Copyright 2013, Oracle and/or its affiliates. All rights reserved.
|
|
- Gloria Baldwin
- 6 years ago
- Views:
Transcription
1 1
2 Securing Privileged Accounts with an Integrated IDM Solution Product Manager, Oracle Mike Laramie Oracle Cloud for Industry Architecture Team Buddhika Kottahachchi OPAM Architect
3 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decision. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle. 3
4 Program Agenda Introduction What is Oracle Privileged Account Manager? OPAM Integration with Oracle Identity Governance and Database Security Use Case: Oracle Cloud for Industry and OPAM Demo 4
5 Introduction 5
6 What do have these two in Common? Privileged account access Excessive access privileges Difficult to monitor shared accounts across multiple administrators 6
7 IDM Overcome Threats and Regulations to Unlock Opportunities Threats Increased Online Threat Costly Insider Fraud Compliance Tougher Regulations Greater Focus on Risk Stronger Governance Opportunities 76% Data Stolen From Servers 86% Hacking Involve Stolen Credentials 48% Caused by Insiders 17% Involved Privilege Misuse Social Media Cloud Computing Mobile Access 2011 Data Breach Investigations Report 7
8 Managing Privilege Access Is Not Well Defined SCALE Manual solutions don t scale (like managing privileged access via spreadsheets) RISK Using default system passwords is prone to risk COST Deploying point solutions can increase integration costs 8
9 Two Big Management Problems IDENTIFYING PRIVILEGED ACCOUNTS TRACKING PRIVILEGED ACCOUNTS 9
10 The Right Approach is Self-Reinforcing Reporting & Certification Access Request Auto- Provisioning Self- Reinfor cing VISIBILITY ACROSS COMPLETE USER ACCESS IS KEY Remediation 10
11 Privileged Account Management A Platform Approach Shared Connectors Centralized Policies Workflow Integration Common Reporting Reduce Risk Improve Compliance 11
12 What is Oracle Privileged Account Manager 12
13 Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud Web Social Mobile Business Process Management Service Integration User Engagement Content Management Identity Management Business Intelligence Data Integration Complete and Integrated Best-in-class Open standards On-premise and Cloud Foundation for Oracle Fusion Applications and Oracle Cloud Development Tools Cloud Application Foundation Enterprise Management 13
14 Identity Management Securing the Social Enterprise Simplified Identity Governance Access Request Portal with Catalog and Shopping cart UI In product, durable customization of UIs, forms and work flows Privileged Account Management leverage Identity connectors, workflows, audit Complete Access Management Integrated SSO, Federation, API Management, Token Management, Granular Authorization Mobile application security with SSO, device finger printing and step up authentication Social identity log-in from popular social media sites REST, OAuth, XACML Directories that Scale OUD optimized on T4 hardware delivering 3x performance gain and 15% of set up time 14
15 Privileged Account Manager Definition of Terms Privileged Account A human accessible accounts with elevated permissions (root for UNIX, Linux, or SYS for DB) Service Account Most customers use the term service accounts when they refer to Privileged Accounts Some customers use the term service accounts when they refer to Application Accounts OPAM uses services accounts in the connector configuration End User An administrator who is accessing OPAM to check-out an account Administrator The OPAM server Administrator An Administrator who is accessing OPAM to checkout an account Application accounts Accounts that are used by application (stored in applications) to access e.g. a database Target OPAM manages account access on Targets 15
16 Privileged Account Manager Overview of Product Capabilities Secure password vault to centrally manage passwords for privileged accounts OPAM uses an Oracle DB EE instance using TDE to encrypt passwords Session Management and Auditing Session control without revealing a privileged account password Session History and searchable Session Recording Extensible Framework JAVA based for customized solutions Audit Reporting Customizable audit reports through BI Publisher Real time status available via the OPAM dashboard (charts, tables, etc.) 16
17 Privileged Account Manager Overview of Product Capabilities Integrated with Identity Governance Platform Shared Connectors and Workflow integration with OIM Centralized Policies Management via OIM and OIA Using out-of-the-box connectors, OPAM Targets can be configured for Databases, Operating Systems and LDAP Directories, and Oracle FMW applications Policy-based access to privileged accounts via grants Grants control if and when a given administrator has access to a privileged account Grants are represented as OPAM Usage Policies. Grants are typically assigned through LDAP Group Membership in the identity store Flexible Password Policies Mirror corporate password standards 17
18 Supported Clients / Targets Generic UNIX Systems Generic Database Servers Generic LDAP Directories UNIX MS SQLServer Sybase 15 18
19 Typical OPAM Use-Case User logs in as SYSTEM Adds Table to DB System out of space Return SYSTEM password Request SYSTEM password Return root password Request root password HR Application Database OPAM sets the SYSTEM password for HR App Database, based on the password policy for HR App Database Verify the OPAM User, Joe, is in the HR DBA Role User checks in passwords Database and Unix Admin (Joe) User logs in as root Adds disk space Oracle Privileged Account Manager Unix Server OPAM sets the root password for the Unix Server, based on the password policy for Unix Server. LDAP Server 19
20 OPAM Integration with Oracle Identity Governance and Database Security 20
21 OPAM and OIM - a Complete Governance Platform Request for Privileged Account Access Leverage OIM policy/role based provisioning A system admin may be provisioned to specific LDAP groups that OPAM uses for privileged account access Workflow and approval will be followed as defined 22
22 OPAM and OIM - a Complete Governance Platform Request for Privileged Account Access OIM to publish privileged account entitlements in request catalog An admin user uses access request self service, search the catalog, pick the privileged accounts he needs and submit for approval The request kicks off workflow and approval as defined The user is provisioned with group membership after approval The user can access OPAM for privileged password checkout and checkin 23
23 OPAM and OIM - a Complete Governance Platform Risk based certification Through existing OIM OPAM integration, privileged access information is made available for certification. Risk can be calculated based on its privilege status and other data such as provisioning method etc If access violation is found, it can be revoked based on OIM close-loop remediation 24
24 OPAM and Database Security Enterprise User Security allows non-privileged users to use their enterprise LDAP/AD password to connect to the database Database Vault provides stronger separation of duties for databases OPAM manages DB passwords for privileged users including SYS, SYSTEM and application accounts A complete Database Security solution from Oracle 25
25 Database User Management Complete Solution Service Description Use Existing Enterprise LDAP Passwords for End-User Passwords Supported by EUS Map Database Roles to Enterprise Roles Manage SYS/SYSTEM Passwords EUS OPAM Manage Application Passwords OPAM Manage non-oracle database passwords OPAM 26
26 Database Vault Integration Complete Solution Service Description Privileged user access control to limit access to application data Supported by DB Vault Multi-factor authorization to enforce enterprise security policies DB Vault Secure application consolidation DB Vault Manage DB Vault Privileged Accounts Passwords like user_manager, sec_admin Manage SYS/SYSTEM and other DB Privileged Accounts Passwords OPAM OPAM 27
27 Use Case: Oracle Cloud for Industry and OPAM 28
28 Oracle Cloud for Industry Overview What is OCI? An internal provider of cloud-based IaaS and PaaS services available to Oracle Global Business Units (GBUs) for the packaging of Oracle Industry Solutions to end customers. E.g. Financial Services, Healthcare, Retail 29
29 Oracle Cloud for Industry Operational Roles Different operational roles require different levels of access Server Admins Network Admins DB Admins Some groups may require access to multiple resources 30
30 Oracle Cloud for Industry Problems Disparate privileged account practices between multiple operational roles Password vault utilities Spreadsheets Minimal auditing/reporting on privileged account usage Difficulty of access Which vault is that stored in? Additional requirements driven by regulatory compliance PCI HIPAA/HITECH 31
31 Oracle Cloud for Industry Solution Implement password solution that Easy to use Supports privileged accounts from multiple teams with differing requirements Reliable Secure Auditable Meets or exceeds regulatory compliance Solution OPAM 32
32 Oracle Cloud for Industry OCI & OPAM How did OPAM help? Role based access to privileged accounts: LDAP group membership determines which privileged accounts users can access Convenient, accessible BUI Automated reporting of privileged account access and usage Centralized, secure repository Automated password management Unique passwords for each system 33
33 Oracle Cloud for Industry OCI Use Cases Unix Targets Guest VM/Hypervisor privileged accounts Database Targets Sys/System/Application LDAP Targets Service Accounts Lockbox Targets Storage appliances Application passwords Network devices 34
34 Oracle Cloud for Industry PCI & OPAM How did OPAM help with PCI Compliance? Addressed PCI DSS 2.0 Requirements: » Always change vendor supplied passwords before installing a system» Do not use group, shared, or generic accounts and passwords» Change user passwords at least every 90 days. 35
35 Oracle Cloud for Industry OPAM Flexibility Customized scripts for password aging reporting Required for Wrote custom script to retrieve data from OPAM and admins as necessary RFE submitted to include functionality in future release s BUI Daily reports of check-in/check-out activity Currently done through BI Publisher ed to security team nightly On-Demand reporting will be in future release 36
36 Case Study Overview Solution Securely stores local privileged account information in a central location Access to accounts is limited by LDAP group membership (RBAC) Reportable audit trail on account usage 37
37 OPAM Privileged Account Manager in Action 38
38 Oracle Privileged Account Manager in Action Demo Overview How OPAM lockbox is used by Oracle Cloud for Industry How does OPAM Session Management and Auditing enhances the lockbox concept to provide additional compliance data How to extend OPAM operations to enable emergency access 39
39 HOW WE DID IT 40
40 Demo Laptop Demo Server Request Privileged Access to Avitek Retail Host Oracle Identity Governance Session Manager REQUESTING PRIVILEGED ACCESS Approval via smartphone Approval workflow 41
41 Demo Laptop Command executed on Demo Server Demo Server Sending commands Oracle Identity Governance Session Manager EXECUTING COMMANDS Command recorded in Session Log 42
42 Demo Laptop Access checkout history report Oracle Identity Governance Session Manager REVIEWING THE PRIVILEGED ACCESS Session Logs /Transcripts 43
43 Looking Forward A Physical Security Demo Lockitron Internet connected lock Exposes REST interfaces Protected by an Access Token OPAM Protect Access Token in a Lockbox OPAM Plug-in Unlock/Lock as part of Checkout/Check-in (using Access Token) 44
44 Summary 45
45 OPAM Benefits Enforce internal security policies and eliminate potential security threats from privileged users Session Management and Auditing User activities (who, did what, when) Cost-effectively enforce and attest to regulatory requirements Reduce IT costs through efficient self service and common security infrastructure Extensible Java based Framework 46
46 Sessions not to miss CON8823 CON8826 CON8902 CON8836 CON 4342 CON9024 Wednesday 09/25, 5:00PM Thursday, 09/26, 3:30PM Thursday,09/26 2:00PM Thursday 09/26, 11:00AM Thursday 09/26, 12:30PM Thursday09/26, 2:00PM MosconeWest, Room 2018 MosconeWest, Room 2018 Marriot Marquis Golden Gate C3 MosconeWest, Room 2018 MosconeWest, Room 2018 MosconeWest, Room 2018 Access Management for the Internet of Things Zero Capital Investment by leveraging Identity Management as a Service Developing Secure Mobile Applications Leveraging the Cloud to simplify your Identity Management implementation Identity Services in the New GMIT Next Generation Optimized Directory - Oracle Unified Directory Kanishk Mahajan, Oracle Mike Neuenschwander, Oracle Mark Wilcox, Oracle Guru Shashikumar, Oracle GM Etienne Remillon, Oracle 47
47 Join the Oracle Community Twitter twitter.com/oracleidm Facebook facebook.com/oracleidm Oracle Blogs Blogs.oracle.com/OracleIDM Oracle.com/Identity 48
48 Further Information Oracle Privileged Account Manager Documentation Oracle Fusion Middleware 11gR2 Release ( ) Software 49
49 50
50 51
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7 ORACLE PRODUCT LOGO 20. oktober 2011 Hotel Europa Sarajevo Platform
More informationLiferay Security Features Overview. How Liferay Approaches Security
Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................
More informationSecurity Readiness Assessment
Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS
More informationAccess Governance in a Cloudy Environment. Nabeel Nizar VP Worldwide Solutions
Access Governance in a Cloudy Environment Nabeel Nizar VP Worldwide Solutions Engineering @nabeelnizar Nabeel.Nizar@saviynt.com How do I manage multiple cloud instances from a single place? Is my sensitive
More informationSecurity Compliance and Data Governance: Dual problems, single solution CON8015
Security Compliance and Data Governance: Dual problems, single solution CON8015 David Wolf Director of Product Management Oracle Development, Enterprise Manager Steve Ries Senior Systems Architect Technology
More informationCopyright 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 13
1 Copyright 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 13 The following is intended to outline our general product direction.
More informationThe 10 Principles of Security in Modern Cloud Applications
The 10 Principles of Security in Modern Cloud Applications Nigel King, Vice President, Oracle In-Depth Seminars D11 1 Safe Harbor Statement The following is intended to outline our general product direction.
More informationA Practical Step-by-Step Guide to Managing Cloud Access in your Organization
GUIDE BOOK 4 Steps to Cloud Access Management A Practical Step-by-Step Guide to Managing Cloud Access in your Organization Cloud Access Challenges in the Enterprise Cloud apps in the enterprise have become
More information5 OAuth EssEntiAls for APi AccEss control layer7.com
5 OAuth Essentials for API Access Control layer7.com 5 OAuth Essentials for API Access Control P.2 Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the
More informationCIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products
CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security
More informationPrivileged Account Security: A Balanced Approach to Securing Unix Environments
Privileged Account Security: A Balanced Approach to Securing Unix Environments Table of Contents Introduction 3 Every User is a Privileged User 3 Privileged Account Security: A Balanced Approach 3 Privileged
More informationGDPR How we can help. Solvit Networks CA. ALL RIGHTS RESERVED.
GDPR How we can help Solvit Networks 01.11.2017 2016 CA. ALL RIGHTS RESERVED. GDPR The facts The General Data Protection Regulation (GDPR) applies to all companies trading in the EU and processing personal
More informationOracle Buys Automated Applications Controls Leader LogicalApps
Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is
More informationPasswords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist
Passwords Are Dead Long Live Multi-Factor Authentication Chris Webber, Security Strategist Copyright 2015 Centrify Corporation. All Rights Reserved. 1 Threat Landscape Breach accomplished Initial attack
More informationManaging Your Privileged Identities: The Choke Point of Advanced Attacks
Managing Your Privileged Identities: The Choke Point of Advanced Attacks Shirief Nosseir EMEA Alliances Director Identity & API Management Tuesday, 16 May 2017 Agenda Why Privileged Access Management Why
More informationBEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE
BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.
More information5 OAuth Essentials for API Access Control
5 OAuth Essentials for API Access Control Introduction: How a Web Standard Enters the Enterprise OAuth s Roots in the Social Web OAuth puts the user in control of delegating access to an API. This allows
More information2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE
Co-Host Host 2-4 April 2019 Taets Art and Event Park, Amsterdam CLICK TO KNOW MORE Oracle Cloud Computing Strategy Han Wammes Public Sector Market Development Manager 1 Copyright 2012, Oracle and/or its
More informationCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 1z0-459 Title : Oracle Identity Governance Suite 11g Essentials Vendor : Oracle Version : DEMO Get Latest
More informationOracle Privileged Account Manager
Oracle Privileged Account Manager Disaster Recovery Deployment Considerations O R A C L E W H I T E P A P E R A U G U S T 2 0 1 5 Disclaimer The following is intended to outline our general product direction.
More informationManaging the Risk of Privileged Accounts and Passwords
Managing the Risk of Privileged Accounts and Passwords Definition: Privileged Account Privileged Management Obviously accounts with special or elevated permissions Windows Every workstation and server
More informationMySQL CLOUD SERVICE. Propel Innovation and Time-to-Market
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
More informationWho s Protecting Your Keys? August 2018
Who s Protecting Your Keys? August 2018 Protecting the most vital data from the core to the cloud to the field Trusted, U.S. based source for cyber security solutions We develop, manufacture, sell and
More informationthe SWIFT Customer Security
TECH BRIEF Mapping BeyondTrust Solutions to the SWIFT Customer Security Controls Framework Privileged Access Management and Vulnerability Management Table of ContentsTable of Contents... 2 Purpose of This
More informationPoor PAM processes and policies leave the crown jewels susceptible to security breaches Global Survey of IT Security Professionals
Poor PAM processes and policies leave the crown jewels susceptible to security breaches Global Survey of IT Security Professionals November 7, 2017 1 Goals and Methodology Research Goal The primary research
More informationwith Oracle IDM Peter Heintzen, Sen. Mgr. Information Security Oracle
Data Privacy Enhanced Database Security with Oracle IDM Peter Heintzen, Sen. Mgr. Information Security Oracle Security Levels for SLAs Preventive Controls Detective Controls Corrective
More informationPrivileged Identity Management
Privileged Identity Management Sven-Erik Vestergaard Certified IT specialist Security architect IBM Nordic Agenda What is Privileged Identity Management Compliance issues Steps in controlling Privileged
More informationOpenIAM Identity and Access Manager Technical Architecture Overview
OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...
More informationSailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities
SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust
More information7 Steps to Complete Privileged Account Management. September 5, 2017 Fabricio Simao Country Manager
7 Steps to Complete Privileged Account Management September 5, 2017 Fabricio Simao Country Manager AGENDA Implications of less mature privileged account management What does a more mature approach look
More informationPrivilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer
Privilege Security & Next-Generation Technology Morey J. Haber Chief Technology Officer mhaber@beyondtrust.com Agenda The Next-Gen Threat Landscape o Infomatics, Breaches & the Attack Chain o Securing
More informationMicrosoft Security Management
Microsoft Security Management MICROSOFT SECURITY MANAGEMENT SECURITY MANAGEMENT CHALLENGES Some large financial services organizations have as many as 40 or more different security vendors inside their
More informationMDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap
MDM Partner Summit 2015 Oracle Enterprise Data Quality Overview & Roadmap Steve Tuck Senior Director, Product Strategy Todd Blackmon Senior Director, Sales Consulting David Gengenbach Sales Consultant
More informationCOMPONENTS/PRODUCTS IN OIM
info@tutionbooks.com COMPONENTS/PRODUCTS IN OIM 11.1.2.3 www.tutionbooks.com Products/Components in OIM 11.1.2.3 1. Database 12.1.0.2 and Listener 2. RCU 11.1.1.9 3. Weblogic 10.3.6 with JDK 1.7 Update
More informationCentrify Identity Services for AWS
F R E Q U E N T L Y A S K E D Q U E S T I O N S Centrify Identity Services for AWS Service Description and Capabilities What is included with Centrify Identity Services for AWS? Centrify Identity Services
More informationCOMPLIANCE BRIEF: HOW VARONIS HELPS WITH PCI DSS 3.1
COMPLIANCE BRIEF: HOW VARONIS HELPS WITH OVERVIEW The Payment Card Industry Data Security Standard (PCI-DSS) 3.1 is a set of regulations that govern how firms that process credit card and other similar
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationVirtual Machine Encryption Security & Compliance in the Cloud
Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture
More informationCAN MICROSOFT HELP MEET THE GDPR
CAN MICROSOFT HELP MEET THE GDPR REQUIREMENTS? Danny Uytgeerts Microsoft 365 TSP / P-Seller Privacy Consultant (certified DPO) Member of DPO-Pro (Professional association of Belgian DPOs) danny.uytgeerts@realdolmen.com
More informationOracle Enterprise Manager 12c Sybase ASE Database Plug-in
Oracle Enterprise Manager 12c Sybase ASE Database Plug-in May 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,
More informationMySQL Enterprise Security
MySQL Enterprise Security Mike Frank Product Management Director Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only,
More informationOracle Audit Vault. Trust-but-Verify for Enterprise Databases. Tammy Bednar Sr. Principal Product Manager Oracle Database Security
Oracle Audit Vault Trust-but-Verify for Enterprise Databases Tammy Bednar Sr. Principal Product Manager Oracle Database Security Agenda Business Drivers Audit Vault Overview Audit
More informationPractical Guide to Platform as a Service.
Practical Guide to Platform as a Service http://cloud-council.org/resource-hub.htm#practical-guide-to-paas December 3, 2015 The Cloud Standards Customer Council THE Customer s Voice for Cloud Standards!
More informationOFFICE 365 GOVERNANCE: Top FAQ s & Best Practices. Internal Audit, Risk, Business & Technology Consulting
OFFICE 365 GOVERNANCE: Top FAQ s & Best Practices Internal Audit, Risk, Business & Technology Consulting CLOUD ADOPTION Business demands faster, more agile and less costly solutions to achieve digital
More informationOracle Risk Management Cloud
Oracle Risk Management Cloud Release 12 New Feature Summary December 2016 TABLE OF CONTENTS REVISION HISTORY... 3 COMMON TECHNOLOGIES... 4 APPLICATIONS SECURITY... 4 User Account Management... 5 Administrator
More informationService Description VMware Workspace ONE
VMware Workspace ONE Last Updated: 05 April 2018 The product described in this Service Description is protected by U.S. and international copyright and intellectual property laws. The product described
More informationOracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge
Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge atul.goyal@oracle.com Principal Product Manager,
More informationSAP Security in a Hybrid World. Kiran Kola
SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal
More informationManaging and Auditing Organizational Migration to the Cloud TELASA SECURITY
Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting
More informationGovernance, Risk, and Compliance: A Practical Guide to Points of Entry
An Oracle White Paper January 2010 Governance, Risk, and Compliance: A Practical Guide to Points of Entry Disclaimer The following is intended to outline our general product direction. It is intended for
More informationWHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365
WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often
More informationOracle Identity and Access Management
Oracle Identity and Access Management AGENDA Overview Features Components Customizations APIs Oracle Identity Manager Connectors High Availability Concepts High Availability Architecture OVERVIEW Identity
More informationUnderstanding Oracle ADF and its role in the Oracle Fusion Platform
ORACLE PRODUCT LOGO Understanding Oracle ADF and its role in the Oracle Fusion Platform Dana Singleterry blogs.oracle.com/dana 2 Copyright Principal 2011, Oracle and/or its Product affiliates. All rights
More informationMapping BeyondTrust Solutions to
TECH BRIEF Taking a Preventive Care Approach to Healthcare IT Security Table of Contents Table of Contents... 2 Taking a Preventive Care Approach to Healthcare IT Security... 3 Improvements to be Made
More informationOracle Database Security Assessment Tool (DBSAT) Overview
Oracle Database Security Assessment Tool (DBSAT) Overview Pedro Lopes Product Manager Oracle Database Security High-level Trends in Security Data breaches becoming bigger and bolder New targets: Data aggregators,
More informationWebLogic Security Top Ten
WebLogic Security Top Ten June 2014 Michael Miller Chief Security Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Stephen Kost Chief Technology Officer
More informationSecurity in the Privileged Remote Access Appliance
Security in the Privileged Remote Access Appliance 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property
More informationTop Reasons To Audit An IAM Program. Bryan Cook Focal Point Data Risk
Top Reasons To Audit An IAM Program Bryan Cook Focal Point Data Risk Focal Point Data Risk A New Type of Risk Management Firm THE FACTS Born from the merger of three leading security & risk management
More informationSingle Secure Credential to Access Facilities and IT Resources
Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access
More informationIdentity-Powered Security
Identity-Powered Security Innovation created a very complex environment. z / OS PL / I Public Cloud Private Cloud Internet of Things (IoT) COBOL CICS IMS Cloud How is leveraging cloud impacting risk and
More informationDatabase Centric Information Security. Speaker Name / Title
Database Centric Information Security Speaker Name / Title The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationhidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION
HID ActivOne USER FRIENDLY STRONG AUTHENTICATION We understand IT security is one of the TOUGHEST business challenges today. HID Global is your trusted partner in the fight against data breach due to misused
More informationOpen mustard seed. Patrick Deegan, Ph.D. ID3
Open mustard seed Patrick Deegan, Ph.D. ID3 OpenSocial FSN (draft) August 8, 2013 Open Mustard Seed (OMS) Introduction The OMS Trustworthy Compute Framework (TCF) extends the core functionality of Personal
More informationCSN38: Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO
CSN38: Tracking Privileged User Access within an ArcSight Logger and SIEM Environment Philip Lieberman, President and CEO 2009 by Lieberman Software Corporation. Rev 20090921a Identity Management Definitions
More informationSnapCenter Software 4.0 Concepts Guide
SnapCenter Software 4.0 Concepts Guide May 2018 215-12925_D0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to use the Concepts Guide... 7 SnapCenter overview... 8 SnapCenter architecture...
More informationOracle DB in der Oracle Cloud Überblick und Praxis
Oracle DB in der Oracle Cloud Überblick und Praxis Negib Marhoul Systemberater Oracle Deutschland Agenda 1 2 3 Oracle Cloud Services - Überblick Bereitstellung einer Oracle DB in der Cloud Daten in die
More informationArcGIS Enterprise Security: An Introduction. Gregory Ponto & Jeff Smith
ArcGIS Enterprise Security: An Introduction Gregory Ponto & Jeff Smith Agenda ArcGIS Enterprise Security Model Portal for ArcGIS Authentication Authorization Building the Enterprise Encryption Collaboration
More informationMOVE BEYOND GPO FOR NEXT-LEVEL PRIVILEGE MANAGEMENT
MOVE BEYOND GPO FOR NEXT-LEVEL PRIVILEGE MANAGEMENT DON T USE A HAMMER MOVE BEYOND GPO FOR NEXT-LEVEL TO TURN A SCREW PRIVILEGE MANAGEMENT The first stage of privilege management Most organizations with
More informationCentralized Database User Management Using Active Directory
Centralized Database User Management Using Active Directory CON6574 Alan Williams Product Management Oracle Database Security October 2017 Presented with Copyright 2017, Oracle and/or its affiliates. All
More informationCompliance and Privileged Password Management
Introduces Compliance and Privileged Password Management [ W H I T E P A P E R ] Written by Kris Zupan, CEO/CTO e-dmz Security, LLC April 13, 2007 Compliance and Privileged Password Management Overview
More informationNETWORKING &SECURITY SOLUTIONSPORTFOLIO
NETWORKING &SECURITY SOLUTIONSPORTFOLIO NETWORKING &SECURITY SOLUTIONSPORTFOLIO Acomprehensivesolutionsportfoliotohelpyougetyourbusiness securelyconnected.clickononeofoursolutionstoknowmore NETWORKING
More information1Z Oracle Identity Governance Suite 11g PS3 Implementation Essentials Exam Summary Syllabus Questions
1Z0-339 Oracle Identity Governance Suite 11g PS3 Implementation Essentials Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-339 Exam on Oracle Identity Governance Suite 11g PS3 Implementation
More informationQuestion: 1 Which item must be enabled on the client side to allow users to complete certification in offline mode?
Volume: 81 Questions Question: 1 Which item must be enabled on the client side to allow users to complete certification in offline mode? A. In Microsoft Excel, navigate to Excel Options >Trust Center tab
More informationSecurity in Bomgar Remote Support
Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their
More informationThe Old is New Again Engineering Security in the Age of Data Access from Anywhere
The Old is New Again Engineering Security in the Age of Data Access from Anywhere Paul de Graaff Chief Strategy Officer Vanguard Integrity Professionals March 10, 2014 Session 14971 AGENDA History 1 This
More informationW H IT E P A P E R. Salesforce Security for the IT Executive
W HITEPAPER Salesforce Security for the IT Executive Contents Contents...1 Introduction...1 Background...1 Settings Related to Security and Compliance...1 Password Settings... 1 Session Settings... 2 Login
More informationArcGIS Enterprise: Portal Administration BILL MAJOR CRAIG CLEVELAND
ArcGIS Enterprise: Portal Administration BILL MAJOR CRAIG CLEVELAND Agenda Welcome & Introduction to ArcGIS Enterprise Portal for ArcGIS - Basic Configuration - Advanced Configuration - Deploying Apps
More informationSOFTWARE DEMONSTRATION
SOFTWARE DEMONSTRATION IDENTITY AND ACCESS MANAGEMENT SOFTWARE AND SERVICES RFP 644456 DEMONSTRATION AGENDA Executive Summary Technical Overview Break User Interfaces and Experience Multi-Campus and Inter-Campus
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationOracle Audit Vault Implementation
Oracle Audit Vault Implementation For SHIPPING FIRM Case Study Client Company Profile It has been involved in banking for over 300 years. It operates in over 50 countries with more than 1, 47,000 employees.
More informationISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems
ISACA Silicon Valley APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems Why Should You Care About APIs? Because cloud and mobile computing are built
More informationImproving Your Business with Oracle Data Integration See How Oracle Enterprise Metadata Management Can Help You
Improving Your Business with Oracle Data Integration See How Oracle Enterprise Metadata Management Can Help You Özgür Yiğit Oracle Data Integration, Senior Manager, ECEMEA Safe Harbor Statement The following
More informationOracle Identity Governance 11g R2: Develop Identity Provisioning
Oracle University Contact Us: 20 (0)2 35350254 Oracle Identity Governance 11g R2: Develop Identity Provisioning Duration: 5 Days What you will learn In this intensive course, you'll learn about Oracle
More informationHIPAA Regulatory Compliance
Secure Access Solutions & HIPAA Regulatory Compliance Privacy in the Healthcare Industry Privacy has always been a high priority in the health profession. However, since the implementation of the Health
More informationSecuring Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)
Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF) A Guide to Leveraging Privileged Account Security to Assist with SWIFT CSCF Compliance Table of Contents Executive Summary...
More informationOracle WebCenter Interaction: Roadmap for BEA AquaLogic User Interaction. Ajay Gandhi Sr. Director of Product Management Enterprise 2.
Oracle WebCenter Interaction: Roadmap for BEA AquaLogic User Interaction Ajay Gandhi Sr. Director of Product Management Enterprise 2.0 and Portals 1 Agenda Enterprise 2.0 and Portal Product Strategy AquaLogic
More informationSECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS
WHITE PAPER SECURING AWS ACCESS WITH MODERN IDENTITY SOLUTIONS The Challenges Of Securing AWS Access and How To Address Them In The Modern Enterprise Executive Summary When operating in Amazon Web Services
More informationData Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle
Data Security and Privacy : Compliance to Stewardship Jignesh Patel Solution Consultant,Oracle Agenda Connected Government Security Threats and Risks Defense In Depth Approach Summary Connected Government
More informationSecuring an Oracle Private Cloud using Oracle Directory Suite
Securing an Oracle Private Cloud using Oracle Directory Suite Prepared by: Eric Mader, Zirous, Inc. @zirous_eric Session ID: 266 Agenda Oracle Private Clouds and Oracle Enterprise Manager 13c Oracle Directory
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationOracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017
Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationIdentity Management as a Service
Identity Management as a Service The Challenge Today s technological landscape is one of permanent change. While connections to digital services and mobile devices grow, securing the data generated by
More informationOracle Enterprise Manager 12c IBM DB2 Database Plug-in
Oracle Enterprise Manager 12c IBM DB2 Database Plug-in May 2015 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationAll the resources you need to get buy-in from your team and advocate for the tools you need.
Top 5 Reasons The Business Case for Bomgar Privileged Access All the resources you need to get buy-in from your team and advocate for the tools you need. You already know Bomgar will help you manage and
More informationOracle Policy Automation The modern enterprise advice platform
Oracle Policy Automation The modern enterprise advice platform Release features and benefits (November 2017) v1.01 Program agenda 1 2 3 Overview of Oracle Policy Automation New features in release For
More informationUse Cases for Unix & Linux
WHITE PAPER 15 Server Privilege Management PowerBroker for Unix & Linux, PowerBroker Identity Services, and PowerBroker for Sudo Table of Contents Executive Summary... 3 15 Common Use Cases... 4 1. Removing
More informationMigration Best Practices for Oracle Access Manager 10gR3 deployments O R A C L E W H I T E P A P E R M A R C H 2015
Migration Best Practices for Oracle Access Manager 10gR3 deployments O R A C L E W H I T E P A P E R M A R C H 2015 Disclaimer The following is intended to outline our general product direction. It is
More informationMcAfee Database Security
McAfee Database Security Sagena Security Day 6 September 2012 September 20, 2012 Franz Hüll Senior Security Consultant Agenda Overview database security DB security from McAfee (Sentrigo) VMD McAfee Vulnerability
More informationPrivate Clouds: Opportunity to Improve Data Security and Lower Costs. InfoTRAMS Fusion Tematyczny, Bazy Danych, Kariera I Prywatny Sprzęt t W Pracy
Private Clouds: Opportunity to Improve Data Security and Lower Costs InfoTRAMS Fusion Tematyczny, Bazy Danych, Kariera I Prywatny Sprzęt t W Pracy Private Clouds: Opportunity to Improve Data Security and
More information