Bases Day 2jmori1
 
Electrons and Chemical Bonding Day 2
Electrons and Chemical Bonding Day 2Electrons and Chemical Bonding Day 2
Electrons and Chemical Bonding Day 2jmori1
 
Definition of Matter Lab
Definition of Matter LabDefinition of Matter Lab
Definition of Matter Labjmori1
 
Atom Movie Notes -Day 2
Atom Movie Notes -Day 2Atom Movie Notes -Day 2
Atom Movie Notes -Day 2jmori1
 
Подготовка ребенка к школе
Подготовка ребенка к школеПодготовка ребенка к школе
Подготовка ребенка к школеelvira38
 
Seminario Vibrazioni in Lavorazione
Seminario Vibrazioni in LavorazioneSeminario Vibrazioni in Lavorazione
Seminario Vibrazioni in LavorazioneMarco Leonesio
 
Linn final1960sstreetartppt
Linn final1960sstreetartpptLinn final1960sstreetartppt
Linn final1960sstreetartpptteamhumanities
 
The 12 types of advertising 9&10
The 12 types of advertising 9&10The 12 types of advertising 9&10
The 12 types of advertising 9&10Les Davy
 
834 d4c61 5562-4adc-958a9b7e7ad30c57
834 d4c61 5562-4adc-958a9b7e7ad30c57834 d4c61 5562-4adc-958a9b7e7ad30c57
834 d4c61 5562-4adc-958a9b7e7ad30c57Carlos Carvalho
 
Mission Possible Day 1.ping.pong 2012
Mission Possible Day 1.ping.pong 2012Mission Possible Day 1.ping.pong 2012
Mission Possible Day 1.ping.pong 2012jmori1
 
6 class and methods
6    class and methods6    class and methods
6 class and methodsTuan Ngo
 
Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...
Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...
Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...futureagricultures
 

Viewers also liked (20)

Elements, Compounds & Mixtures-- Spring 2012
Elements, Compounds & Mixtures-- Spring 2012Elements, Compounds & Mixtures-- Spring 2012
Elements, Compounds & Mixtures-- Spring 2012
 
Acids & Bases Day 2
Acids & Bases   Day 2Acids & Bases   Day 2
Acids & Bases Day 2
 
Electrons and Chemical Bonding Day 2
Electrons and Chemical Bonding Day 2Electrons and Chemical Bonding Day 2
Electrons and Chemical Bonding Day 2
 
Yenner fotos
Yenner fotosYenner fotos
Yenner fotos
 
Figure
Figure Figure
Figure
 
Definition of Matter Lab
Definition of Matter LabDefinition of Matter Lab
Definition of Matter Lab
 
Murder mystery
Murder mysteryMurder mystery
Murder mystery
 
Модель стратегии холдинга
Модель стратегии холдингаМодель стратегии холдинга
Модель стратегии холдинга
 
Atom Movie Notes -Day 2
Atom Movie Notes -Day 2Atom Movie Notes -Day 2
Atom Movie Notes -Day 2
 
Pt 6
Pt 6Pt 6
Pt 6
 
Betonfootball
BetonfootballBetonfootball
Betonfootball
 
Подготовка ребенка к школе
Подготовка ребенка к школеПодготовка ребенка к школе
Подготовка ребенка к школе
 
Seminario Vibrazioni in Lavorazione
Seminario Vibrazioni in LavorazioneSeminario Vibrazioni in Lavorazione
Seminario Vibrazioni in Lavorazione
 
Linn final1960sstreetartppt
Linn final1960sstreetartpptLinn final1960sstreetartppt
Linn final1960sstreetartppt
 
The 12 types of advertising 9&10
The 12 types of advertising 9&10The 12 types of advertising 9&10
The 12 types of advertising 9&10
 
834 d4c61 5562-4adc-958a9b7e7ad30c57
834 d4c61 5562-4adc-958a9b7e7ad30c57834 d4c61 5562-4adc-958a9b7e7ad30c57
834 d4c61 5562-4adc-958a9b7e7ad30c57
 
Natal fest 2011
Natal fest 2011Natal fest 2011
Natal fest 2011
 
Mission Possible Day 1.ping.pong 2012
Mission Possible Day 1.ping.pong 2012Mission Possible Day 1.ping.pong 2012
Mission Possible Day 1.ping.pong 2012
 
6 class and methods
6    class and methods6    class and methods
6 class and methods
 
Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...
Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...
Fertiliser Input Susbsidy Programme in Malawi preliminary workshop presentati...
 

Similar to Con8896 securely enabling mobile access for business transformation - final

Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...Dr. Wilfred Lin (Ph.D.)
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation Delivery Centric
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewGuatemala User Group
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everythingDr. Wilfred Lin (Ph.D.)
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerWSO2
 
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...Steven Davelaar
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Indus Khaitan
 
Let's Talk Mobile
Let's Talk MobileLet's Talk Mobile
Let's Talk MobileChris Muir
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation Delivery Centric
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsHerve Danzelaud
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or looseBjørn Sloth
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsJulien Ott
 

Similar to Con8896 securely enabling mobile access for business transformation - final (20)

Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
B3 mobile development and deployment platform enabled by oracle fusion midd...
B3   mobile development and deployment platform enabled by oracle fusion midd...B3   mobile development and deployment platform enabled by oracle fusion midd...
B3 mobile development and deployment platform enabled by oracle fusion midd...
 
MobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web BrowsingMobileIron's Enterprise Solution for Mobile Web Browsing
MobileIron's Enterprise Solution for Mobile Web Browsing
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and OverviewRe-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everything
 
BYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility ManagerBYOD for your business with WSO2 Enterprise Mobility Manager
BYOD for your business with WSO2 Enterprise Mobility Manager
 
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
 
Apouc 2014-oracle mobile platform
Apouc 2014-oracle mobile platformApouc 2014-oracle mobile platform
Apouc 2014-oracle mobile platform
 
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your EnterpriseWSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
WSO2Con ASIA 2016: Mobile Strategy for Your Enterprise
 
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
Oracle OpenWorld | CON9707 Enterprise Mobile Security Architecture beyond the...
 
Let's Talk Mobile
Let's Talk MobileLet's Talk Mobile
Let's Talk Mobile
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
MobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and ManagementMobileIron's Enterprise Solution for App Security and Management
MobileIron's Enterprise Solution for App Security and Management
 
Securing Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good DynamicsSecuring Salesforce Mobile SDK Apps with Good Dynamics
Securing Salesforce Mobile SDK Apps with Good Dynamics
 
Oracle mobile cloud service
Oracle mobile cloud serviceOracle mobile cloud service
Oracle mobile cloud service
 
Appsecurity, win or loose
Appsecurity, win or looseAppsecurity, win or loose
Appsecurity, win or loose
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 

More from OracleIDM

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1OracleIDM
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12OracleIDM
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
 

More from OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 

Recently uploaded

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Recently uploaded (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Con8896 securely enabling mobile access for business transformation - final

  • 1. 1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 2. Securely Enabling Mobile Access for Business Transformation Lee Howarth Oracle Product Management
  • 3. Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 4. Program Agenda  Introduction to Mobile Security  Oracle’s Mobile Security Technology  Planning for Secure Mobile Access – Customer Case Studies 4 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 5. Mobile Market Trends - Security is essential Companies exposing more APIs and services on the Internet to support mobile applications % 90 companies with mobile apps in 2014 5 76% of Mobile Apps store passwords on the device – 10% in plain text 2/3 companies expect to deploy corporate app stores to control delivery of mobile applications Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 6. Mobile Security - Challenges on IT  IT has to manage the typical Control Access struggle between access and control  IT is asking itself: – How do I enable the business to take advantage of mobile access, while maintaining required levels of control – How do we maximize the user experience while minimizing risk – How do we support the organizations BYOD policy 6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 7. Why is mobile causing IT more headaches?  Mobile access complicates information and application architecture discussions • How secure is the network? Do we need offline support? What happens to corporate data when the device is lost or stolen? What policies control access to application and data? How will the device connect (WiFi/cell)? Where will it connect from (GEO)? • • • • • 7 Ownership Device/App Type Security • • • • • Which devices should we support (iOS, Android..)? What’s the best type of application (Web, Hybrid, Native)? How to quickly develop secure apps? How do we run corporate apps in a secured encrypted environment without inhibiting mobile productivity? Where to securely host to request and provision apps? Copyright © 2012, Oracle and/or its affiliates. All rights reserved. • • • We can control corporate owned devices, but what about personal owned devices? What’s our BYOD policy? Do we need a separate infrastructure and team to maintain mobile security? All of this before I even figure out authentication and authorization requirements !!!!
  • 8. Web, Hybrid and Native apps – What does it all mean? full capability  Web – Limited device interaction – app typically written to render HTML to device form factor  Hybrid Applications – Embed HTML5 apps inside a thin native container – simplifies development and delivery across multiple platforms Native Hybrid single platform multiple platforms Web  Native Applications – Specific to a given platform, fully capable (specialized development environments such as Xcode) 8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. partial capability
  • 9. Mobile Security Terms – Variety of technology Many of the security terms you have heard focus on device security (MDM) MDM MAM Container Registration 9 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Shift towards more focused device security to enable BYOD – Mobile Application Management Traditional Access Management challenges also need to be addressed – Authentication, SSO…
  • 10. What’s need in a Mobile Access Management solution API Security  Bridges the gap between mobile devices and IAM control  Provides context-driven, risk-aware access management Device & Location Context Device Registration  Simplifies developer access to IAM  Supports BYOD  Quickly and securely exposes sensitive corporate resources  Provides visibility and control 10 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Secure Transactions MANAGEMENT Single Sign-on
  • 11. Oracle Access Management Mobile & Social Mobile Security 11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Social Sign-On Standard Interfaces
  • 12. Configurable Access Management Service  Mobile Security Platform – Authentication and SSO – Strong Authentication, Device Fingerprinting and Risk-based access – Mobile SDK  Internet / Social Integration  REST / Cloud Interfaces 12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 13. Mobile Security Architecture Mobile Device DMZ Mobile Interfaces IDM Infrastructure Access Management Oracle SDK Authorization Native App API Device Fingerprinting & Tracking Device Registration OAM Service OES Service Features OAAM Service Lost & Stolen Devices GPS/WIFI Location Awareness Platform Security Services (OPSS) Risk-based KBA & OTP Web App OPSS Service Authentication API Transactional risk analysis White & Black Lists Directory Services Security App 13 User Self Registration/Self Service REST Copyright © 2012, Oracle and/or its affiliates. All rights reserved. User Profile API User Profile Services White Pages applications
  • 14. Complete Mobile Security  Requires interface and data flow control policies – RESTful interfaces are the standard method to access/update data from native applications  Securing these interface points is critical – Data-flow policies should be context-driven  Device location, device integrity, identity verification process 14 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 15. Secure REST API’s Threat Protection Client Throttling API Control & Governance Transformation API Management & Monitoring { “JSON” } < XML > OAUTH 2.0 Client & Server 15 API Key Management Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Native JSON & XML Processing Access Management API Security – Secure Mobile Access to Corporate Information Extend Access Management to REST API’s • • • • • • • Context Aware Authentication Authorization Fraud Detection Security Tokens Data Redaction Audit
  • 16. Comprehensive Mobile Security Corporate DMZ Corporate Network Web Traffic Webgate / OHS OAM Protected Resource Mobile and Social REST Traffic Oracle API Gateway API / Web Services 16 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Access Manager Oracle Entitlements Server
  • 17. Planning for Secure Mobile Applications  Understand the requirement – its more than just technology – Involve all relevant stakeholders – App owners, Security/Risk, Telecoms, IAM, Development teams….  Identify need for written and technology polices  Identify development standards – Hybrid, Native, Web  Understand access points – Client, Server, Perimeter 17 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 18. Customer Case Studies 18 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 19. Turkey Ministry of Education Abdullah Togay Deputy General Manager- CTO, Ministry of National Education  Overview of systems  How you see Mobile technologies transforming your systems  How are you approaching projects involving these technologies – Analysis, Stakeholders, Planning, Deployment etc.  How do see Oracle’s technology helping you with this  How do you think these technologies will evolve in the coming years. 19 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 20. Verizon Wireless Mobile & Social SSO Anup Thomas Associate Director - eCommerce, Self Serve, and Products IT September, 2013 PID# Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement.
  • 21. Verizon Wireless - Overview of Business Customer Experience – World-Class Network, Stores, Customer Service Omni Channel View – Web, Mobile, IVR, Retail – eChannels & eSupport – SSO – Global Navigation – Omni Services Mobile & Tablet Web, Retail Self Serve IVR eChannels& eSupport Social Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 21
  • 22. Shift in Channel Affinity Towards Mobile Account Management eCommerce Usage Controls Forums Backup Assistant Plus Account Analysis Trend Insights – Sales & Service – Overall transactions – – YoY Increase for Mobile Complex transactions – YoY Increase for Mobile – Optimization – Time to Market – SaaS Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 22
  • 23. Mobile & Social – Planning Approach STEPS GOALS MEASURE – Web & Mobile Analytics •Clear Metrics on current app-app / app-web handoffs •Example: Out of “x” logins per month on the mobile app, “y” represents the number of customers who click through to another “app or web site and “z” represent the abandons DEFINE - ROI •Define Annual Savings (Care Call Deflections, etc.) •Define Incremental Revenue (Sales) •Define Impact to Customer Satisfaction (NPS, etc.) GET- AN EXECUTIVE CHAMPION •Think OOTB for Mobile/Social SSO •Marketing, Sales, Care Sponsors! START WITH A POC / LIMITED TRIAL •Leverage existing SSO infrastructure •Leverage REST services for efficient integration •Stick to your most visible use case (popular app / site SSO) MEASURE POST IMPLEMENTATION METRICS •Measure incremental sales, reduced costs, Customer Satisfaction •Plan Future Phases Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 23
  • 24. Potential Integrated Architecture Mobile Device Web Native App Oracle SDK Social Log In App REST Calls Personal Phrase Oracle M&S Oracle OpenSSO Directory OAAM Real Time Risk Analysis Security Image Core Identity, Access, & Risk Management – Mobile SSO : App to App, App to Web – Authorization – Risk Management – Social Login / Sign On Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 24
  • 25. Potential Future States Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. 25
  • 26. Don’t miss these IDM Sessions CON8817 Tuesday 09/24, 5:15PM Moscone West, Room 2018 API Management: Enable Your Infrastructure for Secure Mobile and Cloud Use Ganesh Kirti, Oracle CON8823 Wednesday 09/25, 5:00PM Moscone West, Room 2018 Access Management for the Internet of Things Kanishk Mahajan, Oracle CON8902 Thursday, 09/26 2:00PM Marriot Marquis – Developing Secure Mobile Applications Golden Gate C3 CON8837 Wednesday 09/25, 11:45AM Moscone West, Room 2018 Leverage Authorization to Monetize Content and Media Subscriptions Roger Wigenstam, Oracle CON9024 Thursday 09/26, 2:00PM Moscone West, Room 2018 Next Generation Optimized Directory - Oracle Unified Directory Etienne Remillon, Oracle 26 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Mark Wilcox, Oracle
  • 27. Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud  Complete and Integrated Web Social Mobile  Best-in-class User Engagement Business Process Management  Open standards Content Management Service Integration Business Intelligence Data Integration Identity Management Development Tools 27 Cloud Application Foundation Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Enterprise Management  On-premise and Cloud  Foundation for Oracle Fusion Applications and Oracle Cloud
  • 28. 28 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 29. 29 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Editor's Notes

  1. Oracle Access Manager for Mobile and Social OverviewConnects mobile users to identity services using REST interfacesOrganizations can bridge the security gap between the enterprise and mobile devices. With RESTful identity services, rich mobile applications can access stateless identity functions from mobile devices which are limited by processing capacity and battery power. Organizations can maketheir backend services and data available in a secure manner by simply exposing these through virtual REST API’s in the DMZ. Messages, security tokens, and protocols are automatically translated between formats appropriate for mobile devices and the source system. REST API’s can mash up information from multiple sources and be protected from a wide variety of attacks (denial of service, sql injection, content retrieval attacks, etcetc), usage can be monitored, and all your Oracle Access Management technologies can be leveraged for further protection. Delivers SSO and Authorization for native mobile applications Traditional mobile security solutions like VPN tunnels are limited in that they cannot overcome the problem of SSO for native mobile apps. OAM-M&amp;S simplifies SSO across rich mobile apps and browser applications. This reduces the number of logins required for enterprise applications from the native mobile screen. Authorization can control what transactions end users are able to perform from a device and under what conditions. Perhaps only transactions below a given amount are allowed from a mobile device. An organizations REST API’s require authorization, what data is accessible to a given user must be controlled and monitored. A users location and device state may need to be taken into account. Enables sign on from 3rd party and Social identities to Enterprise resourcesWith the proliferation of social networking sites, there is a need for relying parties to consume identities from internet identity providers like Facebook, Twitter, LinkedIn, Google and Yahoo. Many of these providers support user centric federation standards like OpenID and Oauth. OAM-M&amp;S enables organizations to accept internet identities for signing on users to low value applications like blogs, communities, etc. This in turn can provide a seamless user experience for users without the burden of additional logins.Single Sign-On covers web applications, native mobile applications, and also the RESTful API’s and web services accessed from the device.Supports industry standards (OpenID, OAuth)Oracle IDM supports OpenID and Oauth. So with Oracle Identity Management we are making it easier for relying parties to accept identities from internet identity providers like Facebook, Twitter, LinkedIn, Google and Yahoo.  
  2. Mobile Security – web and mobile appDevice registration and fingerprintLost &amp; stolen device securityGPS/WIFI based location awareness
  3. With Fusion Middleware, you can extend and maximize your existing technology investment with the same technologies used in Fusion Applications, including embedded analytics and social collaboration, and mobile and cloud computing. Oracle’s complete SOA platform lets your IT organization rapidly design, assemble, deploy, and manage adaptable business applications and—with Oracle’s business process management tools—even bring the task of modeling business processes directly to the business analysts. Oracle Business Intelligence foundation brings together all your enterprise data sources in a single, easy-to-use solution, delivering consistent insights whether it’s through ad hoc queries and analysis, interactive dashboards, scorecards, OLAP, or reporting. And, your existing enterprise applications can leverage the rich social networking capabilities and content sharing that users have come to expect in consumer software. Oracle Fusion Middleware is based on 100 percent open standards, so you aren’t locked into one deployment model when your business requirements change.